Cain for PocketPC (ARM) v1.2 released. Download it here. Requirements: - PocketPC 2003 device with an ARM based microprocessor architecture (eg: ipaq6515, Qtek 2020, Qtek 9090 ....). - Microsoft Windows CE or Windows Mobile operating system. - 5 Mb of free memory Features: - Rainbowcrack-online client (works with any Internet connection available such as GPRS, ActiveSync .... ). - Dictionary Attacks for the following hash types: MD2, MD4, MD5, SHA1, RIPEMD160, CiscoPIX, MySQL v3.23, MySQL v3.23 + challange, MySQL SHA1, MySQL SHA1 + challange, LM, LM + challange, NTLM, NTLM + challange, NTLM Session Security. - Hash Calculator. - Base64 Password Decoder. - Cisco Type-7 Password Decoder. - Cisco VPN Client Password Decoder. - VNC Password Decoder. - Microsoft Messenger Password Decoder. - Internet Explorer Password Decoder. - ActiveSync Password Decoder. Your help is needed for the recovery of Pocket Outlook passwords !
Windows BitLocker Drive Encryption Step-by-Step GuideWhat is BitLocker Drive Encryption? BitLocker Drive Encryption is an integral new security feature in the Windows Vista operating system that provides considerable protection for the operating system on your computer and data stored on the operating system volume. BitLocker ensures that data stored on a computer running Windows Vista remains encrypted even if the computer is tampered with when the operating system is not running.How I Cracked your Windows Password (Part 1)AdvertisementGFI LanGuard your virtual security consultant. Scan your LAN for any vulnerability and automate patch management for Windows, Mac OS & Linux. Get your FREE trial now! How Windows creates and stores password hashes and how those hashes are cracked.
Best Free Wi-Fi Network Finder UtilityGo straight to the Quick Selection Guide The most normal use of a WiFi network is probably your personal wireless network at home. You set up your router, assign a wireless SSID and the encryption and you know what to configure on your computer.Wordlists & Password Profiling with CRUNCH, WyD, & CUPPToday I am going to show you how to use three (3) different tools in Linux (Backtrack 5) for creating targeted wordlists to help speed up and increase the chance of success for your dictionary attacks. I will be covering the use of CRUNCH for pure wordlist generation, and then I will cover the use of WyD and CUPP which use password profiling techniques to create targeted wordlists to narrow your attacks. I will provide the written walk through here with a video at the end.
John the Ripper password crackerJohn the Ripper is free and Open Source software, distributed primarily in source code form. If you would rather use a commercial product tailored for your specific operating system, please consider John the Ripper Pro, which is distributed primarily in the form of "native" packages for the target operating systems and in general is meant to be easier to install and use while delivering optimal performance. This version integrates lots of contributed patches adding GPU support (OpenCL and CUDA), support for a hundred of additional hash and cipher types (including popular ones such as NTLM, raw MD5, etc., and even things such as encrypted OpenSSH private keys, ZIP and RAR archives, PDF files, etc.), as well as some optimizations and features. Unfortunately, its overall quality is lower than the official version's.
How I Cracked your Windows Password (Part 2)If you would like to read the first part in this article series please go to How I Cracked your Windows Password (Part 1). Introduction In the first part of this series we examined password hashes and the mechanisms Windows utilizes to create and store those values.Dynamips / Dynagen TutorialDocumentation Revision 1.11.7 Greg Anuzelli IntroductionWireless Network Watcher - Show who is connected to your wireless networkSee Also Wireless network survey software - NetSpot helps you plan and optimize your Wi-Fi networks on Mac OS X. WakeMeOnLan - Turn on computers on your network with Wake-on-LAN packet. NK2Edit - Edit, merge and repair the AutoComplete files (.NK2) of Microsoft Outlook. DescriptionCreate a Shiny Earth with Photoshop 3D LayersIn this tutorial I'll show you how to create a shiny planet icon using the 3D features of Photoshop CS4 Extended. This will cover basic information about 3D layers and texture maps. Let's get started! Video Tutorial Our video editor Gavin Steele has created this video tutorial to compliment this text + image tutorial. Step 1
Understanding /etc/shadow filebyVivek GiteonFebruary 23, 2006 last updated November 20, 2015 inBASH Shell, CentOS, Debian / Ubuntu, FreeBSD, HP-UX Unix, Linux, RedHat and Friends, Solaris-Unix, Suse, Ubuntu Linux, UNIX, User Management Can you explain /etc/shadow file format used under Linux or UNIX-like system? The /etc/shadow file stores actual password in encrypted format for user’s account with additional properties related to user password i.e. it stores secure user account information.
s Weather and Climate Toolkit TutorialNOAA's Weather and Climate Toolkit (WCT) is free, platform independent software distributed from NOAA's National Climatic Data Center (NCDC). The WCT allows the visualization and data export of weather and climate data, including Radar, Satellite and Model data. The WCT also provides access to weather/climate web services provided from NCDC and other organizations. The WCT provides tools for background maps, animations and basic filtering. The export of images and movies is provided in multiple formats.Realistic Smoke Effect Photoshop TutorialsAdobe Photoshop, as we all know is rightfully regarded as the Swiss knife of designers all around the world. With Photoshop, you can literally create all kinds of illustrations that you previously only dream about! With this fantastic tool, you can virtually create any effect you want. It’s like an infinite canvas of your dreams. If you have the imagination, sky is the limit.
Biometrics.gov - Introduction to BiometricsThe NSTC Subcommittee on Biometrics and Identity Management developed this introductory material in order to better communicate both within the government and with other interested parties. Stating facts and discussing related issues in a consistent, understandable manner, will enable smoother integration of privacy-protective biometric solutions. Federal agencies are working to ensure that their outreach activities are consistent with, and occasionally reference, this suite of documents so that the public, press and Congress are able to easily understand their plans and discuss them productively.Use IPv6 in Windows 7 TodayAs people debate how serious the coming Internet IPv4 shortage really is going to be and when they should migrate to IPv6, some of them may already be using IPv6 every day, and not know it. Seriously. You see Windows 7 doesn't just come with IPv6 already installed, it actually uses it for two very different network applications: DirectAccess and HomeGroup.