Free WiFi in Airports and Public Hotspots By Brian Wilson, CCNA, CCSE, CCAI, MCP, Network+, Security+, JNCIA Recently while traveling I noticed a hot spot and wanted to surf the internet. Once I connected to the AP I had seen that they wanted to charge me $8 per day to surf the internet. Painfully Computer Pranks ~ Computer Hacking Computer pranks to freak out your friends and make them crying for mummy I've been posting many articles about computer pranks on this blog (Deadly Virus Prank, The Ultimate Virus, How to Create a Fake and Harmless Virus and Facebook Virus Prank). Today , I will show you 5 great computer pranks that will frustrate your victims very much. These pranks could be very painfully, so please use them at your own risk ;)
How to gain access to system account the most powerful account in Windows.... - StumbleUpon There is an account in Microsoft Windows that is more powerful than the Administrator account in Windows Operating Systems. That account is called System account it is similar to the root OR super user in the Linux/Unix world . I will show you how to access this system account in this article. You can use this facility for removing programs that are causing problems to your system, malware etc. Introduction
The 50 Best Registry Hacks that Make Windows Better - How-To Geek - StumbleUpon We’re big fans of hacking the Windows Registry around here, and we’ve got one of the biggest collections of registry hacks you’ll find. Don’t believe us? Here’s a list of the top 50 registry hacks that we’ve covered. It’s important to note that you should never hack the registry if you don’t know what you’re doing, because your computer will light on fire and some squirrels may be injured. Also, you should create a System Restore point before doing so.
DIY laser long-distance listening device Tap into your inner James Bond with a laser long-distance listening device. This DIY spyware will allow you to hear conversations from a distance -- without being spotted. No DIY espionage kit is complete without a long-distance listening device, and no DIY long-distance listening device is complete unless it uses a sweet laser in some form or fashion. If you agree with that statement, then you're in luck, because the following project will show how you can use a laser pointer to hear noises from hundreds of feet away (the distance will be relative to the strength of the laser). As with any tutorial or project that has the potential to be used illegally, we should warn you only to use this new-found knowledge for good, not bad. We won't be held responsible if you get caught eavesdropping on your crazy old neighbor, and wind up being incarcerated for the rest of your life.
Nessus Vulnerability Scanner Detect & Assess Nessus is continuously updated with information about advanced threats and zero-day vulnerabilities, and new types of regulatory compliance configuration audits. Report & Take Action Report what matters to responsible parties with exploitability, severity modification, scan scheduling and deliver remediation reports via targeted emails.
5 Fun things To Do on School Computers - Dave Pagurek November 26th, 2010 I know it's been a while, but I'm reinstating my weekly blog post policy. This week will be about something I've wanted to write about for a while: School computers! How to Crack the Account Password on Any Operating System - Joe Tech - StumbleUpon This guest post was written by Blair Mathis from LaptopLogic.com – your premier source for the latest laptop software news and best laptop accessories. Computer passwords are like locks on doors – they keep honest people honest. If someone wishes to gain access to your laptop or computer, a simple login password will not stop them. Most computer users do not realize how simple it is to access the login password for a computer, and end up leaving vulnerable data on their computer, unencrypted and easy to access. Are you curious how easy it is for someone to gain access to your computer? If so, read on to see the technique one might use to figure out your computer password.
Love Thy Neighbor but hack his Wi-Fi My neighbor works for a fortune 500 company. I don’t know what he does exactly but he got a 10mbps internet connection attached to his WiFi router. He is mostly not home till late in the evening. so all this bandwidth sits idle all day. such a waste! I did try to connect to this router many times but it kept asking for a password. That son of gun must have it encrypted it. Moshe Sipper, The Artificial Self-Replication Page - StumbleUpon ... living organisms are very complicated aggregations of elementary parts, and by any reasonable theory of probability or thermodynamics highly improbable. That they should occur in the world at all is a miracle of the first magnitude; the only thing which removes, or mitigates, this miracle is that they reproduce themselves. Therefore, if by any peculiar accident there should ever be one of them, from there on the rules of probability do not apply, and there will be many of them, at least if the milieu is reasonable. John von Neumann, Theory of Self-Reproducing Automata. In the late 1940's eminent mathematician and physicist John von Neumann had become interested in the question of whether a machine can self-replicate, that is, produce copies of itself. Von Neumann wished to investigate the logic necessary for replication - he was not interested, nor did he have the tools, in building a working machine at the bio-chemical or genetic level.
Zenmap - Official cross-platform Nmap Security Scanner GUI Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command creator allows interactive creation of Nmap command lines. How to hack a computer with IP address There are plenty of papers out there that go into how to obtain an IP Address from the preferred mark of your choice. So I’m not going to go into that subject. Alright so say we got the targets IP Address finally. What do we do with this IP Address. Well first ping the IP Address to make sure that its alive.
Know the Trade Your IT Security Information Portal CISSP/CEH/CISA/Hacker... - StumbleUpon Google Hacking allintitle:Brains, Corp. camera allintitle:"index of/admin" allintitle:"index of/root" allintitle:restricted filetype:doc site:gov allintitle:restricted filetype :mail allintitle:sensitive filetype:doc allinurl:/bash_history allinurl:winnt/system32/ (get cmd.exe) ext:ini eudora.ini ext:pwd inurl:(service|authors|administrators |users) "# -FrontPage-" filetype:bak inurl:"htaccess|passwd|shadow|htusers" filetype:conf slapd.conf filetype:ctt "msn" filetype:mdb inurl:"account|users|admin|administrators|passwd|password" filetype:mdb inurl:users.mdb filetype:QDF QDF filetype:pdf "Host Vulnerability Summary Report" "Assessment Report" filetype:sql ("passwd values ****" | "password values ****" | "pass values ****" ) filetype:xls inurl:"email.xls" filetype:user eggdrop user