background preloader

Wifi security : Hacking wifi

Wifi security : Hacking wifi

Secure File Transfer Alternatives | Protect IU Overview Transferring files between machines (and users) is a common occurrence. Perhaps you need to send a class roster spreadsheet to an office assistant or a document containing a grant proposal to a colleague at another University. Terminology Cryptography Cryptography is the science of enabling secure electronic communications between a sender and one or more recipients. Encryption Encryption is the process of taking normal text (plaintext) and making that plaintext unintelligible by anyone other than those possessing the correct key. Decryption Decryption is the process of applying a key to encrypted data and obtaining the original plaintext. Key A key is a value that is applied to plaintext during the encryption process to generate ciphertext, and is applied during the decryption process to convert ciphertext into plaintext. Alternatives File Transfer Protocol (FTP), as its name implies, was developed to transfer files from one machine to another reliably and efficiently. E-mail Stunnel

How to Secure Your PC: 11 Steps Edit Article Edited by Askmeaskme, Lojjik Braughler, Teresa, BethyB and 24 others So you have just bought a new personal computer for your home (rather than for a workplace or as a server) and want to secure it (including protecting it from viruses and spyware). Privacy (including encryption, cryptography and anonymity) is a part of security but broad enough to need covering separately. Think of Privacy as the flipside of the coin. This article assumes you wish to use a network (such as the internet), share files on thumb drives and that your PC might be physically accessible to others. Ad Steps 1Choose an operating system based on its security and vulnerability (Linux has no known active viruses in the wild, OpenBSD is focused on security). 12Use the best Encryption software "Folder Lock". Tips In most circumstances, the most dangerous thing on a computer is the user. Warnings If you encrypt the data, MAKE SURE you don't forget the encryption key.

John the Ripper Sample output[edit] Here is a sample output in a Debian environment. # cat pass.txt user:AZl.zWwxIh15Q # john -w:password.lst pass.txt Loaded 1 password hash (Traditional DES [24/32 4K]) example (user) guesses: 1 time: 0:00:00:00 100% c/s: 752 trying: 12345 - pookie Attack types[edit] One of the modes John can use is the dictionary attack. John also offers a brute force mode. See also[edit] References[edit] External links[edit] Unlocking a Word Document under Windows How to Unlock a Word Document under Windows Seth Teller, August 2009 (send me email) Some authors (for example, of forms to be filled out) "lock" their documents under Windows. This is annoying, as it prevents you from fixing errors or adding anything to the document. If you web-search on "unlock word document" or "unlocking word document" you get a bunch of pages with advice that doesn't work under Windows, or pointers to paid software. Here is a method that works, does not need a password, and is free: 1. 2. 3. 4. 5. 6. 7. Your original Word document can now be edited normally. Back to Seth Teller's home page.

Everything You Wanted to Know about TOR & the Deep Web How to Hack Someones IP Address 2014 - Come to Hack Most of you may be curious to know how to find the IP address of your friend’s computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk. Finding out someone's IP address is like finding their phone number, an IP address can be used to find the general location where that person lives. Now while most of the tutorials on the net teach you how to steal an ip address via MSN, or any other chat software, in this post I’ll show you how to find IP address of someones computer using script. Using this method for hacking someones ip adress is very easy and effectively, so just follow the steps bellow. NOTE: This tutorial is for educational purposes only, I am NOT responsible in any way for how this information is used, use it at your own risk. How to Hack Someones IP Address? Alright, I'm gonna give you this script, that you write in the index.php. Here is the sript: 1. 2. 3. 4. Hope you'll find this tutorial useful. Introduction1. 4. Time to start.

The Best BitTorrent Websites « GeekLimit Posted by AtariBoy | Filed under Software, Web BitTorrent is a great way of transfering large files across the net without putting large loads of servers. All you need are the torrent files. BitTorrent.com – The origonal site from the creator of the BitTorrent protocol. Legaltorrents.com – 100% Legal torrents, many independant films and music. Linux Tracker - As many Linux ISOs as you can handle, all free of course. Torrentz.com - One of the best torrent search engines available. The Pirate Bay – The biggest tracker of them all, many not-so-legal torrents. Torrentspy - Moving towards more legal torrents, a very popular site. TorrentPortal – Lots of Ads, but if you can get past them its a gold mine of great torrents. Demonoid - A great community, invite only. JabberWalker – Another torrent search page. TorrentBytes - A nice simple forum style torrent list site. MegaNova – In the wake of SuprNova, nice fast search. IsoHunt – Massive search index, very detailed info on torrents too Digg this!

VulnerabilityAssessment.co.uk Pwning a Spammer's Keylogger Recently, while scrounging around our spam traps, I spotted this ordinary piece of malicious spam. It uses a very simple social engineering trick, speculating about Obama’s sexual orientation and a link to a supposed picture to prove it. There was nothing special about this spam but the link with a double extension file named “you.jpg.exe” was something worth investigating. So out of curiosity, I downloaded the file and checked out what it does. First thing I did was to find out what the file really was. Opening the file through a RAR extracting tool revealed the files inside it. I extracted “you.jpg.exe” and inspected each of the files inside it but found they were actually encoded. In the background, the following files were installed in the Windows System32 folder: bpk.datbpk.exebpkhk.dllbpkr.exeinst.datpk.bin Also an autorun registry was created: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run bpk = <%windir%\System32\bpk.exe> I almost ended the analysis here. And voila!

Hack Any Password Protected Wi-Fi Network Full Free Download Hack Any Password Protected Wi-Fi Network Full Hello Friends here i am sharing a tutorial for wifi cracking via Commview and aircrack so lets start it. Tools Needed : 1) Commview for Wifi 2) Aircrack-ng Instructions Of Hack Any Password Protected Wi-Fi Network Full: 1) Download, Install and open Commview for wifi. 2) Click on the “Blue play button” and the screen shown below will appear. 3) Now as all the available networks start to load, look for your target. 4) Now you will see the screen shown below as they collect packets. Note : The packets are secondary, What is actually happening here is that we are trying to collect as much IVs (Initialization vector) from those retrieved packets. 6) Now minimize Commview and locate the logged packets on your hard drive. 10) Click on the “Choose Button” and direct it to your Wireshark file that you just saved a minute ago. 11) Lets keep the Encryption type to “WEP”. 12) Key Size : 128 13) Now proceed to press on the launch button. Congratulations!

How to Surf the Web Anonymously" The Internet has a way of lulling you into a false sense of anonymity. After all, how can anyone know your true identity in a virtual world? The truth is that simply by connecting to the Internet, you share information about your computer, your geographical location and even about the Web sites you visit. The goal of anonymous Web surfing is to circumvent the technologies that track your online activity and may potentially expose your personal information to others. When people think of surfing the Web anonymously, they automatically associate it with extramarital affairs, malicious hacking, illegal downloading and other sordid behaviors. As you'll see in the next section, surfing the Web anonymously isn't as easy as erasing your browser history.

Related: