background preloader

Tomato Firmware

Tomato Firmware
Tomato is a small, lean and simple replacement firmware for Linksys' WRT54G/GL/GS, Buffalo WHR-G54S/WHR-HP-G54 and other Broadcom-based routers. It features a new easy to use GUI, a new bandwidth usage monitor, more advanced QOS and access restrictions, enables new wireless features such as WDS and wireless client modes, raises the limits on maximum connections for P2P, allows you to run your custom scripts or telnet/ssh in and do all sorts of things like re-program the SES/AOSS button, adds wireless site survey to see your wifi neighbors, and more. Screenshots This firmware is provided as-is without any warranty. I will NOT be responsible for damages that occur due to the use of this firmware. NOTESPlease see the Frequently Asked Questions page, Wikibooks entry, and the included README before installing. Download(please don't link the files directly - Thanks) Firmware Tomato_1_28.7z (3MB / SHA1: 832e9cd5d6437eeb758e898d8c22834578f0cb36) » Use this for most routers. » See NOTES above.

Ophcrack Alternative Firmware for Wireless APs: Thibor | Networking content from Windows IT Pro So far, I've told you about three alternative firmware packages for wireless access points (APs): DD-WRT, OpenWRT, and Talisman. If you missed those stories, you can read them at our Web site at their respective URLs: Continuing this series, this week, I give you a peek into Thibor. Like the other firmware packages, Thibor is based on the open source code published by Linksys. Like DD-WRT, OpenWRT, and Talisman, Thibor includes enhancements to the core features available in the Linksys firmware. Added features include static DHCP leasing, a port redirector, a site survey tool, support for DDNS including the ZoneEdit tool, and Wake-on-LAN capability. In the previous articles of this series, I said that the firmware packages include ipchains firewall software.

Sandboxie - Sandbox software for application isolation and secure Web browsing How to Pod Slurp ***Disclaimer***The following is for informational purposes only, I take no responsibility for what you do with this knowledge. I can not be held responsible for any property, emotional, or any other kind of damages caused by this technique. I believe it would be safe to assume that this is illegal and could get you into some trouble.You've been warned. :-) For this DIY, you will need some kind of mass storage device, whether it be a Digital memory card, Thumbdrive, Ipod, Cellphone, etc., some kind of text program to make Batch files/Visual Basic scripts, and one or more PCs loaded with Windows to test on. Be sure to look at the pictures to ensure the code is exactly like the pictures.

How to Install DDWRT on Asus RT-N66U This guide is upgraded due to process being much much simpler than it used to be to install DD-WRT on Asus N66U. 1. Download the files here. (taken from wiki) The new K3.x Builds seem to take all the complexity out of the equation on what build you have and the CFE issues. Backup Utilities: Five Best Windows Backup Tools @Christopher: Syncplicity offers all the key features under one roof - backup, sync, versioning and autoarchiving. But their pricing is out of what with most of the other offerings. I have reviewed features and tested Sugarsync, Syncplicity, Crashplan, Dropbox, ElephantDrive, Jungledisk, Humyo, Carbonite, Mozy, LiveDrive, Foldershare and the now dead MediaMax. In this context, what kind of premium can Syncplicity command? I imagine that Syncplicity may be worried about the number of high volume customers showing up in their beta. Final thoughts: the big boys will eventually bundle this feature set into their main offerings and sell it cheap - Google/Microsoft at minimum will do this.

(IN)SECURE Magazine ISSUE 41 (February 2014) Cloud security & Big Data Cloud insecurity? Asus RT-N66U From DD-WRT Wiki This 'Dark Night' is a very powerful piece of equipment and the NVRAM issue has been resolved, however, it presents significant risk (bricking) that requires careful adherence to the installation process. Note on 26-Jan-2013: Until someone updates this page (with CFE update etc.), you may want to read here: [edit] NVRAM issue 25-May-2013: Since BrainSlayer posted some experimental K3.X Images, the NVRAM Issue becomes almost obsolete. 9-Apr-2013: It seems more recently manufactured units come pre-loaded with the 64K v1.0.1.3 CFE and so are not compatible with standard DD-WRT builds. 1-Nov-2012: Fractal has indicated that the NVRAM is resolved and that 5Ghz is working. [1] [edit] DD-WRT Alternatives As of this writing (June 30, 2012) user Merlin has implemented a solution, that lives with 32k NVRAM for CFE, but extends to ~60k NVRAM in firmware. [edit] Hardware Specifications [edit] New K3.X Builds

5 Ways To Clone & Copy Your Hard Drive | MakeUseOf.com One of the most annoying things about owning a computer is the maintenance. It’s easily neglected. After all you don’t really notice the slow decline of your system’s performance, do you? But then again it’s a delight to work on a freshly installed machine, where everything is smooth and responds quickly. For emergencies it’s better you have a data and a system backup available. EASEUS Todo Backup Backing up your data is one of those things in life that you really won’t understand until disaster strikes, by which time it’s too late. But take my advice, use this incredible free Easeus Todo Backup software and it’ll be so easy you won’t even have to think about it. Paragon’s Drive Backup Express (Windows) This software is the easy solution to clone your hard drive . Both Drive Backup Express and DriveImage XML (described below) require a bootable CD, which the user has to create independently. I have previously written about Drive Backup Express and thoroughly explained how it works here.

phantom - System for generic, decentralized, unstoppable internet anonymity The Phantom protocol is a system for decentralized anonymization of generic network traffic. It has been designed with the following main goals in mind: 1. Completely decentralized. - No critical or weak points to attack or put (il)legal pressure on. 2. - Direct technical destructive attacks will practically be the only possible way to even attempt to stop it. 3. - Probabilistic methods (contrary to deterministic methods) must be used in a completely decentralized design like this, where no other peer can be trusted, so focus is put on optimizing these methods. 4. - This is simple in itself, but still important in the context of anonymization. 5. - No one should have to worry about crimes being perpetrated from their own IP address. 6. - You never know what the next draconian law might be. 7. - Most existing anonymization solutions are practically unusable for (or even prohibit) larger data volumes. 8. The latest version of the source release package can always be downloaded here.

Related: