Quantcast
Channel: Edgis »» Edgis
Browsing latest articles
Browse All 20 View Live

Today the Lights, Tomorrow, The World.

The Internet of things [1] is defined as everyday objects being interconnected and networked. This includes smart-devices such as phones, to appliances like refrigerators that orders groceries online...

View Article


Antennas, Gain and Security

One of the common misconceptions that people tend to have is that higher gain = better. This results in people blindly buying the highest dBi rating omnidirectional antennas they can get their hands...

View Article


Image may be NSFW.
Clik here to view.

Wireless Channel Hopping

Ever wondered how your devices like your laptop get the list of wireless networks available? First of all, you have to understand that at any point of time, a wireless card can only listen to one...

View Article

Image may be NSFW.
Clik here to view.

802.11 network security – Tools of the trade

I thought why not shed some light on the tools that I have been using to play with the WiFi networks around me. Hopefully, we can get gather a collective discussion on what works and what do not and...

View Article

Wi-Fi–Hacking Neighbor From Hell Sentenced to 18 Years – Please do not be one...

A Minnesota hacker prosecutors described as a “depraved criminal” was handed an 18-year prison term Tuesday for unleashing a vendetta of cyberterror that turned his neighbors’ lives into a living...

View Article


Need Privacy?

Sometimes I use Tor when I am hooked up to a Wi-Fi connection or a network which I am not familiar with. Simply because relying only on Wi-Fi encryption to keep your information safe is simply not good...

View Article

Image may be NSFW.
Clik here to view.

Firesheep – The weakest link in security has been, and always will be, the...

I came across this Firesheep article while I reading Crypto-Gram published on 15th July 2011 and thought that this was really interesting. The point to highlight in this article here is not the...

View Article

How would you Classify an APT?

Govware 2011 – Enterprise Security Track I had the privilege to be in one of the sessions conducted by SecureAge in the Enterprise Security track today. What aroused my interest was actually their...

View Article


Creating a WPA wordlist for cracking using JTR (John the Ripper)

John the Ripper is an extraordinary tool that is useful for cracking passwords. First we must understand that using a word list is one of the ways to crack a WPA protected router. Rainbow tables can...

View Article


Image may be NSFW.
Clik here to view.

Netcat – The Swiss Army Knife of Networking

1. Introduction to Netcat Netcat is a network service for reading and writing network connections using either TCP or UDP. It has the ability to create almost any kind of network connections and has...

View Article
Browsing latest articles
Browse All 20 View Live