martes, 31 de marzo de 2009

Desactivar la reproducción automática de dispositivos extraibles

Para desactivar la reproducción automática debemos seguir los siguientes pasos. Nos vamos a Inicio, Ejecutar, escribimos gpedit.msc y le damos a Aceptar. Se nos abrirá una ventana con dos paneles. En el panel izquierdo debemos navegar por Configuración del equipo, Plantillas administrativas y Sistema.

Al llegar a Sistema nos mostrarán en el panel derecho una serie de opciones. Debemos localizar la opción Desactivar Reproducción automática y hacer doble click encima. Se nos abrirá una ventana mostrándonos una serie de opciones y debemos marcar Habilitar y darle a Aceptar.

Con esto habremos deshabilitado la reproducción automática de todos los dispositivos que conectemos o insertemos en la computadora.

lunes, 23 de marzo de 2009

Descarga música de Last.fm con Last.fm Downloader

Descarga música de Last.fm con Last.fm Downloader

Si eres un fan incondicional de Last.fm te encantará saber que existe una manera de descargar las canciones que escuchas gracias a Last.fm Downloader. Para ello simplemente deberás conocer la URL de las canciones que quieres.

Esta URL es la que debemos pegar en Last.fm Downloader para que acto seguido se ponga a descargarla. Podremos pegar tantas URLs como canciones queramos descargar ya que Last.fm Downloader hace las veces de gestor de descargas.

Además nos permite descargar canciones de artistas similares si pegamos la URL de los artistas similares del que queramos. Por ejemplo para La Casa Azul la URL de artistas similares sería:

http://www.lastfm.es/listen/artist/La%2BCasa%2BAzul/similarartists

La aplicación no requiere instalación y solo funciona con Windows. Además parece que no es necesario disponer de una cuenta en Last.fm para descargar las canciones aunque en Lifehacker avisan de que sin estar identificados no les deja descargar las canciones individuales.

Vía | Lifehacker
Descarga | Last.fm Downloader (ojo, actualmente parece que el enlace está caído por el aluvión de descargas)

domingo, 22 de marzo de 2009

How To Write Object-Oriented Shell scripts For Multiple Platforms

If you don't want to commit to the idiosyncrasies of a specific shell running on a particular platform, try the Squirrel Shell. The Squirrel Shell provides an advanced, object-oriented scripting language that works equally well on UNIX, Linux, Mac OS X, and Windows systems. Write a script once, and run it anywhere.

Squirrel is a high level imperative/OO programming language, designed to be a light-weight scripting language that fits in the size, memory bandwidth, and real-time requirements of applications like video games.

=> Speaking UNIX: The Squirrel portable shell and scripting language

viernes, 6 de marzo de 2009

Cómo descargar libros de Google Books?

Descarga libros de Google Books con Google Books Downloader

La respuesta es Google Books Downloader, una herramienta para Windows que nos permitirá descargar cualquier libro de Google Books a nuestra computadora directamente en PDF, de manera casi automática. Para ello primero debemos localizar el libro que queremos descarga y mirar en la barra de direcciones el ID del libro.

Por ejemplo para el libro Diabetes para dummies la url sería la siguiente:

http://books.google.es/books?id=6Y0YXUlG46wC&pg=PA176&dq=Alcohol&as_brr=3&rview=1#PPP1,M1

El ID de dicho libro, en este caso sería 6Y0YXUlG46wC, que sería lo que deberíamos introducir en Google Books Downloader. Acto seguido le damos a Check y la aplicación se pondrá a buscar el libro y todas las páginas correspondientes. Cuando termine nos dará la opción de descargar el libro entero o si queremos seleccionar las páginas que queramos y realizar una descarga selectiva.

Para poder hacer uso de Google Books Downloader deberemos tener instalado .NET 3.5 SP1 y está en inglés, aunque para algo como esto tampoco es mucho problema el idioma.

Vía | GHacks
Descarga | Google Books Downloader

Web 2.0 Explicada jajaja

juanelo875a.jpg

juanelo875b.jpg

juanelo875c.jpg

jueves, 5 de marzo de 2009

BackTrack - Linux live distribution for penetration and security tests

BackTrack logo

This distribution started from the merge of two ones: WHAX (or Whoppix) and Auditor Security Collection (the swiss army knife for security assessments). The latest stable version (BackTrack 3) contains more than 300 tools (including such monsters as wireshark, nmap, hping and others) which will be appreciated by every security professional. All tools are categorized into:

1. Information gathering
2. Network Mapping
3. Vulnerability Identification
4. Penetration
5. Privilage Escalation
6. Maintaining Access
7. Covering Tracks
8. Radio Network Analysis (Wi-Fi and Bluetooth)
9. VoIP and Telephony Analysis
10. Digital Forensics
11. Reverse Engineering

The full list of tools with descriptions you can find at official BackTrack wiki, screenshots and documentation are here.

Download Now: CD Image, USB Image. More?

Top 10 Password Crackers :D

Each tool is described by one ore more attributes:

newDid not appear on the 2003 list
  TITLE=Generally costs money. A free limited/demo/trial version may be available.
LinuxWorks natively on Linux
*BSDWorks natively on OpenBSD, FreeBSD, Solaris, and/or other UNIX variants
OS XWorks natively on Apple Mac OS X
WindowsWorks natively on Microsoft Windows
Command-line interfaceFeatures a command-line interface
GUI InterfaceOffers a GUI (point and click) interface
Source codeSource code available for inspection.

Here is the list, starting with the most popular:

#1
Windows
GUI Interface
Cain and Abel : The top password recovery tool for Windows
UNIX users often smugly assert that the best free security tools support their platform first, and Windows ports are often an afterthought. They are usually right, but Cain & Abel is a glaring exception. This Windows-only password recovery tool handles an enormous variety of tasks. It can recover passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, revealing password boxes, uncovering cached passwords and analyzing routing protocols. It is also well documented.

Also categorized as: packet sniffers


#2
Linux
*BSD
OS X
Windows
Command-line interface
Source code
John the Ripper : A powerful, flexible, and fast multi-platform password hash cracker
John the Ripper is a fast password cracker, currently available for many flavors of Unix (11 are officially supported, not counting different architectures), DOS, Win32, BeOS, and OpenVMS. Its primary purpose is to detect weak Unix passwords. It supports several crypt(3) password hash types which are most commonly found on various Unix flavors, as well as Kerberos AFS and Windows NT/2000/XP LM hashes. Several other hash types are added with contributed patches. You will want to start with some wordlists, which you can find here, here, or here.

#3
Linux
*BSD
OS X
Windows
Command-line interface
GUI Interface
Source code
THC Hydra : A Fast network authentication cracker which support many different services
When you need to brute force crack a remote authentication service, Hydra is often the tool of choice. It can perform rapid dictionary attacks against more then 30 protocols, including telnet, ftp, http, https, smb, several databases, and much more. Like THC Amap this release is from the fine folks at THC.

#4
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Aircrack : The fastest available WEP/WPA cracking tool
Aircrack is a suite of tools for 802.11a/b/g WEP and WPA cracking. It can recover a 40 through 512-bit WEP key once enough encrypted packets have been gathered. It can also attack WPA 1 or 2 networks using advanced cryptographic methods or by brute force. The suite includes airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), and airdecap (decrypts WEP/WPA capture files).

Also categorized as: wireless tools


#5
  TITLE=
Windows
GUI Interface
L0phtcrack : Windows password auditing and recovery application
L0phtCrack, also known as LC5, attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows NT/2000 workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). LC5 was discontinued by Symantec in 2006, but you can still find the LC5 installer floating around. The free trial only lasts 15 days, and Symantec won't sell you a key, so you'll either have to cease using it or find a key generator. Since it is no longer maintained, you are probably better off trying Cain and Abel, John the Ripper, or Ophcrack instead.

#6
Linux
*BSD
OS X
Windows
Command-line interface
Source code
Airsnort : 802.11 WEP Encryption Cracking Tool
AirSnort is a wireless LAN (WLAN) tool that recovers encryption keys. It was developed by the Shmoo Group and operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. You may also be interested in the similar Aircrack.

Also categorized as: wireless tools


#7
  TITLE=
Windows
GUI Interface
SolarWinds : A plethora of network discovery/monitoring/attack tools
SolarWinds has created and sells dozens of special-purpose tools targeted at systems administrators. Security-related tools include many network discovery scanners, an SNMP brute-force cracker, router password decryption, a TCP connection reset program, one of the fastest and easiest router config download/upload applications available and more.

Also categorized as: traffic monitoring tools


#8
Windows
Command-line interface
Source code
Pwdump : A window password recovery tool
Pwdump is able to extract NTLM and LanMan hashes from a Windows target, regardless of whether Syskey is enabled. It is also capable of displaying password histories if they are available. It outputs the data in L0phtcrack-compatible form, and can write to an output file.

#9
new
Linux
*BSD
OS X
Windows
Command-line interface
Source code
RainbowCrack : An Innovative Password Hash Cracker
The RainbowCrack tool is a hash cracker that makes use of a large-scale time-memory trade-off. A traditional brute force cracker tries all possible plaintexts one by one, which can be time consuming for complex passwords. RainbowCrack uses a time-memory trade-off to do all the cracking-time computation in advance and store the results in so-called "rainbow tables". It does take a long time to precompute the tables but RainbowCrack can be hundreds of times faster than a brute force cracker once the precomputation is finished.

#10
Windows
GUI Interface
Brutus : A network brute-force authentication cracker
This Windows-only cracker bangs against network services of remote systems trying to guess passwords by using a dictionary and permutations thereof. It supports HTTP, POP3, FTP, SMB, TELNET, IMAP, NTP, and more. No source code is available. UNIX users should take a look at THC Hydra.
 
Locations of visitors to this page