Latest Posts

Apr
18

BackTrack – Comprehensive Security Penetration Linux Distro Suite

The are a couple of things that are essential to any hacker’s walk of life. To name a few, there’s the ubiquitous flash drive for data transfer. You have the crossover cable for even faster data transfer. There’s the WiFi antenna for high gain and strong amplification. Possibly, you might find a video capture card in the computer. Of course, there’s the ubiquitous laptop and desktop computer. But what software is on these computers? Undoubtedly, you will find at least two operating systems, most often Windows and Linux. But with Linux, there are several different distributions. Is there a specific one? With hackers and crackers, there is only one Linux distro out there. It is called Backtrack.

Read the rest of this entry »

Apr
12

4 Ways to Avoid Packet Sniffing and Data Theft

vpn_analysis.jpgLast week on the freeware review, I wrote about the simplicity of packet sniffing and analyzing with Ethereal. I revealed how easy it was for anyone to tap sensitive data like login information, credit card numbers, social security number, and mission-critical emails traveling on the network. As promised, I will reveal how to actually prevent packet-sniffing software from reading your sensitive data.

As I previously explained, packet analysis passively listens into a network and then extracts the important data, which is usually in plaintext. The key to hampering packet analysis is encrypting that data sent on the network so that it is not read in plain text. The encrypted data that packet analyzers gather is pretty useless without an encryption key. While it is possible for crackers to obtain the key, encryption makes the process a lot longer (and sometimes nearly impossible). There are a couple common ways to do this.

Read the rest of this entry »

Apr
04

What’s the Difference? – Compare the Changes in Two Documents

In this never-ending quest for quality freeware to introduce to the freeware review, my dad asked me to find him something that did one specific thing. He needed a program that would compare the differences between two documents.

Take, for example, transcription. If you want to ensure the accuracy of a transcript, you can have two people transcribe the recording of a speech or interview to separate documents. Then, you run a program to compare the two. Maybe one transcriber heard “He hurt the baby” instead of “He burped the baby.” One word can make a world of difference!

Another example of using a comparison program is when you email your friend a document so that he or she can proofread it. Your friend edits the document and emails it back to you. Instead of going through the entire document line-by-line to see changes, you can just run the comparison program to point you to the changes.

Read the rest of this entry »

 
© 2006 and web design of Allan Ray Barizo from [art] [⁄app].
This site is best viewed with FF and at least 1024x768 resolution.