background preloader

OclHashcat-plus - advanced password recovery

OclHashcat-plus - advanced password recovery

Fighting Hackers: Everything You've Been Told About Passwords Is Wrong | Wired Opinion Security is not just about strong encryption, good anti-virus software, or techniques like two-factor authentication. It’s also about the “fuzzy” things … involving people. That’s where the security game is often won or lost. Just ask Mat Honan. We – the users – are supposed to be responsible, and are told what to do to stay secure. more services used = more passwords needed = more user pain … which means it only gets harder and harder to follow such advice. A security researcher, Dr. But they don’t have to be. And it starts with recognizing that a lot of security advice hurts more than it helps. Security specialists – and many websites – prompt us to use a combination of letters, numbers, and characters when selecting passwords. Obviously, we need something that is both secure and which we can remember. We need new password approaches. One common suggestion is taking a word, let’s say “Elvis”, and replacing letters with digits to get “3lv1s”. Because hackers know all our tricks.

GnuPG What Happened When We Talked Responsive Design with an Expert This morning saw us talking responsive design issues and concepts with one of my personal favourites when it comes to experts – Craig Sharkie (co-author of the jQuery: Novice to Ninja books). It was an interesting session, and Craig managed to stay on top of a barrage of questions from a very keen audience. If you missed the session and want to know what went down, below is a full transcript. If you have any ideas for future chats, fancy yourself as an expert and would like to take part in a session, or know of any good chat products that you think I should check out, please get in touch as I’m on the lookout for all three. Formerly a developer in the corporate world, HAWK (known as Sarah by her mother) said goodbye to the code and succumbed to the lure of social media.

Agastya (Remote Mobile Access) Find your lost, stolen, or misplaced phone with the original device recovery app for Android. Find My Phone is an important security app that you want to have on your phone, as it provides a means of recovering a lost or stolen device. Note that is not an anti-virus app; we focus on one task - device recovery and finding your phone - and do it well. "Best security and Find My Phone app for your Android!".4/5 star rating since 2009 and counting! Some happy users:- "truly the best phone finder GET THIS! Features:* If you lose your phone, just send it a text message and Find My Phone will reply to you with its current address, and a Google Maps link to your phone's location.* Text your phone and have it ring at maximum volume (even if is on silent) to locate by ear.* Find out how much battery is remaining* Get notified if somebody changes your SIM card* Track from the web by having your phone email back it's location* New: Remotely wipe your phone * NO ADS! Instructions1. GPS off?

Arethusa Our VPN service make your internet connection more anonymous and secure. Your real IP address is hidden and your ISP cannot monitor or filter your activity. It works by establishing an encrypted tunnel between your computer and our servers, using a VPN. To check what is your current IP address, click here. To check the country of an IP address, query the RIPE database (for IP addresses in Europe), or the ARIN database (for IP addresses in North America). Warning: Our service hides your real IP address and encrypts your connection. Premium v2 offer: Unmetered traffic. API de matriz de distancia de Google - Google Maps API Si vas a utilizar este servicio en una aplicación de JavaScript, consulta la documentación de la clase DistanceMatrixService de la versión 3 del API de Google Maps. Introducción El API de matriz de distancia de Google es un servicio que proporciona el tiempo y la distancia de viaje para una matriz de orígenes y destinos. La información devuelta se basa en la ruta recomendada entre los puntos de partida y llegada, según los cálculos del API de Google Maps, y se compone de dos filas que incluyen los valores de duration y de distance para cada par. El servicio no devuelve información detallada de la ruta. La información de la ruta se puede obtener transmitiendo el origen y el destino deseados al API de rutas. Audiencia Este documento está dirigido a los desarrolladores que quieran calcular el tiempo y la distancia de viaje entre un número de puntos con el API de Google Maps. Límites de uso El API de matriz de distancia cuenta con los siguientes límites: Solicitudes de matriz de distancia <? Filas

Cellphone Inspired By Chinese Scrolls Cellphone Inspired By Chinese Scrolls As flexible displays come to market, designers are asked how they can design products that utilize the technology while remaining meaningful. Yun Liang’s scroll cellphone takes its inspiration from how traditional Chinese paintings are unfurled. When not in use, the display neatly rolls into the tube. Designer: Yun Liang n2n a Layer Two Peer-to-Peer VPN n2n is a layer-two peer-to-peer virtual private network (VPN) which allows users to exploit features typical of P2P applications at network instead of application level. This means that users can gain native IP visibility (e.g. two PCs belonging to the same n2n network can ping each other) and be reachable with the same network IP address regardless of the network where they currently belong. The main n2n design features are: An n2n is an encrypted layer two private network based on a P2P protocol.Encryption is performed on edge nodes using open protocols with user-defined encryption keys: you control your security without delegating it to companies as it happens with Skype or Hamachi.Each n2n user can simultaneously belong to multiple networks (a.k.a. communities).Ability to cross NAT and firewalls in the reverse traffic direction (i.e. from outside to inside) so that n2n nodes are reachable even if running on a private network. Quickstart n2n Security Q.

Related: