Airmon-ng problem
When, I run the airmon-ng command, I do not get any wireless extension for my wireless network card like wlan0.What could be the problem?My wireless card is Atheros hence it is supported. Any help pliiiiiiz. ...
When, I run the airmon-ng command, I do not get any wireless extension for my wireless network card like wlan0.What could be the problem?My wireless card is Atheros hence it is supported. Any help pliiiiiiz. ...
I have an idea for encryption that I could program fairly easily to encrypt some local text file. Given that my approach is novel, and does not use any of the industry standard encryption techniques, would I be able to test the strength of my encryption using 'cracker' apps or suchlike? Or do all those tools rely on advanced knowledge ...
Introduction After watching this video from LIDNUG, about .NET code protection http://secureteam.net/lidnug_recording/Untitled.swf (especially from 46:30 to 57:30), I would to locate the call to a MessageBox.Show in an EXE I created. The only logic in my "TrialApp.exe" is: public partial class Form1 : Form { public Form1() { ...
For a simple product key library I need to reliably check if a certain date passed. I'd like to do something slightly less trivial than checking the system clock since that can be changed easily by the user. What are standard ways of doing this? One way someone suggested is to check if there are files which were modified after the ch...
I've written a VB program. How do I add anti-tamper code so people can't crack it? ...
So, after 6 months of hard work finally released my application. Today I found the first web site where people download it cracked, and I was wondering if any of you fellow programmers know how to react to such stuff? Is there anything the software author can do to get the cracked version offline, or I'm just boned and shouldn't create...
Hello. I want to sell my Java application using PayPal. When a payment is received, the customer is mailed a one-time download link to my application. My question is, how do I prevent people from sending the .jar file to their friends/uploading it on the internet? Obviously I need some kind of check in the application which only allo...
How can I crack two ciphertexts that have used the same key twice? For example, plaintext1 uses the key "abcdefg", and plaintext2 uses the key "abcdefg". I know that ciphertext2 ^ ciphertext1 is equal to plaintext1 ^ plaintext2. And the method to crack plaintext1 ^ plaintext2 is the same method to crack a "book cipher" (also sometimes c...
Listing 7.1 The Decryptor of the Cascade Virus lea si, Start ; position to decrypt (dynamically set) mov sp, 0682 ; length of encrypted body (1666 bytes) Decrypt: xor [si],si ; decryption key/counter 1 xor [si],sp ; decryption key/counter 2 inc si ; increment one counter dec sp ; decrement the other jnz De...
How to break the DES encryption algorithm....using which programming language, it is most efficient. ...
Our MS Access 2000 developer left the company a year ago. We need to open his app in design mode in order to make modifications. Double-clicking the .mdb file while holding the shift key doesn't work. When I do that the developer toolbar shows for a split second, then all toolbars go away and the app opens as users would see it. No toolb...
This maybe is a very simple question, but i did not have any resources for hack. I searched google and there was nothing to help me out. I need to know some basic information about hacking. Questions in my mind are like these: What is hack? What can be done with hacking? what should we know (about stuff like OS, etc.) bef...