background preloader


Related:  Program Helps

Projects Overview The Tor community of software and services aims to make your Internet experience safer and better. Tor Browser contains everything you need to safely browse the Internet. This package requires no installation. Just extract it and run. Arm is a terminal status monitor for Tor, intended for command-line aficionados and ssh connections. This functions much like top does for system usage, providing real time information on Tor's resource utilization and state. Analytics for the Tor network, including graphs of its available bandwidth and estimated userbase. Tor Messenger is a cross-platform chat program that aims to be secure by default and sends all of its traffic over Tor. Pluggable Transports (PT) transform the Tor traffic flow between the client and the bridge. Web-based protocol to learn about currently running Tor relays and bridges. In collaboration with The Guardian Project, we're developing Tor on the Google Android mobile operating system.

Note taking and organization What is KeepNote KeepNote is a note taking application that works on Windows, Linux, and MacOS X. With KeepNote, you can store your class notes, TODO lists, research notes, journal entries, paper outlines, etc in a simple notebook hierarchy with rich-text formatting, images, and more. Using full-text search, you can retrieve any note for later reference. KeepNote is designed to be cross-platform (implemented in Python and PyGTK) and stores your notes in simple and easy to manipulate file formats (HTML and XML). Read more about KeepNote's design philosophy or follow my development ideas on twitter (@mattrasmus). Features Rich-text formatting (e.g. Updates 2012.03.26 - Released KeepNote 0.7.8 I just released KeepNote 0.7.8. 2012.01.01 - Released KeepNote 0.7.7 Happy new year! 2011.11.20 - Released KeepNote 0.7.6 KeepNote 0.7.6 is now released. Download See change log for update details. Download extensions There are a growing number of extensions available for KeepNote. Requirements Notes "coWPAtty is designed to audit the pre-shared key (PSK) selection for WPA networks based on the TKIP protocol." - Joshua Wright. Project Homepage: also see: Local Mirror: cowpatty-4.6.tgz MD5: b90fd36ad987c99e7cc1d2a05a565cbd Installing coWPAtty coWPAtty Dictionary Attack Precomputing WPA PMK to crack WPA PSK coWPAtty Precomputed WPA Attack coWPAtty Tables NOTE: coWPAtty 4.0 and above also include WPA2 attack capabilities (usage remains the same). Download the latest coWPAtty (currently coWPAtty-4.2) to /tools/wifi tar zxvf cowpatty-4.2.tgz cd cowpatty-4.2 make To perform the coWPAtty dictionary attack we need to supply the tool with a capture file that includes the TKIP four-way handshake, a dictionary file of passphrases to guess with and the SSID for the network. . wpa-test-01.cap is the capture containing the four-way handshake dict is the password file cuckoo is the network SSID . hashfile is our output file

ViewMarks | Codepad You successfully installed version 1.0.3 of the ViewMarks Add-on. On this page you will find a short documentation about the operation and the configuration of the Add-on. ViewMarks offers an alternative way to organize and use your bookmarks. When you create a bookmark, a preview image is automatically captured and saved. The new version 2 contains the following enhancements over the previous version: Creating and Editing a ViewMark You can create a boomark with preview of the web page by clicking on the dropdown arrow of the ViewMark icon in the Navigation Toolbar (or right clicking on the icon in the Status Bar) and choosing "Add ViewMark". The elements of the dialog are from top to bottom, left to right: Using and managing ViewMarks You can open the web page view of your bookmark folders by clicking on the ViewMark icon in the Navigation Toolbar or the Status Bar. You can also rearrange the web page view of a folder by dragging and dropping individual items around. Using QR codes

Free IP Changer Software About this IP Changer This is a Firefox add-on that changes your IP address by swapping browser proxy settings. This is the exact same software that comes with the service, but without the private IP relays. Instead, you'll use the "free proxy" instructions below for entering public settings. Also see: YouTube Video Work on PC and Mac This software works on PC and Mac, but you must be using Firefox. Installation Instructions Please read my short terms of use and then click here to install. Uninstall is easy If you later decide that you don't want the IP Changer software, just go to the Firefox menu for "Tools -> Addons -> Extensions" then click "IP Changer" and "Remove". Instructions for Use 1) You'll need to add some proxy settings in order to surf freely with the IP Changer (see next section). 2) Select "Clear" anytime to return to surfing with your regular (direct) IP address. Add free proxy settings A proxy server is a server that relays your Internet traffic. Paid options

Clearly Distraction-free reading Create the perfect online reading experience by clearing away everything but the content. Make it your own Choose from several pre-set themes or build one to suit your needs. Save it for later If you don’t have time to finish reading, tap on the Evernote icon to finish reading later. truecrack - Password cracking for truecrypt(c) volume files. WHAT TrueCrack IS? - NEW VERSION 3.5 AVAILABLE TrueCrack is a brute-force password cracker for TrueCrypt (Copyrigth) volumes. PBKDF2 (defined in PKCS5 v2.0) based on key derivation functions: Ripemd160, Sha512 and Whirlpool. The execution time of TrueCrack for a dictionary attack is (average word length 10 characters): Dictionary attack: truecrack -t truecrypt_file -w passwords_file [-k ripemd160 | -k sha512 | -k whirlpool] [-e aes | -e serpent | -e twofish] [-a blocks] [-b] [-H] [-r number] Alphabet attack: truecrack -t truecrypt_file -c alphabet [-s minlength] -m maxlength [-k ripemd160 | -k sha512 | -k whirlpool] [-e aes | -e serpent | -e twofish] [-a blocks] [-b] [-H] [-r number] cd truecrack . . TrueCrack is an Open Source Software under GNU Public License version 3.

InstallingSoftware Main page: Ubuntu Documentation: Installing applications. Note: The Main page is available in multiple languages. Installing software in Ubuntu is easy, and this guide will show you how to do it. By default, many useful programs are already installed when you put Ubuntu onto your computer. However, you may need a particular piece of software that serves a purpose not served by the default applications. If you'd like to get some background information on what's happening when you install software (which can sometimes be technical), read Packages and Package Management. See also: FreeSoftwareAlternatives This section covers the basic concepts of packages and package management. What is a package? Software is a very broad term, and is generally taken to mean a program which you can run on your computer. Ubuntu uses packages to store everything that a particular program needs to run. Source or Binary? Package Dependencies Programs often use some of the same files as each other. Package Managers

Password crackers SecTools.Org: Top 125 Network Security Tools For more than a decade, the Nmap Project has been cataloguing the network security community's favorite tools. In 2011 this site became much more dynamic, offering ratings, reviews, searching, sorting, and a new tool suggestion form . We're very impressed by the collective smarts of the security community and we highly recommend reading the whole list and investigating any tools you are unfamiliar with. 12 tools Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. version 1.1 on April 24, 2010 (2 years, 7 months ago). crackers wireless UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. version 4.9.43 on Dec. 3, 2011 (1 year ago). sniffers John the Ripper is a fast password cracker for UNIX/Linux and Mac OS X.. version 1.7.9-jumbo-7 on Sept. 20, 2012 (2 months, 4 weeks ago). version 7.3 on May 23, 2012 (6 months, 4 weeks ago). traffic-monitors fuzzers

Web Development Bookmarklets Web Development Bookmarklets These bookmarklets let you see how a web page is coded without digging through the source, debug problems in web pages quickly, and experiment with CSS or JS without editing the actual page. (To keep bookmarklets in order to use them on other web pages, drag them to your Bookmarks Toolbar. Or, install them all at once.) Browsers: is Internet Explorer for Windows, is Netscape 7 or Mozilla, is Netscape 4, and is Opera. Details Opens a JavaScript Shell and allows it to access the current page. Opens a JavaScript Development Environment and allows it to access the current page. Type in CSS rules to experiment or to create a temporary user style sheet. Creates a new window into which you can type CSS rules for the original page. Experiment with changes to the page's style sheet. Similar to "test styles". This bookmarklet supports inline and linked style sheets, imports, and style sheets with data: URLs (such as those created by "test styles"). Also shows classes (e.g.

How to Encrypt Your Email Even if you never email sensitive information--social security numbers, banking info, business secrets, and so on--you should consider using encryption. Aside from capturing your email content and attachments, a miscreant could hijack your entire email account if you failed to secure it properly. In this article, I'll discuss what you need to encrypt and how to get started, regardless of the particular email service you use. What to Encrypt To secure your email effectively, you should encrypt three things: the connection from your email provider; your actual email messages; and your stored, cached, or archived email messages. If you leave the connection from your email provider to your computer or other device unencrypted while you check or send email messages, other users on your network can easily capture your email login credentials and any messages you send or receive. How to Encrypt Email Connections How to Encrypt Email Messages How to Encrypt Stored Email That's all you have to do.

Import Bookmarklets Import Bookmarklets You can add a bunch of bookmarklets at once by importing one of these files. All the files are in "Netscape 4 bookmarks file format", which most browsers can import. Some minor categories of bookmarklets, such as "site-specific bookmarklets", are not included in these files. Mozilla Firefox Save bookmarklets-moz.htmlBookmarks, Manage Bookmarks. Then, drag the bookmarklets you use most often directly to your personal toolbar. Internet Explorer Save bookmarklets-ie.html. Opera 7 I don't recommend importing bookmarklets in Opera. Netscape 4 Save bookmarklets-ns4.html. You should be aware of a Netscape 4 bug: bookmarklets don't work from subfolders of the personal toolbar. Other browsers