Jump to content

freak

VIP
  • Content Count

    930
  • Donations

    $0.00 
  • Joined

  • Last visited

  • Days Won

    78

Posts posted by freak


  1. This Chinese man had a nice sashimi meal but he did not expect this to happen afterwards…

     

    He went to the doctor with stomach ache and itchy skin and scans of his body revealed that it was riddled with tapeworm due to the large amount of raw fish he had eaten. Doctors believe that the sashimi contained tapeworms’ eggs and these parasites can cause cysticercosis, which is an infection that can be life threatening if it reaches the brain.

     

    when_you_see_these_pics_you_will_never_e

    when_you_see_these_pics_you_will_never_e

    when_you_see_these_pics_you_will_never_e

    when_you_see_these_pics_you_will_never_e

    • Like 1

  2. How Attackers Could Crack Your Wireless Network Security

     

    crack-wifi-network.jpg [/url]

     

    It’s important to secure your wireless network with WPA2 encryption and a strong passphrase. But what sorts of attacks are you actually securing it against? Here’s how attackers crack encrypted wireless networks.

     

     

    This isn’t a “how to crack a wireless network” guide. We’re not here to walk you through the process of compromising a network — we want you to understand how someone might compromise your network.

     

     

    Spying on an Unencrypted Network

     

    First, let’s start with the least secure network possible: An open network with no encryption. Anyone can obviously connect to the network and use your Internet connection without providing a passphrase. This could put you in legal danger if they do something illegal and it’s traced back to your IP address. However, there’s another risk that’s less obvious.

     

    When a network is unencrypted, traffic travels back and forth in plaintext. Anyone within range can use packet-capturing software that activates a laptop’s Wi-Fi hardware and captures the wireless packets from the air. This is generally known as putting the device in “promiscuous mode,” as it captures all nearby wireless traffic. The attacker could then inspect these packets and see what you’re doing online. Any HTTPS connections will be protected from this, but all HTTP traffic will be vulnerable.

     

    Google took some heat for this when they were capturing Wi-Fi data with their Street View trucks. They captured some packets from open Wi-Fi networks, and those could contain sensitive data. Anyone within range of your network can capture this sensitive data — yet another reason to not operate an open Wi-Fi network.

     

    650x451xcapture-packets-with-wireshark.p

     

    Finding a Hidden Wireless Network

     

    It’s possible to find “hidden” wireless networks with tools like Kismet, which show nearby wireless networks. The wireless network’s SSID, or name, will be displayed as blank in many of these tools.

     

    This won’t help too much. Attackers can send a deauth frame to a device, which is the signal an access point would send if it were shutting down. The device will then attempt to connect to the network again, and it will do so using the network’s SSID. The SSID can be captured at this time. This tool isn’t even really necessary, as monitoring a network for an extended period of time will naturally result in the capture of a client attempting to connect, revealing the SSID.

     

    This is why hiding your wireless network won’t help you. In fact, it can actually make your devices less secure because they’ll attempt to connect to the hidden Wi-Fi network at all times. An attacker nearby could see these requests and pretend to be your hidden access point, forcing your device to connect to a compromised access point.

     

     

    650x507xview-nearby-networks-with-kismet

     

     

    Changing a MAC Address

     

    Network analysis tools that capture network traffic will also show devices connected to an access point along with their MAC address, something that’s visible in the packets traveling back and forth. If a device is connected to the access point, the attacker knows that the device’s MAC address will work with the device.

    The attacker can then change their Wi-Fi hardware’s MAC address to match the other computer’s MAC address. They’d wait for the client to disconnect or deauth it and force it to disconnect, then connect to the Wi-Fi network with their own device.

     

     

    650x290xdeauth.png.pagespeed.ic.q9p6lCTQ

     

     

    Cracking WEP or WPA1 Encryption

     

    WPA2 is the modern, secure way to encrypt your Wi-Fi. There are known attacks that can break the older WEP or WPA1 encryption (WPA1 is often referred to just as “WPA” encryption, but we use WPA1 here to emphasize that we’re talking about the older version of WPA and that WPA2 is more secure).

     

    The encryption scheme itself is vulnerable and, with enough traffic captured, the encryption can be analyzed and broken. After monitoring an access point for about a day and capturing about a day’s worth of traffic, an attacker can run a software program that breaks the WEP encryption. WEP is fairly insecure and there are other ways to break it more quickly by tricking the access point. WPA1 is more secure, but is still vulnerable.

     

    650x290xaircrack.png.pagespeed.ic.4S7cjT

     

     

    Exploiting WPS Vulnerabilities

     

    An attacker could also break into your network by exploiting Wi-Fi Protected Setup, or WPS. With WPS, your router has an 8-digit PIN number that a device can use to connect rather than providing your encryption passphrase. The PIN is checked in two groups — first, the router checks the first four digits and tells the device if they’re right, and then the router checks the last four digits and tells the device if they’re right. There are a fairly small number of possible four-digit numbers, so an attacker can “brute force” the WPS security by trying each four-digit number until the router tells them they’ve guessed the correct one.

     

    You can protect against this by disabling WPS. Unfortunately, some routers actually leave WPS enabled even when you disable it in their web interface. You may be safer if you have a router that doesn’t support WPS at all!

     

    650x290xreaver-wps-attack.png.pagespeed.

     

     

    Brute-Forcing WPA2 Passphrases

     

    Modern WPA2 encryption has to be “brute-forced” with a dictionary attack. An attacker monitors a network, capturing the handshake packets that are exchanged when a device connects to an access point. This data can be easily captured by deauthorizing a connected device. They can then attempt to run a brute-force attack, checking possible Wi-Fi passphrases and seeing if they will successfully complete the handshake.

     

    For example, let’s say the passphrase is “password.” WPA2 passphrases must be between eight and 63 digits, so “password” is perfectly valid. A computer would start with a dictionary file containing many possible passphrases and try them one by one. For example, it would try “password,” “letmein,1″ “opensesame,” and so on. This sort of attack is often called a “dictionary attack” because it requires a dictionary file containing many possible passwords.

     

    We can easily see how common or simple passwords like “password” will be guessed within a short time frame, whereas the computer may never get around to guessing a longer, less obvious passphrase like “:]C/+[[ujA+S;n9BYq9z>T@J#5E=g}uwF5?B?Xyg.” This is why it’s important to have a strong passphrase with a reasonable length.

     

    Tools of the Trade

     

    If you want to see the specific tools an attacker would use, download and run Kali Linux. Kali is the successor to BackTrack, which you may have heard about. Aircrack-ng, Kismet, Wireshark, Reaver, and other network-penetration tools are all preinstalled and ready to use. These tools may take some knowledge (or Googling) to actually use, of course.

     

     

     

    650x535xkali-linux-menu.png.pagespeed.ic

     

     

    All these methods require an attacker to be within physical range of the network, of course. If you live in the middle of nowhere, you’re less at risk. If you live in an apartment building in New York City, there are quite a few people nearby who might want an insecure network they can piggy-back on.

    • Like 3

  3. The events that occurred on 11 September 2001 will forever be remembered by the world. Here are some heart-breaking photos from the day.
     

    1in_memory_of_september_11th_640_04.jpg
    2in_memory_of_september_11th_640_05.jpg
    3in_memory_of_september_11th_640_06.jpg
    4in_memory_of_september_11th_640_07.jpg
    5in_memory_of_september_11th_640_08.jpg
    6in_memory_of_september_11th_640_09.jpg
    7in_memory_of_september_11th_640_10.jpg
    8in_memory_of_september_11th_640_11.jpg
    9in_memory_of_september_11th_640_12.jpg
    10in_memory_of_september_11th_640_13.jpg
    11in_memory_of_september_11th_640_14.jpg
    12in_memory_of_september_11th_640_15.jpg
    13in_memory_of_september_11th_640_16.jpg
    14in_memory_of_september_11th_640_17.jpg
    15in_memory_of_september_11th_640_18.jpg
    16in_memory_of_september_11th_640_19.jpg
    17in_memory_of_september_11th_640_20.jpg
    18in_memory_of_september_11th_640_21.jpg
    19in_memory_of_september_11th_640_22.jpg
    20in_memory_of_september_11th_640_23.jpg
    21in_memory_of_september_11th_640_24.jpg
    22in_memory_of_september_11th_640_25.jpg
    23in_memory_of_september_11th_640_26.jpg
    24in_memory_of_september_11th_640_27.jpg
    25in_memory_of_september_11th_640_28.jpg
    26in_memory_of_september_11th_640_29.jpg
    27in_memory_of_september_11th_640_30.jpg
    28in_memory_of_september_11th_640_31.jpg
    29in_memory_of_september_11th_640_32.jpg
    30in_memory_of_september_11th_640_33.jpg
    31in_memory_of_september_11th_640_34.jpg
    32in_memory_of_september_11th_640_35.jpg
    33in_memory_of_september_11th_640_36.jpg
    34in_memory_of_september_11th_640_37.jpg
    35in_memory_of_september_11th_640_38.jpg
    36in_memory_of_september_11th_640_39.jpg
    37in_memory_of_september_11th_Th6Hl_640_39
    38in_memory_of_september_11th_82Da4_640_39
    39in_memory_of_september_11th_kdM0c_640_39
    40in_memory_of_september_11th_640_40.jpg
    41in_memory_of_september_11th_640_41.jpg
    42in_memory_of_september_11th_640_42.jpg
    43in_memory_of_september_11th_640_43.jpg
    44in_memory_of_september_11th_640_44.jpg
    45in_memory_of_september_11th_640_45.jpg
    46in_memory_of_september_11th_640_46.jpg
    47in_memory_of_september_11th_640_47.jpg
    48in_memory_of_september_11th_640_48.jpg
    49in_memory_of_september_11th_640_49.jpg
    50in_memory_of_september_11th_640_50.jpg
    51in_memory_of_september_11th_640_51.jpg
    52in_memory_of_september_11th_640_52.jpg
    53in_memory_of_september_11th_640_53.jpg
    54in_memory_of_september_11th_640_54.jpg
    55in_memory_of_september_11th_640_55.jpg
    56in_memory_of_september_11th_640_56.jpg
    57in_memory_of_september_11th_640_57.jpg
    58in_memory_of_september_11th_640_58.jpg
    59in_memory_of_september_11th_640_59.jpg
    60in_memory_of_september_11th_640_60.jpg

    This family photo was taken at the top of the World Trade Center on 10 September 2001 and is one of the last “happy” images taken of the building before devastation struck the following day.

    61in_memory_of_september_11th_640_61.jpg
    62in_memory_of_september_11_640_high_62.jp

     

    • Like 1

  4. Nipple stimulation = a closer bond with your sexual partner.

    1fun_facts_about_boobs_that_will_surprise

    Or at least that’s what a 2012 study suggests! The study aimed to find exactly why men are attracted to breasts, and the answer they found is that it’s a partial result of evolution. In that men have learned that by stimulating a woman’s nipple, the woman is then more inclined to feel attracted and connected to her partner physically.

    In fact, some women can achieve orgasm from nipple stimulation alone. (Awesome.)

    2fun_facts_about_boobs_that_will_surprise

    In a 2009 study, 29% of the 213 women studied had achieved orgasm from nipple stimulation alone. That’s because women’s brains process genital and nipple stimulation in the same exact way.

    There’s a champagne glass in London that’s shaped after Kate Moss’ breast.

    3fun_facts_about_boobs_that_will_surprise

    The glasses exist at London’s 34 restaurant, and Kate’s signature is even on the bottom!

    Men have nipples and breasts because all fetuses are female at first.

    4fun_facts_about_boobs_that_will_surprise

    That’s right! Every fetus starts as female, and it isn’t until six weeks that testosterone starts to take hold. But even before that six-week mark, nipples and breasts are already part of the body.

    The largest bra size is an L, and the smallest is a AAA.

    5fun_facts_about_boobs_that_will_surprise

    The L cup was only made available in 2011.

    Scientists seriously do not know why women have full breasts all the time.

    6fun_facts_about_boobs_that_will_surprise

    Primates have full breasts only when they’re breastfeeding, and then they quickly go back to normal. But human breasts appear full even when we’re not breastfeeding. So…what gives? There are a bunch of theories, including one about how our full breasts are similar to the round and bright red buttcheeks of our ape ancestors.

    Because bras weren’t yet invented, ancient Roman women would wrap bandages around themselves to keep their boobs in place while they worked out.

    7fun_facts_about_boobs_that_will_surprise

    Studies show that breastfeeding can have long-term benefits for moms, including lowering risks of heart disease and cancer.

    8fun_facts_about_boobs_that_will_surprise

    Along with helping new moms lose that baby weight, and lowering the chances of postpartum depression.

    And breastfeeding actually changes the way a mother’s brain works! It makes the mother more attuned to her own child’s crying.

    9fun_facts_about_boobs_that_will_surprise

    That’s some Mother Nature witchcraft right there.

    Corsets that cinched in the waist and popped up the breasts went out of style during World War I, when the army needed more steel and asked women to give them up.

    10fun_facts_about_boobs_that_will_surprise

    There are more than 4 million new bras produced every day.

    11fun_facts_about_boobs_that_will_surprise

    A 2013 study found that men who prefer large breasts are less financially secure.

    12fun_facts_about_boobs_that_will_surprise

    The study also found that when men are hungry they prefer large breasts, and if they want children they also prefer them large.

    And the same study found that men who prefer small breasts are more financially secure.

    13fun_facts_about_boobs_that_will_surprise

    The small-breast enthusiasts are also less likely to want children.

    Sleeping facedown can change the shape of your breasts over time.

    14fun_facts_about_boobs_that_will_surprise

    It would take a few years of sleeping facedown, but it would change the shape! The best sleep move? On your side.

    There are eight different types of nipples.

    15fun_facts_about_boobs_that_will_surprise

    Variety: It is fun! And for nipples, the varieties include normal, flat, puffy, and inverted!

    And just in case you were wondering (obvi), Annie Hawkins-Turner has the world’s largest natural breasts on record.

    16fun_facts_about_boobs_that_will_surprise

    They measure 70 inches around, 43 inches under, and would technically be supported in a 48V bra, if they made that size.

     

    • Like 2

  5. Add day of week to taskbar clock in Windows 8 | 7

     

    In this post we will see how to add the day of the week, that is, Monday, Tuesday, etc to the system tray clock in the Taskbar Notification area in Windows 8 or Windows 7.

     

    Add day of week to taskbar

     

    Press Win+X in Windows 8 to bring up the WinX Menu. From it, choose ‘Control Panel’ and then, select Region.

     

    Now, from the ‘Region’ window that appears on your computer screen, select ‘Additional Settings’ button.

     

    add-day-of-week-to-taskbar.png

     

    Next, from the ‘Customize Format’ window, choose the ‘Date’ tab.

     

    Under Short date add ddd in the beginning. That is, make the Short date as ddd-dd-MM-yy. In this case only 3 alphabets will be displayed. viz. Mon. If you prefer the full day displayed viz Monday, then use dddd-dd-MM-yy. Using a comma instead of the hyphen, will make a comma display. Try and see if ddd, dd-MM-yy suits you. Put the day after the date by using dd-MM-yy, ddd if you wish.

     

    Play around and see what suits you the best. Click Apply / OK and exit.

     

    You will now see the day of the week to displayed in the taskbar.

     

    add-day-to-taskbar.png

     

    As always, Thank You for your time and I hope you found this How To of interest

    • Like 1
×