Skip to main content

Posts

Showing posts from September, 2012

Hack lets Google Nexus 7 capture 720p video

Your Google Nexus 7 tablet may not have a rear-facing camera, but with a little technical know-how it appears you can get the slate's 1.2 megapixel front-facing camera to capture high-definition video. A user named "hillbeast" in the XDA Developers forum recently posted a quick how-to guide to get your Nexus 7 recording 720p video at 30 frames per second. Hillbeast also posted two videos to YouTube, which hillbeast says, contrasts the Nexus 7 recording video at 480p and 720p resolutions. Hillbeast's post on XDA was first reported by Pocketnow. The two YouTube videos (included at the bottom of this post) show a substantial difference in capture quality. The 720p version enables you to see far more detail and colors are more vibrant. While there was no way to immediately verify these claims, it appears the 720p mod is the real deal; the code has been merged into the Jelly Bean version of Cyanogenmod currently under development. Cyanogenmod is an after-market v

How To Hack WPA2 Wireless Access Points

Many of you have probably seen plenty of tutorials on how to crack WEP encryption. We even did a video back in the old Bauer-Power podcast on how to hack a WEP protected wireless access point using Bauer-Puntu Linux and GrimWEPA. The fact of the matter is, cracking WEP is really easy! What about something more people are using today like WPA2? It used to be that the only way to crack WPA or WPA2 was to capture the 4 way handshake, then try to  brute-force the password. If the person's password is really long, then it would take an attacker way too long to try to crack it and they would probably move on to easier targets. That isn't necessarily the case now. There is a new tool for Linux called Reaver. From their Google Code Page: Reaver implements a brute force attack against Wifi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases.  Reaver has been designed to be a robust and practical attack against WPS, and has been tested against a

Former Hacker Reveals How Business Owners Should Protect Their Web Sites

Mitnick was wanted for computer hacking — he bypassed security systems in organizations such as Motorola, Sun Microsystems, Pacific Bell and the FBI themselves — and he served five years in prison. Today, he owns a security consulting firm called Mitnick Security. As a computer security consultant, Mitnick works with companies to prevent them from intruders like his former self. Below is a lightly-edited transcript of our conversation: Should businesses spend money on employing security consultants? Businesses should absolutely set aside funding in their budgets for security consultants. What happens with smaller businesses is that they give in to the misconception that their site is secure because the system administrator deployed standard security products — firewalls, intrusion detection systems, or stronger authentication devices such as time-based tokens or biometric smart cards. Most people assume that once security software is installed, they’re protected. It’s criti

Why Everyone Is Getting Hacked These Days

If it feels like there have been a lot of password hacks this year, it's because there have been more than usual, and  Ars Technica's Dan Goodin  explains why that is. In short: Password hacking has gotten better, while our password making has gotten worse. "The result: security provided by the average password in 2012 has never been weaker," Goodin writes, which is why it shouldn't surprise you that this year we have heard about security breaches at  LinkedIn ,  eHarmony ,  Yahoo Voices , and a personal horror story from Wired 's Mat Honan . Last year, James Fallows told us about his wife's security situation in  The Atlantic  story called "Hacked!" And for all the high profile accounts, there are all the ones we don't hear about. It's happening a lot these days. But why the sudden uptick? Goodin explains: Our password habits have gotten worse. "The average Web user maintains 25 separate accounts but uses just 6.5 passwo

How to Hack into a School Computer

This is how to hack your school's computer. Don't do anything illegal or malicious. If you get in trouble, I am not responsible for your actions. Please be careful with this - you could stop the computer from accessing the school network, or you could corrupt the operating system. This only works with Macs so don't bother trying it on a PC. Start up the computer and hold command S while booting. Let it scroll through the text and then type: sbin/mount -wu sbin/SystemStarter OR launchctl load /System/Library/LaunchDaemons/com.apple.DirectoryServices.plist  passwd root Now type a password you can remember and the hit enter and type reboot. It will auto reboot the system when you get to the login screen use root as the lgoin in and your new password and viola.

How to Hack/Install Custom Firmware on Sony PSP-E1004 Street

On seeing that a 12 year old kid was still alive in me, one of my closest friends decided to gift me a Sony PSP this birthday. As soon as I opened the box and played games for few minutes, I was more curious about things I can do on it than just playing games all day (that was the tech blogger in me speaking). But when I searched the internet everything demanded a custom firmware running on the PSP and that was enough of a reason for me to install a custom firmware on my  Sony PSP® E-1004 Street . There are two ways you in which you can run a custom firmware on PSP. One is the temporary hack and other is the permanent one. In temporary hack, PSP runs the custom firmware as long as its switched on/standby but after restarting it, things go back to default. The permanent one on the other hand means that the fix will remain even after restarting the PSP. In this post we will be seeing  how we can use temporary hack to use custom firmware on PSP E-1004 Street . Advantages of using