sendnaO (fastest file transfer) Promo Video (HD, 5GB Free)

sendnaO is a unique file transfer experience. Sign up for the closed beta today to get 5GB free.

Why Windows Vista (SP1+) is Better Than Windows 7

You’ve been brainwashed. Brainwashed by clever marketing and the classic underpromise-and-overdeliver strategy employed by Microsoft to fix the mistakes they made with Vista.

I know, I know, everyone told you Vista was bad. You maybe even used Vista pre-SP1, on a “Vista Capable” machine way back when it launched and concluded that it was horrible. Or, maybe you heard all the bad press and skipped on it altogether? Stuck with XP, then switched straight to 7. Is that what you did?

Well, regardless, I am convinced that Vista is the superior operating system. So vastly superior, that I am going out of my way to ensure that it replaces all the systems that I have been tricked into installing Windows 7 on. At work, at home, and for my clients. I am going to make an argument in this article as to why I believe that Vista remains superior.

I challenge someone to list 7 reasons why Windows 7 is better than Windows Vista. Actual reasons. “Features” like Aero Snap, Jump Lists, and the new taskbar do not necessitate an entirely new operating system, so they don’t really count. Those could easily be implemented into Vista, if it were not abandoned in the wake of Windows 7 by the new CEO, Steve Ballmer. So, we begin with a mini history lesson:

Continue Reading >>

Is WPA/WPA2 Vulnerable to Brute Force?

Just for fun, I attempted to bruteforce my own WPA2 (“Wi-Fi Protected Access”) network using Elcomsoft Distributed Password Recovery. Since I had rather awful results in the past with *.PDFs, I thought, perhaps I would have better luck with WPA cracking. The PDF algorithm doesn’t work with GPUs, but it does work with WPA, so I thought that maybe I’d be in luck!

In order to bruteforce WPA/2, you have to capture a 4-way “handshake” (tutorial below). You can do this using BackTrack, or WireShark to listen and capture the packets to a file, specifically a *.CAP file. If you don’t capture it correctly, you won’t be able to even try cracking it. Not that this makes much of a difference…

Continue Reading >>

How-To: Make Use of UltraVNC SC (Single-Click)

What is UltraVNC SC? It’s a solution for fast remote-access to a client’s system. It’s free, too.

What’s the difference between UltraVNC and UltraVNC SC? UltraVNC SC takes all of the complexities of setting up a VNC server, and puts the burden on the admin, rather than the client side. Forwarding ports, installing services, setting up passwords, configuring firewalls — all of that is transparent to the client. All the client has to do is double-click a custom *.exe that you set up ahead of time by following this guide.

So, let’s get started.

Continue Reading >>

Windows 7, Windows\CSC, Manage Offline Files & the Sync Center

I miss the old days of Windows when there was always a way to get something done. Fast. There was always a “do it anyway” button, if you will, with Microsoft products. You could hack it together and no matter what, you could find a way to make even the most unstable, cobbled-together idea, become stable and useful for years and years.

Three months ago, I wanted to search a mapped network drive in Windows 7 only to have it produce incomplete results nearly every time. I realized somehow that Windows wanted me to configure the network drive with the Manage Offline Files feature in Windows 7 and then index it using Windows Search because, for whatever reason, there’s no “index-it-over-the-network-anyway” button. So I did, and the search results were somewhat more complete, however, using a lot of hard drive space since it was now maintaining an unencrypted copy of an 80GB TrueCrypt volume worth of data on my local drive.

Continue Reading >>

Elcomsoft Distributed Password Recovery Review

I’ve used a lot of different software in a tireless effort to brute force a password out of a single PDF. So far, Elcomsoft Distributed Password Recovery certainly helps to speed up the process dramatically, but is it enough to reasonably crack a standard 8 character password in a reasonable amount of time?

As it turns out, that depends on what type of file you are trying to recover the password on. For example, PDF files are unable to take advantage of GPU acceleration (such as NVIDIA’s CUDA), while WPA/WPA2 (.cap/.wph files) are supported. Either way, be prepared to wait a long time, or drop a lot of money on a lot of CPU/GPU power because once you get up to just a measily 8 characters, it can take years.

Continue Reading >>