Postingan

Menampilkan postingan dari 2012

Delete Browsing History

U sers have always had the ability to manage browsing information collected and stored on their machines. Internet Explorer 8 provides an enhanced interface to make it easier than ever to remove this information – while keeping related data that the user chooses to retain.   Managing Private Information Privacy is a complex topic that more often than not puts one party in conflict with another. If security boils down to “the user is in control of what code runs on the machine,” then privacy boils down to “the user is in control of what information the browser makes available to Web sites." Some organizations write scripts to clean up cookies and browsing history at the end of a browsing session to help ensure user privacy. This type of environment might be needed for very sensitive data (for example, defense, security, or law enforcement environments), for regulatory or compliance reasons, or for very private data in the healthcare industry. Internet Explor...

Review light downloader

Gambar
Secara teori, hampir semua aplikasi download manager memiliki fungsi yang sama.  Kemampuannya dibuat agar Anda bisa melakukan proses unduh berkas dari suatu situs lebih cepat dengan tingkat keberhasilan yang lebih tinggi. Feature -nya pun mirip, mulai dari proses akselerasi, pause , resume , dan schedule . Namun, aplikasi ini tidak dikhususkan untuk mengunduh kandungan multimedia dari situs streaming video. Nah, Light Downloader (LD) lebih mengedepankan fungsi yang ringan dan sederhana namun berkinerja tinggi. Aplikasi ini juga tidak kalah dengan aplikasi sejenis. LD memiliki antarmuka yang mirip dengan DAM, meski terlihat lebih sederhana. Aplikasi ini memiliki pemisahan hasil unduhan berdasarkan kategori yang lebih sederhana. Hanya saja tidak seperti DMA, Light Downloader sepenuhnya bersifat freeware . LD diklaim mampu meningkatkan kecepatan saat mengunduh hingga 6 kali lebih cepat. Hal ini dimungkinkan karena LD menggunakan metode pemisahan berkas menjadi beberapa bagian dan ...

WINDOWS DISCOVERY TOOLS

Gambar
Most platforms have one or two popular scanning tools along with a handful of other less feature-filled applications available. Windows is no exception. The ubiquitous NetStumbler is by far the most popular scanning tool, and for the Windows user who wants monitor mode, AiroPeek is the usual solution. NetStumbler NetStumbler is by far the most popular scanning tool on Windows. While NetStumbler has a lot of unique features, it also has some drawbacks. It has GPS support, so it can record the location of an access point (AP), but it is not tightly integrated into mapping/ navigation software. Also, because it's an active scanner, it might not be able to find "hidden" APs, and it definitely will not be able to find the name of a hidden AP. Access points that are closed or hidden (your vendor may use different language) don't respond to broadcast probe requests. They also don't transmit their real name in beacons (they are set to null). A examination o...

Earn 20 Times More With GOMEZPEERZONE

Gambar
Do you know what is Gomez Peer , refer to this article - What is Gomez Peer? It is basically, a website that allows you to become a peer for the servers of Gomez to measure web performances. In return for your help in letting them use your machine, they reward you monetarily. The Million Dollar Question: How to Explode the Earnings by 20X? Well, I have been searching the web and did some research on my own and I found that it is indeed possible to do it. How I know? I heard you rhetorically asked. Because I have tried it and tested it myself.

The 802.11 MAC

Gambar
O ne of the most important aspects of the 802.11 standard is the rules laid down for Media Access Control (MAC). Regardless of the physical layer 802.11 is implemented on (2.4-GHz ISM band, 5-GHz UNII band, and so on), the MAC rules stay the same. Distributed Coordination Function The 802.11 standard specifies two modes in which MAC can operate: contention free and contention based. In contention-based MAC, stations basically fight for access to the media. Similar to Ethernet, when a station wants to transmit first, it checks to see if another station is using the wire. In an Ethernet network, a station waits until the media is not in use and then transmits the packet. If another station transmits at the same time, it will detect the collision and randomly back off. This makes Ethernet a carrier sense multiple access/collision detection (CSMA/CD)–based algorithm.

HARDWARE AND DRIVERS

Gambar
T he tools you use are only as good as the hardware they are running on, but the best wireless card and chipset in the world is useless if the driver controlling it has no idea how to make it do what you want. This section introduces you to the currently available drivers, the chipsets that they control, and the cards that have the chipsets in them. There is a strong emphasis on Linux drivers, because this is where most of the development is currently happening. Before getting into the nitty gritty details of chipsets and drivers, some information on why drivers and chipsets are so important in wireless hacking is needed.

Wi-Fi vs. 802.11

Wi-Fi is a subset of the 802.11 standard that is managed by the Wi-Fi Alliance. Because the 802.11 standard is so large, and the process required to update the standard can take awhile (it's run by a committee), nearly all of the major wireless equipment manufacturers decided they needed a smaller, more nimble group dedicated to maintaining interoperability among vendors. This resulted in the creation of the Wi-Fi Alliance. The Wi-Fi Alliance assures that all products with a Wi-Fi-certified logo work together. This way if any ambiguity in the 802.11 standard crops up, the Wi-Fi Alliance defines the "right thing" to do. It also allows vendors to implement important subsets of draft standards (standards that have not yet been ratified). The most well-known example of this is Wi-Fi Protected Access (WPA) or "draft" 802.11n equipment.

Introduction to (the history of Wifi)

Gambar
The 802.11 standard defines a link layer wireless protocol and is managed by the Institute of Electrical and Electronics Engineers (IEEE). Many people think of Wi-Fi when they hear 802.11, but they are not quite the same thing. In recent years, Wi-Fi and 802.11 have exploded in popularity, and every new laptop comes with a builtin Wi-Fi adapter. This popularity has led to a surge of research into the security of the 802.11 standard. The history about the first 802.11 standard was approved in 1997 and allowed transmission speeds that topped out at 2 Mbps. This version of the standard allowed two different methods for encoding information at a physical level, Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS). These two different encoding schemes are incompatible, however, and the choice led to a lot of confusion in the marketplace.

RF HARDWARE

Gambar
Antennas Quite simply stated, the antenna is what puts the signal into the air and gets it back out again. It does this by converting the electrical energy being delivered to the antenna into electromagnetic waves that are then able capable of traveling over long distances. Antennas are reciprocal in nature, which means that they are capable of both transmitting and receiving a signal equally well. This allows the same antenna to be used for both transmission and reception of RF signals. When discussing different types of antennas, there are several characteristics that are used to describe an antenna's top-level behavior and performance. These characteristics are gain, radiation pattern, resonant frequency, polarization, and efficiency. The combination of these characteristics determines the types of applications in which an antenna can be effectively used. Conversely, if the desired application for an antenna is already known, these characteristics can be used to help select ...

Radio Frequency (Continued....)

Gambar
The transceiver handles the process of converting the low-frequency baseband signal into a higher-frequency RF signal though a process called upconversion. Within the transceiver, an RF carrier signal is generated at the frequency that will be used for the final RF signal. This RF carrier is then combined with the baseband signal to upconvert the low-frequency baseband to the higher RF carrier frequency. Figure 2-2A shows both the low-frequency baseband signal and the RF carrier signal that are used in the upconversion process. Figure 2-2B shows the result of an ideal upconversion where the modulated RF signal is identical to the original baseband signal; except, it is now centered at a much higher frequency. In addition to upconverting outgoing signals, the transceiver also downconverts incoming RF signals to low-frequency baseband signals. The downconversion process is the inverse of the upconversion process. The process of upconverting a modulated baseband signal into a modulat...

RADIO FREQUENCY

Gambar
A basic understanding of the fundamental concepts and theories in RF electronics is an invaluable asset to the wireless hacker. At the end of the day, if your hardware isn't working, then no amount of clever software is going to help. Radio Frequency ( RF) Terminology To start off, let's talk about what is meant by radio frequency or RF. Technically speaking, RF refers to any signal between the frequencies of 3 Hz and 300 GHz. More practically, however, RF refers to signals from about 3 MHz up to 300 GHz. Signals that fall into this range of frequencies are capable of traveling through space in the form of electromagnetic waves. The distance over which these signals can travel depends on factors such as the signal's frequency and atmospheric conditions. Communications Systems The history of wireless communications goes back to the late 1800s when a German physicist by the name of Heinrich Rudolf Hertz first discovered the existence of electromagnetic waves. ...

SUMMARY

D emand for new features and capabilities fuels the growth of wireless networking technologies. Old problems are dealt with and new ones appear. Keeping up-to-date with the latest developments can be a daunting task. This book will help IT professionals understand the new types of threats made possible with wireless technologies, give them the means of identifying the threats, and provide the remediation processes to protect important financial and intellectual assets. One of the goals of this book is to give you a basic understanding of the concepts underlying wireless technology. Various topics will be covered in this book that will help you gain a better understanding of wireless security: the effect of antenna design on radio transmissions, key scheduling methods of encryption algorithms, tools used to probe wireless devices and networks, and methods that can be used to help secure the wireless network infrastructure. As wireless technology improves and the hardwa...

ADVANCES IN WIRELESS SECURITY

Gambar
All is not bleak, however. With the advent of many wireless attack methods, means to counter the attacks and reduce exposure are also available. The evolution of wireless security continues in a cycle IT professionals will recognize from wired network security-a game of cat and mouse. As new weaknesses are found in wireless networks and protocols, new methods and designs are put into place to address them. One of the first efforts at securing 802.11 networks was WEP. The use of RC4 with 40-bit keys was considered sufficient. However, a flaw in the specification regarding the data fed into the RC4 algorithm was found that allowed attackers to derive the secret key used to protect traffic. In order to address that issue, WPA was created. As of this writing, WPA2 is now available for 802.11X networks. Lessons learned from attacks against WEP and WPA, both practical and theoretical, have been applied in the design of WPA2. Other security mechanisms are being developed or have ...

BlogUpp! | the blog: Cross-Posting to Social Networks

BlogUpp! | the blog: Cross-Posting to Social Networks

THE RISKS OF WIRELESS TECHNOLOGIES

Gambar
T he adoption of wireless devices continues to grow as they become more affordable. The rapid spread of wireless technologies among both business and personal systems has improved interoperability and accessibility. However, this very ubiquity has also led to an increase in the number of threats to computer networks. Wireless technologies have given attackers new ways to steal sensitive information, tamper with business processes, and subvert network security enforcement mechanisms. As new threats and attacks are found against wireless networks, they are addressed with changes and additions to the protocols and standards. This book will introduce the basic concepts underlying the evolution of wireless security-the threats, the exploits, and the remediation strategies. Data Interception One attack that must be considered when using wireless technology is the threat of data interception. In data interception, one of the key benefits of wireless technologies also leads to one of its gre...

A BRIEF HISTORY OF WIRELESS TECHNOLOGIES

Gambar
Communications over wireless links have been possible for a very long time. Radios were used for communications in the late 1800s. Guglielmo Marconi demonstrated the transmission of Morse Code over wireless links for the British Post Office in 1897. In 1898, the Russian navy cruiser Africa used a wireless communications device to communicate with operators on shore. Television signals were first broadcast in 1928. The very first visual image sent over television signals was Felix the Cat. Since those times, radio communications have come a long way. Commercial radio stations, television broadcasts, cellular phone networks, satellite data-links, slow-scan amateur video transmissions, baby monitors, Unmanned Aerial Vehicles (UAV), and GPS navigation systems all use wireless technology. The use of encryption in communications is nothing new either. In fact, it's been used for centuries to protect sensitive messages, such as those sent from Caesar to his battlefield generals. The fa...