background preloader

This Is Lifehacker's Evil Episode: Cracking Windows Passwords, Padlocks, and Wi-Fi

This Is Lifehacker's Evil Episode: Cracking Windows Passwords, Padlocks, and Wi-Fi
Say you wanted to mask a much larger file as being something else (Ok fine I'll come clean - I've currently got my porn section in a password encrypted truecrypt mountable drive file). I'd love to make the actual file I have to click on to launch truecrypt look like something else, instead of just a file the computer doesn't know which program to use to open it. WBstego won't let me do this, as the file you are trying to mask needs to be smaller than the carrier file, and the mountable drive is exactly 100gb. Any tips guys?

http://lifehacker.com/5792861/this-is-lifehackers-evil-episode-cracking-windows-passwords-padlocks-and-wi-fi

Related:  mehdimahbouli

10 Search Engines to Explore the Invisible Web No, it’s not Spiderman’s latest web slinging tool but something that’s more real world. Like the World Wide Web. The Invisible Web refers to the part of the WWW that’s not indexed by the search engines. Most of us think that that search powerhouses like Google and Bing are like the Great Oracle”¦they see everything.

Start Every Day as a Producer, Not a Consumer I have to agree that my most productive days are those where I don't allow myself to read the news, check e-mail, facebook, etc., right after I get up. However, that happens because I've got a ton of stuff to get done, and the outside world takes a back seat until my workload is under control. However, there are certain biological necessities that have to happen before I can be productive. The dog gets let out, I go to the bathroom, I eat/drink something, and *then* I sit down to be productive. I also *have* to check my e-mail, because if something blew up overnight or there's something that needs to be dealt with ASAP, I need to know as early as possible. I've found that reading my e-mail on my phone curbs the impulse to respond to everything immediately, because composing a lengthy e-mail on a tiny touchscreen sucks.

Free Software for College Students If you’re in college, check out these eight lesser known, but still indispensable software applications for your computer. We bet these will be as useful as Dropbox and Evernote! Photo by Samantha Decker. Licensed under Creative Commons CC BY-NC-ND 2.0. How to Crack a Wi-Fi Network. 1.Back Track Today we’re going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. Dozens of tutorials on how to crack WEP are already all over the internet using this method.

MAIN - Crack a Wi-Fi Network's WEP Password with BackTrack, the Fancy Video Version - Lifehacker @Thomas Wrobel: Sadly, it is important to secure your wireless. While I'd consider it no big deal for others to leech some bandwidth for email or browsing, if they use it for piracy and get caught, you're liable. @Thomas Wrobel: You are forgetting that you can be punished for what people do with your connection. @Thomas Wrobel: Its not really just that. People can use your internet, do bad things and because it's through your router it would most likely trace back to you. Or too many people can hop on your connection and make your connection almost too slow (that one happened to me before I turned on wireless security.)

The 100 Best Books of All Time Many publishers have lists of 100 best books, defined by their own criteria. This article enumerates some lists of "100 best" books for which there are fuller articles. Among them, Science Fiction: The 100 Best Novels (Xanadu, 1985) and Modern Fantasy: The 100 Best Novels (Grafton, 1988) are collections of 100 short essays by a single author, David Pringle, with moderately long critical introductory chapters also by Pringle. For publisher Xanadu, Science Fiction was the first of four "100 Best" books published from 1985 to 1988.

How To Crack A Wi-Fi Network's WPA Password With Reaver Your Wi-Fi network is your convenient wireless gateway to the internet, and since you’re not keen on sharing your connection with any old hooligan who happens to be walking past your home, you secure your network with a password, right? Knowing, as you might, how easy it is to crack a WEP password, you probably secure your network using the more bulletproof WPA security protocol. Here’s the bad news: A new, free, open-source tool called Reaver exploits a security hole in wireless routers and can crack most routers’ current passwords with relative ease. Here’s how to crack a WPA or WPA2 password, step by step, with Reaver — and how to protect your network against Reaver attacks. In the first section of this post, I’ll walk through the steps required to crack a WPA password using Reaver.

The 32 Totally Essential (and Free) Apps for Every New PC - Page 1 You have to admit, Windows is a pretty barebones operating system, feature-wise. After a fresh install of XP or Vista (perhaps following a Clean Start), you're faced with a barren Start Menu and an empty desktop that's beaming with limitless potential. The problem is that it's up to you to hunt and download those applications that you really need in your day-to-day computing experience. And chances are, it's often difficult to find good software that's also free.

The Best Hacking Tutorial Sites - Learn Legal Hacking written by: Daniel Robson•edited by: Aaron R.•updated: 2/13/2011 Whether it's to understand potential attack vectors or simply for the fun of it, learning the basics of hacking is something that a lot of people aspire to. Here's our list of the top tutorial based hacking sites.

Related:  kbarthauerComputersHow to-s & Lifehackslinuxפריצת מחשבים