Pages

1.31.2011

Ask and Ye shall receive

A few days ago while verifying my online bank statement with my accounting software, I noticed a small difference in my savings account.  My online banking website noted two small charges for some kind of maintenance fee.  What the hell?  A maintenance fee on my savings account?  The fees were worth more than I would make in interest over a few years.  A little ticked, I contemplated what to to.  I could just sit and be pissed about it, but I decided to call my bank and complain.  The helpful lady who answered the phone quickly reversed the charges and changed my account to a package that didn't have the maintenance fees.  I didn't even have to threaten to take my money to another bank.  She just told me that I had an account with fees and fixed the problems.  Just like that.  The whole ordeal took less than ten minutes including time on hold.  I guess that the banks figure most people will accept the charges without fight, so the people that do call are the ones that get their money back.  Sometimes, all you have to do is ask.

1.30.2011

Diagnosing network problems in Windows

We all have those days where our computers give us nothing but trouble.  Even tech experts are not immune to problems.  Network connectivity issues are among the most common of problems, and are one of the most difficult for mainstream users to fix unaided.  Next time you have a have trouble connecting to the internet, try diagnosing the issue yourself before wasting your time calling tech support.

1.29.2011

Managing multiple email accounts with Thunderbird

If you are like me , then you probably have more than one email account.  And really, who doesn't these days.  You may even have more than one Gmail account, which can be hard to manage unless you have multiple sign in enabled in you Gmail settings.  But by far the easiest way to manage all of your email accounts in one place is with Thunderbird.  Thunderbird is an email client by Mozilla, the makers of Firefox.

Whether you run Windows, Mac or Linux, Thunderbird will work for you.  The newest version of T-Bird makes setting up accounts really easy.  You don't have to enter the name of your email servers anymore.  When you go to make an account, it will ask for your name, email address, and password.  Thunderbird figures out all the rest and finishes setting up you accounts.  It also has a feature called unified folders.  This  lets you view all your in-boxes, sent mail, trash, and archived mail from all your accounts together.  Of course you can still view them separately if you prefer.  Another handy feature of T-bird is the search feature.  Most other email clients have the search buried in some menu, but T-bird puts it right on the main page where it's easy to get to.  You also don't need to choose filters anymore before searching.  And, just like Firefox, Thunderbird has an extensive library of extensions if the vanilla program doesn't do everything you need it to do.  There are lots of extensions which add all sorts of functionality, including calendars, contact management, and news reading.  I use the Zindus contact sync extension to synchronize my contacts back and forth between my Gmail accounts.  This is useful when I have to log into the Gmail website from another computer, because all of my Thunderbird contacts will show up in Gmail.  Of course, these are just a few noteworthy features of Thunderbird, but there are many more.

If you are looking for a better way to read your email, try Thunderbird.   It is available here at Mozilla's website.

1.28.2011

Catalyst 11.1 Drivers now available for ATI/AMD video cards

The long wait is finally over, as AMD has released its new Catalyst 11.1 driver.  This driver brings native Linux support for the Radeon 6xxx series.  Sadly, my card still does not seem to be recognized by the driver properly.  I will have to do some digging in order to find out what is wrong here.  The driver also offers performance improvements on Left 4 Dead 2 on the Radeon 6xxx series under Windows, although I have not been able to confirm this yet.  As soon as I get a reason to boot back into Windows, I will get some performance numbers.  Download the new driver here if you have an ATI/AMD card.

1.26.2011

Strange New Worlds

No, I am not talking about exploring outer space or visiting alien planets.  What I am referring to is the world of open source software, and more specifically, Linux.
I had previously rejected Linux as being a viable replacement for an everyday desktop operation system, but now that I have been using it for a while, I realize just how wrong I was.  Windows fanboys will claim that the average user won't like Linux because the average user does not want to use a command line.  Or because it doesn't run their favorite programs.  The thing is, the average user doesn't have to use a command line, and Linux doesn't have to run their favorite programs.

1.25.2011

Wifi Hacking Part 1: Breaking WEP keys

In a previous post, I mentioned that I would provide tutorials for some of the things I am learning to do.  It has been said that one of the best ways to learn something is to teach it.  Today I will demonstrate how to crack a WEP key for the purpose of gaining access to a WEP protected wireless network.

Note:  This tutorial is intended for educational purposes only.  I do not encourage nor endorse the use of these tools for malicious or illegal use.  Do not go steal your neighbors wifi!

To perform this the operations detailed in this tutorial you will need the following:
  • A compatible wireless adapter.  I use the TP-Link TL-WN321G.  It's only ten bucks and works out-of-the-box with Linux.
  • Aircrack-ng suite--  This comes preinstalled on BackTrack 4, or can be acquired on Ubuntu by typing sudo apt-get install aircrack-ng
  • A wireless network to perform these "attacks" on i.e. one that you own or have permission to use.
  • GNU Macchanger-- also preinstalled on BT4 or can be aquired on ubuntu by typing sudo apt-get install macchanger
  • A computer running some flavor of Linux.  Either the aforementioned Backtrack or ubuntu will work just fine.  Others will also work, but those are the two I have used.

1.22.2011

The Most Powerful Security Tool

Judging from the title of this post, one may presume that I am going to recommend some great new anti-virus software, firewall, or password manager. But that presumption would be incorrect. What most folks do not realize is that the best security tool available is free and can be used by anyone. I am talking about knowledge. The best way to protect yourself and your data is to educate yourself about the tactics used by attackers.

Too many people believe that they are secure just because they have a piece of software installed that said "Protects from viruses and hackers" on the back or the box. The problem here is, that most of the real cyber-security threats today do not exploit computer code, but rather exploit a user's lack of knowledge. It is these social engineering threats that one must be aware of. Scams in the form of phishing emails are the most prominent example of this. Do not click links in emails from people you don't know. Do not click on those "videos" that a "friend" posts on your Facebook wall asking you to download a special video player. I think you get the idea. When in doubt, do not click.

Another extremely dangerous threat and all-too-common threat to the user, is the user itself. Too many times do people use the same password for every website that they create an account at, and too often is it some easily guessable piece of information, such as a pet's name, phone number, or birthday. Creating good strong passwords is an excellent place to start for anyone looking to increase security. For example, anyone who has had their Facebook, YouTube, Myspace, or email accounts hacked, probably used a poor password made of readily available personal information. A good rule of thumb is that any password should be at least eight characters long, and should contain at least one number, punctuation and uppercase letter. Skimping on password strength is the easiest and most surefire way to get yourself "hacked."

Please take this advice into consideration next time you get a strange looking email, or need to create a new online account. Don't expect some piece of software or some company to save your cyber-bacon. Just remember that it is up to you to make sure your digital assets are protected.

1.20.2011

Hacking to Learn

These days the word hacker carries a negative connotation for most people. Whether its a misconception caused by the mainstream media, or an individual's own experience with data theft, most non-geeks think of hackers as being some kind of criminals. While it may be true that there are some hackers out there that use their skills for personal gain, most geeks like myself see hacking in a different way.

For the non-criminal geeks, hacking is something to be taken as a challenge to prove one's skills. Knowing how to crack a WEP key for someone's wireless network can be used for both good and bad. Of course you could leech Wi-Fi from your neighbors, but the opposite argument also applies. You could instead use your skills to show your neighbors that they have a security issue, and that you can fix it for them. That is the essence of offensive security. In order to be able to defend a system from penetration, one must know what that system's vulnerabilities are. Consider this. Most people believe that their houses are secure, but if locked out of their own houses, could probably find a way in. The same principle applies to network security.

I have taken it upon myself to learn this other side of security, and have been coming along with it within the last few weeks. I have already learned how to crack WEP using aircrack-ng on Linux and am currently tackling WPA cracking. If you are a geek and have an interest in learning these tools, I encourage you to use them for good. Backtrack 4 is the best way to start, as it contains almost every cracking, hacking, and penetration tool one would ever need. Please don't hack anyone's networks without permission, or sniff passwords at a coffee shop, because both of these could land you some jail time.

I will write follow-up articles, and possibly tutorials on how to use these tools, so please continue to follow my blog if you are interested.