How to crack WPA2
Wi-Fi Protected Access 2 (WPA2) is one of the most widespread security standards for wireless networks. It has been replaced by more recent WPA3, but as of 2021 WPA2 is still more spread. This post explains briefly what is WPA2,…
Wi-Fi Protected Access 2 (WPA2) is one of the most widespread security standards for wireless networks. It has been replaced by more recent WPA3, but as of 2021 WPA2 is still more spread. This post explains briefly what is WPA2,…
This post lists some of the most popular IT frameworks that can be used by an organization to implement their information security. You can read about related information security architecture frameworks on this post. List of IT Security Frameworks List…
This post explains some aspects of application virtualization. This is part of a series of article about virtualization. Application Virtualization Software Products Software Virtualization Software Products: Citrix Virtual Apps Citrix Virtual Apps, formerly known as Citrix XenApp, allows users to…
An interface definition language (IDL) provide a language-neutral and platform-independent way to specify the interfaces of objects or services. It defines the data types, operations, and interfaces that are available for use by other components. Do not confuse it with…
This post lists possible solutions when getting errors when executing Windows Updates on Windows 10. The usual way to update Windows 10 is go to Start > Windows Update. We assume this is the way you are doing it normally…
1. Use DiskPart Utility Go to command line and type diskpart. Type this command to list all disks in computer: list disk If you want to check info about a disk (for example, disk 1), type these commands: select…
This post explains how to create a Python project in Eclipse, using plugin PyDev. It assumes you have followed already the installation and configuration steps for Python on Eclipse on the relevant posts, either on Windows 10/11 or Ubuntu. Step-by-step…
Eclipse is a free and open source IDE (Integrated Development Environment). One of its characteristics is its modular design that enables compatibility with multiple programming languages. Some of them (like Java, C++ or PHP) are integrated by default in Eclipse…
Password hashing algorithms: PBKDF Family PBKDF1 PBKDF2 bcrypt scrypt List of Password Hashing Algorithms PBKDF1 Deprecated. PBKDF2 Supersedes PBKDF1. Use key stretching to increase the difficulty of attack. bcrypt Use key stretching to increase the difficulty of attack. scrypt Use…
This post list some useful resources and sites that offer presentation templates, in different formats like OpenDocument (odp) or PowerPoint (.pptx). Presentation Templates Slidesgo Company from Spain. One of the co-founders sold Panoramio to Google. SlidesCarnival Free images…