Division Zero (Div0). Copyright © 2011-2018

All rights reserved.

7 Aug 2014

I once tried to start to use passwords which were immune to exhibitionism, that means that even when someone average would happen to see them on the screen or otherwise were not able to reproduce them at least with no hard effort. This led me to use...

30 Aug 2012

WPA or WPA2 security protocol can be used to prevent hackers and other unauthorised people from accessing wireless networks or even viewing traffic sent over them, but only when end users choose strong passwords.

WPA and WPA2 use an extremely robust p...

1 Aug 2012

A survey of 346 Singaporeans, conducted by Assurity Trusted Solutions in April, showed that most respondents are not following good cyber practices, such as using unique and complex passwords, changing their passwords regularly, or using two-factor a...

18 Nov 2011

John the Ripper (JTR) is an extraordinary tool that is useful for cracking passwords. First we must understand that using a word list is one of the ways to crack a WPA protected router. Rainbow tables can also be used however for today, we shall focu...

Please reload

RECENT POST

September 5, 2017

Please reload

CATEGORIES
Please reload

TAGS
RSS
RSS Feed