background preloader

Wifi security

Wifi security
Download and install my wifi zone then restart your computer.Now you have to add your mac adress to the list to permit it. To get your ip adress: On your computer if youre using xp go to start then click run and type in cmd. This will bring up command prompt and type in ipconfig/all Look for your router/modem/wlam card/network card and look for physical adress Now write the adress down and go back to my wifi zone. Click on the white list tab and add your mac adress and if you want to put in your ip type it in (but you dont have to).If you dont put in a ip it will say invalid ip then just type in a random ip and click add now remove the ip.After you added it click apply.

http://www.instructables.com/id/Wifi-security/

Related:  منتديات عالميةAbout HackingH@ckingbrucemullins

The Coming Insurrection The Tarnac 9 were once just nine individuals who had withdrawn from the capitalist paradigm to live a quiet, communal life in an isolated French mountain village. They grew their own food, opened a small grocery store and started a movie club where they screened films for their rural neighbors. The group, nearly all of whom hailed from affluent Paris suburbs, were highly educated and, by all accounts, friendly, helpful and generous. It was an idyllic existence, far from the consumer spectacle of modern urban existence. But then someone – it has yet to be determined who – sabotaged railways in the surrounding countryside, injuring no one but delaying thousands of passengers for several hours.

How to use Google for Hacking. Google serves almost 80 percent of all search queries on the Internet, proving itself as the most popular search engine. However Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed. In this post I will show how to use Google for exploiting security vulnerabilities within websites. The following are some of the hacks that can be accomplished using Google. How to Crack the Account Password on Any Operating System This guest post was written by Blair Mathis from LaptopLogic.com – your premier source for the latest laptop software news and best laptop accessories. Computer passwords are like locks on doors – they keep honest people honest. If someone wishes to gain access to your laptop or computer, a simple login password will not stop them. Most computer users do not realize how simple it is to access the login password for a computer, and end up leaving vulnerable data on their computer, unencrypted and easy to access. Are you curious how easy it is for someone to gain access to your computer?

The Official ROOTCON Blog: 3 Common Automated Tools with GUI Used for Wireless Cracking / Pentesting 1. wifite wifite is a mass WEP/WPA WiFi Cracker that is coded in python which makes cracking WIFI passwords and security easier, it uses the aircrack-ng suite. It can be executed by using the command line python wifite.py or ./wifite.py. To see a list of command lines with detailed information for the script, you can just type in the terminal . John the Ripper Sample output[edit] Here is a sample output in a Debian environment. # cat pass.txt user:AZl.zWwxIh15Q # john -w:password.lst pass.txt Loaded 1 password hash (Traditional DES [24/32 4K]) example (user) guesses: 1 time: 0:00:00:00 100% c/s: 752 trying: 12345 - pookie Attack types[edit]

Torrent Search Engine Login Login or register to get advantage of advanced controls on AIO Search.Login with your Facebook, Twitter, Google and Wordpress ... Categories Select a category to load the related search engines.Click Add to add your own category.Drag categories to arrange your categories menu. Engines Drag engines to personalize search engines arrangement. UnCheck or remove the engines you do not need Engines controls Check or uncheck all engines.Search Find ready to add search engines on our database and add them to list.My Sites Find search engines added by you.Add Add your favourite search engine by adding its URL.

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own.

Image Writer for Windows: Create Bootable USB Stick By Ishan Bansal on July 31, 2010 | Sponsored Links Image Writer is a simple to use free software to create bootable USB sticks on Windows. If you have any ISO file, Image Writer can write that image to your USB stick. Image Writer has a minimalistic interface that is extremely easy to understand. Search Google anonymously while staying logged in to your account in Firefox One of the things that keeps some users from using Google Search is the certainty that everything that is done on the site is being logged and analyzed by Google. While it is possible to overcome this, for instance by launching searches only in the browser's private browsing mode, or using search engines such as Startpage that use Google search results but do not track you, you may prefer an automated solution that just works in the background without you doing anything. You could try and use Google while you are not signed in to your Google Account, but that too means some form of tracking as there are other means besides tracking a user by account. Plus, it means that you cannot use other Google Services such as Gmail properly without signing in first again.

Document Metadata Extraction - ForensicsWiki Here are tools that will extract metadata from document files. antiword Belkasoft Evidence Center Extracts metadata from various Microsoft Office files (both 97-2003 and 2007-2013 formats), as well as Open Office documents. Besides, can extract plain texts (combining all texts from all XLS/XLSX/ODS pages and PPT/PPTX/ODP slides) and embedded objects. The tool can visualize pictures embedded in a document. Hacking for Beginners One of the best things about computers is how dynamic they are. There is so much information about computers and it changes constantly. As a hacker, you are at the leading edge of changes to technology. This makes it a very exciting and interesting field of study and can even lead to some awesome job opportunities as a computer security expert. Hacking School explains what it means to be a hacker and teaches practical techniques for becoming a hacker. Hackers are often misrepresented as “evildoers” bent on stealing money and personal information from individuals and businesses.

Related: