memberi password pada hotspot kita ikuti panduan di bawah ini. 1. Yang pertama kamu harus login dulu ke AP router, silahkan masukkan IP routernya pada browser, kemudian masukin username dan password yang kamu gunakan untuk akses ke AP router. Kemudian setelah berhasil masuk, silahkan klik pada tombol Wireless –> wireless settings 2. Kemudian cara tulisan Enable Wireless Security, beri centang di samping kanannya. kemudian pada kolom ecurity type pilih WEP, security Option pilih Automatic, WEP key format pilih ASCII, pada key Type pilih 128 bit, kemudian pada WEP key masukkan password yang ingin kamu gunakan (harus diisi sebanyak 13 karakter). Jika sudah diisi semua, klik pada tombol Save 3. Setelah kamu klik pada tombol Save nanti akan muncul pemberitahuan seperti gambar di bawah ini. Ketika komputer akan memutuskan dan menyambungkan kembali jaringan hostpot. Jika nanti icon wireless di pojok kiri bawah bertanda limited (ada tanda seru), sebaiknya didisconet dulu, kemudian baru diconnectkan lagi, nanti akan muncul permintaan Network key. masukkan network key (password) yang kamu buat sebanyak 13 karakter tadi, jika networkey nya benar, koneksi akan bisa disambungkan. ya begitulah cara memberikan password atau network key pada hotspot, jadi yang bisa mengakses internet via hotspot kamu yang mereka yang tau password atau network keynya. selamat mencoba
Pastinya Sobat pernah denger dong dengan Anti Virus yang satu ini. Karena sebelumnya software ini hadir dengan versi 4.8 dan kini melaunching versi terbarunya, yaitu versi 4.9. Kelebihan dari SpyHunter 4.9.11.3987 Full Patch ini, dia dilengkapi dengan System Guard yang nantinya Sobat dapat menentukan System mana yang akan Sobat Turn Off. Fungsinya untuk melidungi System Sobat dari pengguna lain yang tidak diinginkan. Untuk kemampuannya membasmi Malware yang berkeliaran tak perlu diragukan lagi, Sob. Karena di versi terbaru ini, SpyHunter 4.9.11.3987 Full Patch sudah mampu membaca dan membasmi sekitar 561218 jenis Malware. Untuk Data Base, software ini baru memperbaruinya bulan Juni ini.
NB: SpyHunter 4.9.11.3987 ini bukan Antivirus utama, jadi kemungkinan kompatible dengan Antivirus yang Sobat gunakan sekarang. Saya sudah tes pada kompi saya sendiri dengan Antivirus Microsoft Essential dan baik baik saja. Untuk Antivirus yang lain, silahkan dicoba sendiri ya... :) Dan kami tidak bertanggung jawab jika terjadi bentrok atau yang lainnya.
Norton AntiVirus - adakah dari anda yang tidak kenal dengan anti virus besutan Symantec Corporation ini. Saya kira semua sudah tahu tentang anti virus yang tahun lalu peringkatnya sangat buruk dalam 10 besar anti virus terbaik di dunia. Tapi untuk tahun ini Norton sendiri menempati peringkat ke 3. Ini membuktikan bahwa norton telah mengalami perubahan yang cukup signifikan dan tentunya menjadi lebih baik. Seiring dengan hal tersebut, harga dari Norton pun naik hingga $ 39.99 dari harga sebelumnya yang hanya dibandrol dengan harga $ 29.35. Tapi hal itu wajar terjadi, karena pelayanan yang di berikan pun sangatlah memuaskan. Tapi sobat tidak perlu khawatir, karena disini ini anda bisa mendapatkan dengan cuma-cuma. Tapi mengingat ini adalah barang yang lumayan mahal, proses aktivasinya pun juga sedikit rumit. Tapi anda tidak perlu khawatir, karena nanti akan saya kasih cara installnya dengan jelas. Lebih baik langsung di download saja, jika ingin komputer kesayangan anda tetap aman terlindungi dari serangan virus.
Ashampoo WinOptimizer - adalah sebuah software tweaking yang dapat membantu anda dalam hal menjaga kinerja dan performa PC/laptop anda. Sebenarnya ada banyak software semacam ini, tapi untuk besutan Ashampoo ini telah banyak yang membuktikan kinerjanya dan terbukti ampuh dalam menjaga kinerja PC agar tetap prima dan selalu dalam kondisi terbaiknya. Cara kerja software ini tentunya adalah dalam hal membersihkan sampah-sampah pada system yang kadang membuat program yang kita jalankan crash dan sebagainya. Tapi tenang saja software ini akan membantu masalah anda.
Dynasty Warriors 7 with Xtreme Legends JAP RiP MediaFire Links Shin Sangoku Musou 6 with Moushouden RiP RaS
Based on the epic novel, Romance of the Three Kingdoms, the genre-defining Dynasty Warriors series depicts the massive battles ignited by the fall of the Han Dynasty when three rebellious states moved to overthrow the Emperor of China. Incredible might and power of warriors is born again in this seventh chapter of the dynasties with Shu, Wei, Wu and the new Kingdom of Jin, the state that superseded the Three Kingdoms period. Dynasty Warriors 7 will embrace new technology with full stereoscopic 3D. Xtreme Legends super-charges the Dynastsy Warriors 7 world with features such as Legend Mode and Challenge Mode as well as three new playable generals.
Recommended system requirements:
CPU: Intel Core2Duo 2.4GHz or equivalent Operating system: Windows XP SP3/Vista/7 Memory: 1 GB Hard drive: 13 GB to free space Display with 1280 × 720, High Color Video Card: 256 MB of memory Sound card with DirectX 9.0c.
Ripped by: ras Ripped: Low quality movies Language: Japanese Size: 5.38 GB
Bagi penggemar Angry Birds pastinya sudah tidak asing denngan babi-baji hijau yang menjadi target para burung pemarah tersebut. Namun kini, babi-babi hijau tersebut sepertinya ingin membalas dendam. Rovio, selaku pengembang Angry Birds, memunculkan kembali kawanan babi ini dalam game terbarunya, Bad Piggies. Pada permainan 'Babi Jelek' ini kita dituntut untuk membangun sebuah kendaraan bagi para babi dengan menggunakan berbagai material seperti boks atau roda. Kendaraan ini digunakan untuk meluncur, menghindari rintangan, dan mengambil objek sepanjang lintasan.
Selamat sore sobat . Kali ini saya akan posting Anti Virus yaitu : Smadav Pro 9.0.1 Full Keygen. Smadav adalah anti virus lokal yang di khususkan untuk mengatasi virus–virus lokal atau pun mancanegara yang menyebar luas di Indonesia. Pada versi kali ini Smadav Pro 9.0.1, dan pastinya ada perubahan dalam penambahan database sebanyak sekitar 890 virus baru dan juga perbaikan bugs. Bagi sobat yang mau update anti virus lokal ini, Silahkan download...
Mungkin tutorial ini sudah banyak beredar di internet tapi it's oke lah mungkin masih banyak dari kalian yang masih bingung jadi saya akan mencoba memberikan tutorialnya step by step kawan persis seperti yang saya lakukan, kalo saya saja bisa kenapa kalian ga bisa? :D
Langsung ke pokok masalah, User Online ini banyak digunakan dan cukup populer di kalangan blogger. Tujuan pemakiannya ya bermacam - macam mulai dari yang memang ingin memberikan informasi tentang user yang OL di situs tersebut, hanya untuk pelangkap sampai mungkin ada yang cuma ingin pamer karena situs nya sudah ramai dan banyak yang OL.hhaha hush ga baik suuzon, bulan puasa ni.hhaha :p Kalo saya pribadi pasang karena emang ingin tahu berapa banyak yang mampir ke blog ini dan dan sebagai pelangkap aja sih..hhoho kalau pamer egag lah blog ini kan masih ecek-ecek.hhaha :p
Nah kenapa disini saya pilih who's among us?yang paling utama memang pemasangannya yang mudah dan tidak perlu registrasi jadi tidak perlu repot kawan. Oke langsung saja ini dia cara masang widget user online :
Pilih dulu widget yang kalian inginkan. klik di sini
di sini ada 5 jenis widget yang bisa kalian pilihtergantung selera kalian, di sini saya memilih "the tab widget" sebagai contoh. Kalian bisa setting letak widget di tempat yang kalian inginkan.
cukup klik script yang tersedia, maka akan otomatis tercopy
Kemudian loggin ke blogger kalian, masuk pada Template, Edit HTML, Lanjutkan, centang "expand widget"
Kemudian paste script tersebut di bawah kode ]]></b:skin>
Simpan
Selesai
Nah itu dia cara pasangnya, noh jadi kan..tambah keren aja nih blog kesayanganku.hhaha :D Buat yang mau komen dan share info atau yang belum paham monggo dipersialakan komen. Semoga bermanfaat
Wondershare Video Converter Ultimate 5.7.0.4 adalah sebuah software yang berfungsi untuk mengkonvert video kedalam berbagai macam format video lain, bahkan bisa ke format audio juga. Dan menurut saya software ini adalah software video converter yang paling bagus soalnya saya sendiri memakai ini.
Wondershare Video Converter Ultimate is surprisingly easy and amusing for family media enjoyment, by allowing you to merge multiple files into one file, to clone a file, to clip one file into multiple segments, to trim the file length, to crop video, to adjust video effect, to edit either text or image watermark, to add subtitle, to set video and audio output settings, to capture images from video/DVD files, to customize DVD menu and so on.
Upgrade any 2D video to 3D with ease: • Convert any normal video to 3D with ultrafast speed, for truetheater entertainment at home. Leave the expensive 3D theater ticket away right now! • Support to create 3D video files for sharing on YouTube 3d movie channel with the preset for YouTube offered. • Compatible with different 3D media players available for playback of 3D video in 3D MKV, 3D MP4, 3D AVI, and 3D WMV. • Capable of kinds of 3D enjoyment whatever you have polarization glasses, shutter technology, or anaglyph 3D glasses.
Enjoy videos any way you like: • Convert any video in AVI, TIVO, WMV, MP4, MKV, FLV, 3GP, MPG etc., for playback on Apple devices, mobile phones, game players etc. • Import videos to any popular applications like Windows Media Player, Windows Movie Maker, iTunes, Adobe Premiere Pro, etc. • Convert HD videos, camcorder videos, DRM protected videos, and YouTube videos, etc. to common video formats.
Extraordinary DVD experience anywhere: • Rip DVD movies to videos in MP4, MPG, WMV, 3GP, FLV, etc. for playback on iPad/iPhone/iPod/Windows Media Player and more. • Burn any video in different formats to DVD disc, DVD folder, or ISO files with free provided DVD menu templates to make your DVD unique.
Video entertainment online and offline: • Work as an web video downloader to download videos to PC from any video sharing site such as YouTube, Google, Yahoo and so on. • Record videos on website with the newly screen capture function. • Convert downloaded videos to any formats for enjoyment on portable devices or applications like iPad, iPhone 4, iPod touch 4, Windows Phone 7 etc.
Directly transfer media files to portable devices: • Intelligently recognize connected USB devices such as iPod, iPhone, Blackberry, etc. • Transfer converted DVD movies, videos and audios to iOS devices without iTunes. • Directly import files from USB devices like mobile phones and camcorders for converting and editing.
Last week's feature explaining why passwords are under assault like never before touched a nerve with many Ars readers, and with good reason. After all, passwords are the keys that secure Web-based bank accounts, sensitive e-mail services, and virtually every other facet of our online life. Lose control of the wrong password and it may only be a matter of time until the rest of our digital assets fall, too.
Take, for example, the hundreds of millions of WiFi networks in use all over the world. If they're like the ones within range of my office, most of them are protected by the WiFi Protected Access or WiFi Protected Access 2 security protocols. In theory, these protections prevent hackers and other unauthorized people from accessing wireless networks or even viewing traffic sent over them, but only when end users choose strong passwords. I was curious how easy it would be to crack these passcodes using the advanced hardware menus and techniques that have become readily available over the past five years. What I found wasn't encouraging.
First, the good news. WPA and WPA2 use an extremely robust password-storage regimen that significantly slows the speed of automated cracking programs. By using the PBKDF2 key derivation function along with 4,096 iterations of SHA1 cryptographic hashing algorithm, attacks that took minutes to run against the recent LinkedIn and eHarmony password dumps of June would require days or even weeks or months to complete against the WiFi encryption scheme.
What's more, WPA and WPA2 passwords require a minimum of eight characters, eliminating the possibility that users will pick shorter passphrases that could be brute forced in more manageable timeframes. WPA and WPA2 also use a network's SSID as salt, ensuring that hackers can't effectively use precomputed tables to crack the code.
That's not to say wireless password cracks can't be accomplished with ease, as I learned firsthand.
I started this project by setting up two networks with hopelessly insecure passphrases. The first step was capturing what is known as the four-way handshake, which is the cryptographic process a computer uses to validate itself to a wireless access point and vice versa. This handshake takes place behind a cryptographic veil that can't be pierced. But there's nothing stopping a hacker from capturing the packets that are transmitted during the process and then seeing if a given password will complete the transaction. With less than two hours practice, I was able to do just that and crack the dummy passwords "secretpassword" and "tobeornottobe" I had chosen to protect my test networks.
BROTHER, CAN YOU SPARE A DEAUTH FRAME?
To capture a valid handshake, a targeted network must be monitored while an authorized device is validating itself to the access point. This requirement may sound like a steep hurdle, since people often stay connected to some wireless networks around the clock. It's easy to get around, however, by transmitting what's known as a deauth frame, which is a series of deauthorization packets an AP sends to client devices prior to it rebooting or shutting down. Devices that encounter a deauth frame will promptly rejoin an affected network.
Using the Silica wireless hacking tool sold by penetration-testing software provider Immunity for $2,500 a year, I had no trouble capturing a handshake established between a Netgear WGR617 wireless router and my MacBook Pro. Indeed, using freely available programs like Aircrack-ng to send deauth frames and capture the handshake isn't difficult. The nice thing about Silica is that it allowed me to pull off the hack with a single click of my mouse. In less than 90 seconds I had possession of the handshakes for the two networks in a "pcap" (that's short for packet capture) file. My Mac never showed any sign it had lost connectivity with the access points.
I then uploaded the pcap files to CloudCracker, a software-as-a-service website that charges $17 to check a WiFi password against about 604 million possible words. Within seconds both "secretpassword" and "tobeornottobe" were cracked. A special WPA mode built-in to the freely available oclHashcat Plus password cracker retrieved the passcodes with similar ease.
IT WAS THE NEIGHBORLY THING TO DO
Cracking such passcodes I had set up in advance to be guessed was great for demonstration purposes, but it didn't provide much satisfaction. What I really wanted to know was how much luck I'd have cracking a password that was actually being used to secure one of the networks in the vicinity of my office.
So I got the permission of one of my office neighbors to crack his WiFi password. To his chagrin, it took CloudCracker just 89 minutes to crack the 10-character, all-numerical password he used, although because the passcode wasn't contained in the entry-level, 604 million-word list, I relied on a premium, 1.2 billion-word dictionary that costs $34 to use.
My fourth hack target presented itself when another one of my neighbors was selling the above-mentioned Netgear router during a recent sidewalk sale. When I plugged it in, I discovered that he had left the eight-character WiFi password intact in the firmware. Remarkably, neither CloudCracker nor 12 hours of heavy-duty crunching by Hashcat were able to crack the passphrase. The secret: a lower-case letter, followed two numbers, followed by five more lower-case letters. There was no discernible pattern to this password. It didn't spell any word either forwards or backwards. I asked the neighbor where he came up with the password. He said it was chosen years ago using an automatic generation feature offered by EarthLink, his ISP at the time. The e-mail address is long gone, the neighbor told me, but the password lives on.
No doubt, this neighbor should have changed his password long ago, but there is a lot to admire about his security hygiene nonetheless. By resisting the temptation to use a human-readable word, he evaded a fair amount of cutting-edge resources devoted to discovering his passcode. Since the code isn't likely to be included in any password cracking word lists, the only way to crack it would be to attempt every eight-character combination of letters and numbers. Such brute-force attacks are possible, but in the best of worlds they require at least six days to exhaust all the possibilities when using Amazon's EC2 cloud computing service. WPA's use of a highly iterated implementation of the PBKDF2 function makes such cracks even harder.
Besides changing the password every six months or so and not using a 10-digit phone number, my neighbors could have taken another important step to improve their WiFi security. WPA allows for passwords with 63 characters in them, making it possible to append four or five randomly selected words—"applesmithtrashcancarradar" for instance—that are easy enough to repeat to guests who want to use your wireless network but are prohibitively hard to crack.
Yes, the gains made by crackers over the past decade mean that passwords are under assault like never before. It's also true that it's trivial for hackers in your vicinity to capture the packets of the wireless access point that routes some of your most closely held secrets. But that doesn't mean you have to be a sitting duck. When done right, it's not hard to pick a passcode that will take weeks, months, or years to crack.
With odds like that, crackers are likely to move onto easier targets, say one that relies on the quickly guessed "secretpassword" or a well-known Shakespearean quote for its security.
This is all well and good, but one thing to keep in mind: if you have WiFi Protected Setup (WPS) enabled on your router (and you likely do if you bought a router in the past 4-5 years), it makes no difference how long or complex your WPA/WPA2 passkey is. If it is enabled, WPS can be easily cracked within 24 (or less in many cases) hours by breaking down the 8-character PIN into 2 halves, and cracking those halves. The 8th digit is actually a checksum of the first 7, so really you only have to guess the first 7. This amounts to 11,000 (!) possible combinations. Once cracked, your program of choice can request the full, unencrypted, plaintext WPA/WPA2 passkey, without ever having to touch it.
Oh, and this can all be done with free, open-source, readily available software, and requires very little hardware power.
Edit: Also, looking at the screen cap of the list of APs - many of them show WPS(ON). This makes an even stronger case for WPS cracking, as it takes less time, and you don't have to buy expensive software or spend lots of money on renting out EC2 servers to crack the WPA passkey.
Last edited by awuwish on Tue Aug 28, 2012 10:12 am
I use multi-syllable words, but between each syllable I'll add a symbol. Then I'll follow up with some numbers. Probably not the most secure, but at least I can remember it.
Worst part is I've lived at a house where my landlord had an old lappy that was built during the integrated wifi WEP days. I downgraded the router to use WEP security, but the longest 26 char password. We live right on the corner of 2 main streets w/ a bus stop outside the wall of our backyard no less. I figured someone at the bus stop could have hacked into our router long ago. I'm moving soon. Gonna be glad to be away from WEP encryption.
While I understand the situation you were in; using a 26 character password did nothing to help you. WEP's issue is the intialization vector (IV) for each encrypted frame is only 16bits (IIRC) long. That means that after 2^16 uniquely encrypted frames you will have a frame that re-uses the IV. That in turn makes it very easy to get two frames (or more, usually many more) that used the same IV. From there it's a fairly trivial set of cryptanalysis techniques to identify the "master" key used to generate the encryption given the IV those frames used.
Quote:
To avoid looking like a COMPLETE noob, I did setup the router to only allow the specific MAC addresses for the devices we used.
MAC filtering is pointless. It's too easy to identify the MAC address of "allowed" devices and spoof the AP/Router by using one of those as "your" MAC.
Thanks for an informative and well written piece IMHO.
As for the free versus pay for software. It's an irrelevance like security through obscurity, yes free software is likely to be good at this, yes an attacker is likely to not care about ease of use if they do this on a larger scale.
P.S. Regardless of the number of sentences, words or characters devoted to free software that can do this I found it abundantly clear that there were free alternatives and they could perform the same or similar functions.
MAC address filtering does not add security to a wireless network. It's useful to create an access control list if you are using a shared password among many people (say, at a business) and you don't want them to connect their IPad, IPhone, laptop, etc. all to the company network. Against an actual hack attempt though, it adds no security.
That's not necessarily true. On my wireless router I can configure the MAC filter as a whitelist or a blacklist. I have it configured as a whitelist, so unless I've logged into the router and put your MAC in, you can't get a connection to the wireless. At all.
I suspect this configuration is giving you a false sense of security, since it's trivial for me to read the MAC address of a machine that's already connected to your network and then spoof it and connect using my own computer.
Can anyone tell me why this wouldn't be possible?
You are right about the false sense of security. The MAC address is in the captured packets. Spoofing a Mac address is as easy as capturing the packets. all you need is a an application and a card with promiscuous mode.
You may want to check the free application Wireshark for capturing packets :
I have no doubt that someone with enough time and ambition could crack my home network. Believing otherwise is just foolish. But by not broadcasting the SSID, adding MAC filtering, disabling remote administration of the router, using WPA-2, using a unique character string for the network name, and strong passwords for both the network and the router, I'd like to think that it will deter 99% of people.
Your reccomendations are without value:
- not broadcasting the SSID = no difference, any war-driving stumbler application will display all SSID - MAC filtering = no difference, to siff packet, you need a promiscuous network card, which is also the requirement for sppofing MAC - disabling remote adminsitration= no difference, because the hacker is in the internal network, he/she is accessing the administration from the internal network - WPA-2 = only a difference vs. WEP, WPA-2 with less than 8 characters from an extended character set is crackable in a VERY short time - using a unique character string for the network name: used to make a difference because it prevented the sue of rainbow tables, no longer useful because bruteforcing has been gigantic leap with GPU-assisted password cracking - strong passwords for both the network and the router: duh !!!
Please note that implementing long response time or lock-down after too many attempts have 2 weaknesses: - open the door to DOS attack - cracking can be made offline against a dictionnary or by bruteforce
Even then, most consumer-level routers allow MAC address filtering, or doling out a specific number of DHPC addresses to further limit the devices that can attach to the network. Sure, they're not usually set by default, but it's simple to set up.
Sadly, it's even simpler to take the lazy way out and not mention that these ARE valid methods of enabling additional security on Aunt Helen's router.
There are tools that can spoof MAC addresses, so by enabling MAC address filtering on Aunt Helen's router will not make it 100% secure. If someone wants access to it, they will get it