background preloader

Wifi security : Hacking wifi

Wifi security : Hacking wifi
Related:  brucemullins

Secure File Transfer Alternatives | Protect IU Overview Transferring files between machines (and users) is a common occurrence. Perhaps you need to send a class roster spreadsheet to an office assistant or a document containing a grant proposal to a colleague at another University. Terminology Cryptography Cryptography is the science of enabling secure electronic communications between a sender and one or more recipients. Encryption Encryption is the process of taking normal text (plaintext) and making that plaintext unintelligible by anyone other than those possessing the correct key. Decryption Decryption is the process of applying a key to encrypted data and obtaining the original plaintext. Key A key is a value that is applied to plaintext during the encryption process to generate ciphertext, and is applied during the decryption process to convert ciphertext into plaintext. Alternatives File Transfer Protocol (FTP), as its name implies, was developed to transfer files from one machine to another reliably and efficiently. E-mail Stunnel

How to Crack the Account Password on Any Operating System | Joe Tech This guest post was written by Blair Mathis from – your premier source for the latest laptop software news and best laptop accessories. Computer passwords are like locks on doors – they keep honest people honest. If someone wishes to gain access to your laptop or computer, a simple login password will not stop them. Most computer users do not realize how simple it is to access the login password for a computer, and end up leaving vulnerable data on their computer, unencrypted and easy to access. Are you curious how easy it is for someone to gain access to your computer? Windows Windows is still the most popular operating system, and the method used to discover the login password is the easiest. Simply download the Ophcrack ISO and burn it to a CD (or load it onto a USB drive via UNetbootin). The computer will restart and Ophcrack will be loaded. Mac The second most popular operating system, OS X is no safer when it comes to password cracking then Windows. fsck -fy dscl .

Just Delete Me | A directory of direct links to delete your account from web services. Can't find what you're looking for? Help make better. easy No Info Available Login to your account, go to parameters, click Delete my account. show info... hard You have to call them in order to delete your account. Log in to your account and click the top-left link to 'Member Preferences'. Despite what it says in their FAQ there is actually no automatic way to delete your account. Follow the link to edit your profile and click cancel account at bottom. Just head to the account page and click the red button 'Delete your account' at the bottom left of the page. To close your account, contact Amazon by email (via this contact form) and request that your account be closed. You must login before visiting the link. impossible We do not 'delete' or 'terminate' accounts on ACC. Remove all applications and services from your account, then request deletion by emailing customer services. Response from We really don't have a way to delete accounts entirely. medium

How to Secure Your PC: 11 Steps Edit Article Edited by Askmeaskme, Lojjik Braughler, Teresa, BethyB and 24 others So you have just bought a new personal computer for your home (rather than for a workplace or as a server) and want to secure it (including protecting it from viruses and spyware). Privacy (including encryption, cryptography and anonymity) is a part of security but broad enough to need covering separately. Think of Privacy as the flipside of the coin. This article assumes you wish to use a network (such as the internet), share files on thumb drives and that your PC might be physically accessible to others. Ad Steps 1Choose an operating system based on its security and vulnerability (Linux has no known active viruses in the wild, OpenBSD is focused on security). 12Use the best Encryption software "Folder Lock". Tips In most circumstances, the most dangerous thing on a computer is the user. Warnings If you encrypt the data, MAKE SURE you don't forget the encryption key.

How To Become A Hacker Copyright © 2001 Eric S. Raymond As editor of the Jargon File and author of a few other well-known documents of similar nature, I often get email requests from enthusiastic network newbies asking (in effect) "how can I learn to be a wizardly hacker?". Back in 1996 I noticed that there didn't seem to be any other FAQs or web documents that addressed this vital question, so I started this one. A lot of hackers now consider it definitive, and I suppose that means it is. Still, I don't claim to be the exclusive authority on this topic; if you don't like what you read here, write your own. If you are reading a snapshot of this document offline, the current version lives at Note: there is a list of Frequently Asked Questions at the end of this document. The five-dots-in-nine-squares diagram that decorates this document is called a glider. If you find this document valuable, please leave me a tip on Gittip. If you want to be a hacker, keep reading.

Online kupovina spisak sajtova koji primaju uplate preko kartica i imaju (free)shiping Posto su na Elitu vecinom korisnici okrenuti IT-u i da ne nabrajam ostale teme, nema bas mnogo onih koje interesuju Vencanice :) A grubo uzevsi bar 50 % ako ne i vise Kineskih sajtova se bavi upravo time, prodajom, sivenjem vencanica i ostale opreme za vencanja !! Ni sam nisam mogao da verujem dok nisam naleteo na jedan sajt sa linkovima . Za kupovinu odece i obuce preko Net-a iz Kine preporuka samo za Kockare i za one koje zele da "Siromasnim" Kinezima doniraju neku sumu. Sve se kao rucno sije pa traje nedeljama , isporuka samo DHL i ostalim kuririma, a na kraju se dobije neka zguzvana beda koja sa haljinom izvesne Kejt cest nema ni istu boju kao na slici, a ni jedan dodirni element.

John the Ripper Sample output[edit] Here is a sample output in a Debian environment. # cat pass.txt user:AZl.zWwxIh15Q # john -w:password.lst pass.txt Loaded 1 password hash (Traditional DES [24/32 4K]) example (user) guesses: 1 time: 0:00:00:00 100% c/s: 752 trying: 12345 - pookie Attack types[edit] One of the modes John can use is the dictionary attack. John also offers a brute force mode. See also[edit] References[edit] External links[edit] Hacking for Beginners One of the best things about computers is how dynamic they are. There is so much information about computers and it changes constantly. As a hacker, you are at the leading edge of changes to technology. This makes it a very exciting and interesting field of study and can even lead to some awesome job opportunities as a computer security expert. Hacking School explains what it means to be a hacker and teaches practical techniques for becoming a hacker. Hackers are often misrepresented as “evildoers” bent on stealing money and personal information from individuals and businesses. White Hat Hackers are benevolent security experts that do not seek profits from illegal network access. Black Hack Hackers are the people who use their knowledge of computers for illegal or unethical purposes. The point – use your computer knowledge to promote learning and security; not to be a thief or criminal. Programming The single best thing you can do to become a hacker is learn to program. Network Hacking

Why Nikola Tesla was the greatest geek who ever lived Additional notes from the author: If you want to learn more about Tesla, I highly recommend reading Tesla: Man Out of Time Also, this Badass of the week by Ben Thompson is what originally inspired me to write a comic about Tesla. Ben's also got a book out which is packed full of awesome. There's an old movie from the 80s on Netflix Instant Queue right now about Tesla: The Secret of Nikola Tesla. It's corny and full of bad acting, but it paints a fairly accurate depiction of his life. The drunk history of Tesla is quite awesome, too. has a great article about Edison and how his douchebaggery had a chokehold on American cinema.

Unlocking a Word Document under Windows How to Unlock a Word Document under Windows Seth Teller, August 2009 (send me email) Some authors (for example, of forms to be filled out) "lock" their documents under Windows. This is annoying, as it prevents you from fixing errors or adding anything to the document. If you web-search on "unlock word document" or "unlocking word document" you get a bunch of pages with advice that doesn't work under Windows, or pointers to paid software. Here is a method that works, does not need a password, and is free: 1. 2. 3. 4. 5. 6. 7. Your original Word document can now be edited normally. Back to Seth Teller's home page.

15 CMD Commands Every Windows User Should Know Advertisement Updated by Tina Sieber on January 21, 2017. Microsoft has slowly but surely pushed the command line aside in the Windows interface. This is not without reason. It’s an antiquated and mostly unnecessary tool from an era of text-based input. 10 Windows Command Line Tips You Should Check Out 10 Windows Command Line Tips You Should Check Out While the Windows command line is not considered as powerful as a Linux's, here are some Windows command line tips and tricks not everyone might know about. Read More But many commands remain useful, and Windows 8 and 10 even added new features. In case you’re not sure how to access the command prompt, forgot basic commands, or would like to know how to see a list of switches for each command, you can refer to our beginners guide to the Windows command line for instructions. Our 15 Favorites Most files in Windows are associated with a specific program that is assigned to open the file by default. 2. 4. 5. 6. 7. 8. 9. 11. 12. 13. 14. 15.