background preloader

How to Crack a Wi-Fi Network.

1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain’t what you’d call “news.” But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter. Unless you’re a computer security and networking ninja, chances are you don’t have all the tools on hand to get this job done. * A compatible wireless adapter—This is the biggest requirement. * A BackTrack 3 Live CD. * A nearby WEP-enabled Wi-Fi network. * Patience with the command line. To crack WEP, you’ll need to launch Konsole, BackTrack’s built-in command line. First run the following to get a list of your network interfaces: The only one I’ve got there is labeled ra0. Now, run the following four commands. {*style:<i>airmon-ng stop (interface) ifconfig (interface) down </i>*} 3.

http://www.aagneyam.com/blog/?p=623

Related:  PrivacyLife Hacks Institute of Hacking 2Web PagesNeWeb SecurityIT bronnen

9 Tips to Stay Safe on Public Wi-Fi Your bank calls you to verify your recent $750 bill at an out-of-state Taco Bell, but you haven’t left town in weeks. You quickly contest the charge and request a new credit card, but when you check your wallet the compromised card is still there. You try to think of shady ATMs or recent cashiers, but nothing comes to mind. Beyond Share Pro 2.1 - Beyond Share is a handy information sharing application! July 9, 2012This giveaway is not available any more. Beyond Share is a very handy application when you want to share music and photos with your families, copy things back and forth between your multiple computers or communicate with your colleagues in an office easily. Beyond Share is an information sharing application that allows you:

How to Crack the Account Password on Any Operating System – Joe Tech This guest post was written by Blair Mathis from LaptopLogic.com – your premier source for the latest laptop software news and best laptop accessories. Computer passwords are like locks on doors – they keep honest people honest. If someone wishes to gain access to your laptop or computer, a simple login password will not stop them. Most computer users do not realize how simple it is to access the login password for a computer, and end up leaving vulnerable data on their computer, unencrypted and easy to access. Are you curious how easy it is for someone to gain access to your computer?

Major security hole allows Apple passwords to be reset with only email address, date of birth (update) Apple yesterday rolled out two-step verification, a security measure that promises to further shield Apple ID and iCloud accounts from being hijacked. Unfortunately, today a new exploit has been discovered that affects all customers who haven't yet enabled the new feature. It allows anyone with your email address and date of birth to reset your password — using Apple's own tools. We've been made aware of a step-by-step tutorial (which remains available as of this writing) that explains in detail how to take advantage of the vulnerability. The exploit involves pasting in a modified URL while answering the DOB security question on Apple's iForgot page. It's a process just about anyone could manage, and The Verge has confirmed the glaring security hole firsthand.

the radical transparency of DAVID BRIN The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom? was published in May 1998 by Perseus Press (formerly Addison Wesley). This large nonfiction work concerns threats to privacy and openness in the information age. It won the Obeler Freedom of Speech Award from the American Library Association and was a finalist for the McGannon Public Policy Prize, and is still in print. How to become a real Computer Geek Little known to most, there are many benefits to being a computer geek. In our high-tech society, being a computer guru can be one of the most high paying jobs available and they are highly in demand, especially if you want to become a network administrator. By tapping into your inner geek, you can develop a most useful skill that will be sure to pay off later in life. Here with I am attaching some useful links ,It may help to a person who have real ambition to become a Real Computer Geek,a Geek, Hacker,A Reverse Engineer ….. Things Every Computer Geek Should Know!!. 1.How to hide files in JPEG pictures.

Most Common Passwords Roleplay. Learn to play songs by ear! Free Ear Training.[Video Tutorial] How to build google chrome extensions Update: See my analysis of the most common passwords from singles.org and other hacked databases. DIVINA: Discovering Vulnerabilities of Internet Accounts#2 In 2012, Mat Honan found that his Twitter account had been hacked. When trying to figure out what happened, he found that not just his Twitter account was hacked, but also his Amazon account, his Gmail account, and his Apple account — meaning that all data in these accounts was lost. His iPhone was locked, and his Mac was wiped clean. All data was erased.

100 Amazing How-To Sites to Teach Yourself Anything Posted by Site Administrator in Online Learning May 7th, 2009 Learning new skills and expanding your knowledge doesn’t have to cost you an arm and a leg. There are loads of free resources on the Web that can help you find instructional videos, tutorials and classes to learn a wide variety of skills from fixing basic car problems to speaking another language. With 100 sites to choose from, you’re bound to find something here that will help you learn just about anything you could want. General Tutorials These sites offer a wide range of tutorials and videos. Hot Wire Your Car From Wired How-To Wiki Nine times out of ten, the term "hot-wire" summons images of car theft. Of course, anyone who's been stranded in a hostile environment without their car keys knows better.

Web Proxies - sorted by country and software I have detected that you are using AdBlock Plus or some other adblocking software. I need money to operate the site and almost all of that comes from our online advertising. If you feel like you should give something back then please turn off your adblocking software, thanks. Your ip address is like your signature in the internet world. Search [May 2013, 36 min] Defrag Tools: #42 - WPT - CPU Analysis In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue walking you through the Windows Performance Toolkit (WPT). [Aug 2013, 13 min] Defrag Tools: #50 - WPT - Memory Analysis - Heap In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue walking you through the Windows Performance Toolkit (WPT). [Jun 2013, 28 min] Defrag Tools: #44 - WPT - DiskIO Analysis In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue walking you through the Windows Performance Toolkit (WPT). [Jul 2013, 17 min] Defrag Tools: #47 - WPT - MiniFilter Analysis In this episode of Defrag Tools, Andrew Richards, Chad Beeder and Larry Larsen continue walking you through the Windows Performance Toolkit (WPT). 3-100 Your app is great, but its performance could be better.

How to conduct a security audit of your Google account February 18, 2014, 10:04 AM — Image credit: flickr/s2art The privacy dangers of Google go beyond what Google knows about you -- you may have given dozens of sites access to your Google account information without realizing it. Why Facebook's Facial Recognition is Creepy By Sarah Jacobsson Purewal I'm not sure if you've heard the news, but Facebook is officially getting super-creepy. Facebook announced Tuesday that it will be implementing facial recognition technology for all users in the next few weeks, semi-automating the photo-tagging process. Sure, you can "opt-out" of the service, but it's a pretty weak consolation. After all, opting out won't keep Facebook from gathering data and recognizing your face--it'll just keep people from tagging you automatically.

Related:  HackingLifeHaxTechnology/SoftwareUseful SitesComputers/ HacksFile search & share and HacksInformation TechnologyNetworkkingtausGeeketry.