Orinet. Powered by Blogger.

how to change mac address

Change the physical address of a computer because this happens a few things also, among others:

1. Hide the physical address of the user (hostname), this is usually done so that the activities conducted by the user when the track will make the search, this has been done to make the sniffing activity (see also what the sniffing).
2. To be able to access internet services without repeatedly logging in, the menghandalkan physical address, such as hotspot service using the trial (experiment) for internet access services that are only mengautentikasi physical address only.

How the actions we do when this happens?

In fact sometimes these things happen because we ketidaktauan regulations about what the ITE (Information and Electronic Transaction) of the legal, technology, or use, it later if we do harm other people do not.

From the user this allows many of the factors that deliberately or accidentally, this is because a lot of data that can be used as materials for making such activities (scanning, sniffing, enumerating and Gaining, etc) that should not be done (especially dikampus ) but if the materials for learning or just find out if a network or system that is both in terms of security.

From the Admin can clear this interrupt, if it occurs without the user's rights dapan entrance to the network and this can meyebabkan things like data theft, internet pengkasesan excessive, traffik internet terganggangu etc..

Prefentif action undertaken by the Administration generally,

1. Created with authentication systems (Registration) on every computer that will make access to the network system.
2. Limiting access to both time and bandwidth to specific computers.
3. Make enskripsi authentication with the good.
4. Provides a firewall to protect the system from the network activity that is not fun.
5. Awareness of user activities in the initialization internet.

So how are we to know who can do fun activities that can not be ready for people?
Published: By: all-tech indonesia - 2:22 AM

WEP encryption key (wired equivalent privacy)

Security weaknesses in the WEP encryption key (wired equivalent privacy) the use of various tools that are very popular to penetrate the wireless security system that many scattered on the internet you can find different kinds of forums abroad. to successfully penetrate the system and 64bit encryption 128bit system that only takes 10 to 15 minutes.

Tools pengungkap weakness of WEP encryption running on most Linux operating systems and tools-tols already exists that can run on top of windows, but some tools with the first mengcompilenya that can run on windows.Tools others involved in the network to reveal the weaknesses of which the software is capable of analyze and monitor the wireless network without first logging in to the network. Software-this software usually only support a certain number of cards with a certain type of chipset.

Tools are Airopeek, Airmagnet, Linkferret, CommView for Wifi.Dengan tools featurenya is able to monitor wireless network without the need to connect a client or official of Access Point, also feature tools are able to analyze or monitor the network although the network has implemented a wireless network system menitoring although the wireless network is already equipped with security WEP / Wpa / TKIP, and even more mad that some tools are more able to make attack as Daniel of Service, Man and the midle attack, ARP spoofing Attack, Attack Deauthentication, EAPOL Logoff attack, Deauthentication Flood Attack . Tools-tools like the two blade means depending on the intention of using it, whether used to reveal weaknesses or network security would be a hacker to break?
Published: By: all-tech indonesia - 2:06 AM

free K-mac


Download here :

http://indoupload.net/files/8318/k-mac.zip

http://www.ziddu.com/download/3566784/k-mac.rar.html

With this tool you will be able to change the MAC Address-instant you are and what this means? You can break through Secure MAC Address! Every bribe you out of internet access within 3 minutes, you need to do is change your MAC Address, and make the connection again So what if the Wireless access is made with the protection of others? Such as WEP and WPA/WPA2 Keys Keys? That will be my study time Free Happy Surfing!
Published: By: all-tech indonesia - 4:23 AM

verizon wifi

Verizon Wireless has announced the hotspot portable device that can be used to create a Wi-Fi connection. MiFi, a device created Novatel will provide 3G wireless carrier networks for five gadgets at once, including a laptop, netbook, game device, and camera. Users can mengkoneksikan to Wi-Fi with mobile phone use Verizon as Samsung omnia, but the good news is the user not only limited to the carrier for the handset using Wi-Fi.
Published: By: all-tech indonesia - 4:20 AM

Spider omni wireless antenna

The omni-directional antenna was built using an N-type chassis mount connector with short lengths of stiff fencing wire soldered into each corner hole. The driven element (the wire soldered into the centre, or conductor) was a quarter wavelength (32 millimetres) as was each ground plane (four soldered around the body of the connector). Each groundplane was cut to length and then bent over at 30 degrees below the horizontal to attempt to match the impedance to 50 Ohms.



Published: By: all-tech indonesia - 4:04 AM

eEye Releases Free WiFi Scanner

eEye Digital Security announced the release of its free Retina WiFi Scanner, which is designed to help detect active wireless devices including those which might already be connected to a company's wireless network. The tool produces detailed reports and can be integrated into eEye's REM Security Management Console. The tool is available for Windows platforms in English and Japanese languages, and also in a version that can run on Pocket PCs.
Published: By: all-tech indonesia - 10:20 AM

free SoftPerfect Network Scanner 3.9.193

This is a very useful tool for network admin, very accurate to discovery all machines connected to the network, has many advantages and some facilities. The program pings computers, scans for listening TCP ports and shows what types of resources are shared on a network (including hidden). In addition,it allows you to mount shared resources as network drives, browse them, filter the results list and more. The scanner can also check for a user-defined port, resolve host names and auto-detect your local IP range.


Size: 695KB
OS: Win 9x/ME/NT/2K/XP/2K3
Downloads Now

Features:
  • Pings computers.
  • Does not require administrative privileges.
  • Detects hardware (MAC) addresses even across routers.
  • Detects hidden shared folders (normally invisible on the network) and write accessible shares. Detects your internal and external IP addresses.
  • Scans for listening TCP ports and SNMP services.
  • You can mount and explore network resources.
  • Can launch external third party applications.
  • Exports results to HTML, XML, CSV and TXT.
  • Supports Wake-On-LAN and remote shutdown.
Published: By: all-tech indonesia - 11:18 AM

How to backup driver notebook or computer

How to backup driver from laptop, just a few steps you can backup all drivers in the computer or laptop using the free software, backup is very important if the original CD drivers are missing or damaged. this is some software which can be used to backup computer drivers :

DriverMax 4.92
Size: 2.92MB
OS: Win XP/2003/Vista
Download Now








DriverBackup! 2.0.0
Size: 256KB
OS: Windows XP/Vista
Download Now
Published: By: all-tech indonesia - 10:52 AM