+plus+ Posted January 9, 2012 Author Share Posted January 9, 2012 Quote Link to comment Share on other sites More sharing options...
+plus+ Posted January 9, 2012 Author Share Posted January 9, 2012 Quote Link to comment Share on other sites More sharing options...
+plus+ Posted January 9, 2012 Author Share Posted January 9, 2012 Quote Link to comment Share on other sites More sharing options...
+plus+ Posted January 9, 2012 Author Share Posted January 9, 2012 Quote Link to comment Share on other sites More sharing options...
ih8juggalos Posted January 9, 2012 Share Posted January 9, 2012 1 Quote Link to comment Share on other sites More sharing options...
+plus+ Posted January 9, 2012 Author Share Posted January 9, 2012 1 Quote Link to comment Share on other sites More sharing options...
McLovin Posted January 9, 2012 Share Posted January 9, 2012 How To Make Baked Potatoes Quote Link to comment Share on other sites More sharing options...
+plus+ Posted January 9, 2012 Author Share Posted January 9, 2012 thats what im talkin aboot buckfast tonic wine However, according to Alex Riley's Britain's Really Disgusting Drinks, the "green bottle" Buckfast contains the caffeine normally contained within six cups of coffee. The series also mentions that drop for drop, Buckfast has more caffeine than Red Bull.[18] Buckfast contains 15% alcohol in the 750 ml green-bottled UK version, and 14.8% in the brown-bottled Republic Of Ireland version. That equates to 11.25 units (UK) of ethanol. Quote Link to comment Share on other sites More sharing options...
+plus+ Posted January 9, 2012 Author Share Posted January 9, 2012 otherwise known as wreck the hoose juice the real four loko for all you ukfags and irefags Quote Link to comment Share on other sites More sharing options...
MOOGLE? Posted January 10, 2012 Share Posted January 10, 2012 http://www.instructables.com/id/Build-a-Nintendo-NES-PC/ Quote Link to comment Share on other sites More sharing options...
MOOGLE? Posted January 10, 2012 Share Posted January 10, 2012 papercraft http://en.wikipedia.org/wiki/Paper_model http://www.thecoolist.com/papercraft-perfection-10-amazing-master-origami-artists/ http://abduzeedo.com/fantastic-papercraft-design http://craziestgadgets.com/2010/11/19/3d-super-mario-papercraft-magnet-board/ http://myhobbycraft.blogspot.com/2012/01/wwii-german-luftwaffe-bomber-sb.html 1 Quote Link to comment Share on other sites More sharing options...
Seph Posted January 11, 2012 Share Posted January 11, 2012 http://dailyinfographic.com/ Quote Link to comment Share on other sites More sharing options...
Soup forgot his password Posted January 11, 2012 Share Posted January 11, 2012 wonk Quote Link to comment Share on other sites More sharing options...
Fist 666 Posted January 11, 2012 Share Posted January 11, 2012 ha. i had the same thing a few days ago in teh nonsense thread. Quote Link to comment Share on other sites More sharing options...
MOOGLE? Posted January 12, 2012 Share Posted January 12, 2012 Wireless Catcher converts WiFi signals into music Ok well maybe it isn't quite music, but it certainly sounds interesting. Created by Yoshi Akai, the Wireless Catcher is a sort of analog synthesizer that detects nearby WiFi signals and outputs a sound that varies according to the strength and direction of that signal. It's almost reminiscent of a theremin in how it created tones without any visible vibration or physical contact. Besides being one of the most unusual noise-makers you'll ever come across, the Wireless Catcher is quite a looker as far as gadgets go. Decorative etchings adorn Yoshi's brass and copper creations transforming them into amazing works of art. The Wireless Catcher is no exception. http://www.gizmag.com/wireless-catcher-wifi-signals-music-yoshi-akai/14391/ And What If WiFi Networks Were Visible? Timo Arnall, Jørn Knutsen and Einar Sneve Martinussen built a rod of flashing lights, which works as a device to measure WiFi signal strength. I have seen many WiFi-measuring gadgets, like, for instance, very cool T-Shirts, but none of them was used with such a huge breadth. The rod is 4 m tall and has 80 LEDs running through its length (the more LEDs flashing, the stronger is the signal). Despite the fact that it looks like a fence on the video, actually it’s just the single rod. The amazing effect was achieved through long-exposure photography and a few weeks of walking, measuring and photographing a part of Oslo, the capital of Norway, in December 2010. The project is called “Immaterials: light painting WiFi“. http://walyou.com/visible-wifi-network-project/ http://yourban.no/2011/03/07/making-immaterials-light-painting-wifi/ http://www.nearfield.org/2011/02/wifi-light-painting Quote Link to comment Share on other sites More sharing options...
MOOGLE? Posted January 12, 2012 Share Posted January 12, 2012 http://arstechnica.com/business/news/2012/01/hands-on-hacking-wifi-protected-setup-with-reaver.ars WiFi hacking has long been a favorite pastime of hackers, penetration testers, and people too cheap to pay for their own Internet connection. And there are plenty of targets out there for would-be hackers and war drivers to go after—just launch a WiFi scanner app in any residential neighborhood or office complex, and you're bound to find an access point that's either wide open or protected by weak encryption. Fortunately (or unfortunately, if you're the one looking for free WiFi), those more blatant security holes are going away through attrition as people upgrade to newer routers or network administrators hunt down vulnerabilities and stomp them out. But as one door closes, another opens. Last week, security researchers revealed a vulnerability in WiFi Protected Setup, an optional device configuration protocol for wireless access points. WPS lets users enter a personal identification number that is hard-coded into the access point in order to quickly connect a computer or other wireless device to the network. The structure of the WPS PIN number and a flaw in the protocol's response to invalid requests make attacking WPS relatively simple compared to cracking a WiFi Protected Access (WPA or WPA2) password. On December 28, Craig Heffner of Tactical Network Solutions released an open-source version of an attack tool, named Reaver, that exploits the vulnerability. To find out just how big the hole was, I downloaded and compiled Reaver for a bit of New Years geek fun. As it turns out, it's a pretty big one—even with WPS allegedly turned off on a target router, I was able to get it to cough up the SSID and password. The only way to block the attack was to turn on Media Access Control (MAC) address filtering to block unwanted hardware. My target was a Cisco Linksys WRT54G2 Wireless-G Broadband Router, an older but fairly common residential WiFi router. The PIN for the router is printed on the bottom, along with its MAC address; in WPS mode, a computer can use that PIN to retrieve the network configuration information without the user having to worry about remembering a long password or otherwise mess with the router's administrative interface. Normally, to get the PIN, you'd need to have physical access to the router. For my attack platform, I used an aging Toshiba Satellite A135 running Ubuntu 11.10. In order to compile Reaver, I also had to install libpcap, the network traffic capture library, through Ubuntu's Software Center. With libcap configured, Reaver compiled without a hitch, and it was time to start beating on the door. The first step in mounting an attack on a WiFi router is to identify the target's MAC address. While I was able to read it right off the router, the address was also easy to grab using a WiFi scanning application. (The scanner also revealed that most of my neighbors' WiFi networks were also potentially vulnerable to Reaver, or that they were still running older routers using only WEP security—and some had no security in place at all.) With the MAC of my target recorded, I prepared to unleash Reaver. Before launching a brute-force PIN hacking effort with Reaver, the attack platform's wireless adapter needs to be put into "monitor" mode. In Linux, that's done from the command line using ifconfig (an interface configuration tool) and iwconfig (which controls the configuration of wireless interfaces); both need to be run as the root user. After making sure I was disconnected from any other WiFi network, I went into an Ubuntu terminal window and entered: sudo ifconfig wlan0 down sudo iwconfig wlan0 mode monitor sudo ifconfig wlan0 up With the wireless adapter now ready to perform packet capture, I launched Reaver. The open-source version of Reaver is a command-line tool; Tactical Network Solutions also sells a commercial version that includes a Web-based client and software support. While I used version 1.2 of Reaver, a 1.3 version was released on January 3, and it can speed up attacks. It does so by reducing the size of the "secret number" used to create the shared encryption key used to pass requests—this cuts the crypto workload on the access point and reduces the time needed between attempts. Reaver only requires two inputs to launch an attack: the interface to use to launch them, and the MAC address of the target. Because it accesses the wireless adapter directly, it needs to be run as root: sudo reaver -i wlan0 -b 00:01:02:03:04:05 I went with this default approach, but there are a number of other parameters that can be used to tweak the attack for different routers, such as setting the tool to pause when the access point stops responding, and adding a response back to the access point to clear out failed attempts (this is not required by most routers). The results: Sean Gallagher The attack took about six hours to properly guess the PIN and return the SSID and password for the target network. During that time, the router locked up once under load, as I was putting normal levels of network traffic through it from other devices. Some routers will also lock out WPS requests for five minutes or so when they detect multiple failed PIN submissions—mine stopped responding occasionally, generating a string of warnings, but Reaver picked back up where it left off once the Linksys started responding again. Having demonstrated the insecurity of WPS, I went into the Linksys' administrative interface and turned WPS off. Then, I relaunched Reaver, figuring that surely setting the router to manual configuration would block the attacks at the door. But apparently Reaver didn't get the memo, and the Linksys' WPS interface still responded to its queries—once again coughing up the password and SSID. The tool also managed to repeatedly cause the router to stop responding to other computers on the network, essentially creating a denial of service attack—a great thing to remember for the next time my neighbors have a loud, all-night Call of Duty session. In a phone conversation, Craig Heffner said that the inability to shut this vulnerability down is widespread. He and others have found it to occur with every Linksys and Cisco Valet wireless access point they've tested. "On all of the Linksys routers, you cannot manually disable WPS," he said. While the Web interface has a radio button that allegedly turns off WPS configuration, "it's still on and still vulnerable." MAC filtering doesn't help either— that's "easily circumvented," he said. All an attacker has to do is use a network monitoring tool to detect the MAC address of a system that has an existing connection to the router, and set that as the address of their attack platform. Six to eight hours seems like a lot of time to spend trying to hack into someone's residential WiFi. But considering how many small and medium-sized businesses use access points like the Linksys—and the kinds of data that could be exposed by gaining access to the computers on even the average home network—there's plenty of potential damage to be done by those who run the tool, or something similar of their own devising. And the attack could be carried out unattended, using a device left near the target network and controlled remotely. The bottom line is that, while WPS was designed for simple security, there is no such thing as simple security. The only way to be absolutely sure that someone can't gain access to your wireless network with the WPS hack is to make sure you use a router that doesn't support the protocol. Quote Link to comment Share on other sites More sharing options...
tae Posted January 13, 2012 Share Posted January 13, 2012 A friend an I managed to get through five of these one night. MAYHEM ENSUED Quote Link to comment Share on other sites More sharing options...
+plus+ Posted January 14, 2012 Author Share Posted January 14, 2012 HOLLYEWESHIT haha i need to get my hands on that stuff Quote Link to comment Share on other sites More sharing options...
McLovin Posted February 3, 2012 Share Posted February 3, 2012 How to Multiply Your Money with Compound Interest Good stuff $$$ How to Multiply Your Money with Compound Interest $$$ Quote Link to comment Share on other sites More sharing options...
Fist 666 Posted February 3, 2012 Share Posted February 3, 2012 not that i disagree with the merit of saving, but if you could direct me to a savings account where i can get 10% interest i would appreciate it greatly. Quote Link to comment Share on other sites More sharing options...
ih8juggalos Posted February 4, 2012 Share Posted February 4, 2012 Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.