Subscribe For Free Updates!

We'll provide the lastest Updates! We promise.

Showing posts with label history. Show all posts
Showing posts with label history. Show all posts

Wednesday, 23 October 2013

Google Smartwatch Teaser News



Earlier this month we heard new reports that Google’s smartwatch could be arriving “sooner rather than later”; perhaps as soon as the end of the month to coincide with the much-leaked Nexus 5 and the updated Android 4.4.

If this is true then Google will be entering a marketplace that has never been fuller and yet - apart from Apple perhaps - no company is better positioned to deliver the first ‘true’ Smartwatch ; one that would blow the competition away.

Google may have just teased an upcoming smartwatch during the company’s earnings call for Q3 2013.

Talking about the new multi-screen world, Google CEO Larry Page referenced smartwatches, but didn’t give any details as to what type of device the company would be creating.

“People increasingly have more than one device. Screens are proliferating in the home as well as wearable screens like watches and Google Glass”, said Page.

Google has yet to confirm it is working on a smartwatch of its own to compete with the likes of the Samsung Galaxy Gear and Sony SmartWatch 2. However, this is the first time Page has mentioned anything of such a device.

The Google smartwatch, currently known as the Nexus Gem, is expected to launch on October 31 after numerous rumours tipped the date.

Smartwatch references aside, Google raked in $15 billion (£9.3 billion) in revenue for Q3 2013 and $2.97 billion (£1.84 billion) in profit. These figures exceeded analyst expectations by a margin.

“Google had another strong quarter with $14.8 billion in revenue and great product progress,” added Page. “We are closing in on our goal of a beautiful, simple, and intuitive experience regardless of your device.”

Despite the launch of the US exclusive Moto X, Motorola cost Google $248 million (£154 million) in operating losses.

Page also announced that 40 per cent of YouTube watchers now access the site via a mobile device, up from 6 per cent two years previously.

More successes for Google lie in the Chromebook market, as the laptops are now sold in 8,000 worldwide locations.

The search engine giant’s Research and Development budget has been increased by around $1 billion, and Page only wants that expenditure to grow. Part of his job requires him to spend on long-term R&D projects, including self-driving cars and Project Loon, Google’s balloon-distributed internet scheme.


W know why Google Planned to bring the smartwatch:
Here's why:

Hardware: they’ve bought two smartwatch makers already:

Google have already bought Motorola’s hardware division back in August 2011, and in doing so also acquired plenty of smarwatch expertise. Motorola’s MotoACTV  was launched back in 2011 and did dual service as both an MP3 player and a fitness-tracker – a hardware trend that will probably end up in basically the same place as smartwatches.

The MotoACTV had a 1.6-inch screen and runs Android, and came with all manner of connectivity - Bluetooth 4.0, Wi-Fi, GPS. It even had some pretty impressive smarts at launch, including one feature that automatically generated a ‘motivation’ playlist with songs culled from the times you were running at your fastest.

In August this year it was also revealed that Google had bought WIMM labs back in 2012 – a firm that had only one product: an Android smartwatch. They even had their own ‘micro app’ store with apps offering standalone functionality for the watch – something that’s key to lifting the current hardware out of their second-screen rut.

This is plentyful reason for Goolgle to make the Smartwatch.

Smarts: they’ve been getting awfully good at contextual information

This ‘second-screening’ is one of the central criticisms of the current crop of devices: they have to be paired with smartphones and then simply repeat information from them (albeit in a slightly more convenient location).

Fitness devices like the Nike FuelBand and the FitBit have succeed in the wearables market because they offer functionality that is above and beyond your phone's. They deliver relevant information that users want to know on the fly - which is exactly what Google have been doing with Google Now.

The connection between Google Now and a Google smartwatch is not a new one (GigaOM's Kevin Tofel flagged it up back in August) but it certainly bears repeating. Google Now is Google’s ‘digital assistant’: you feed it with data about you and in return it makes your life a little easier, nudging you with reminders about meetings or transport delays.

This is exactly the sort of time and location sensitive information that would make a smartwatch smart and Google Now has even nailed down the medium in which to deliver this info: its card-based interface with small bullets of information (directions, reviews, receipts etc) is a natural fit for the limited screen real estate available on your wrist.

Motivation: they need to find a future beyond Google Glass:

Google Now isn't new, but the wearable way of delivering its info is. Currently, Google Now is most prominent on the Moto X. Released back in August, the Moto X was described by Google as the world’s “first self-driving phone”, offering always-on voice-commands allowing users to pose search queries at any time.

Now, not only is this type of functionality exactly what a Google Now-powered smartwatch could deliver, but the implementation of voice commands (and we shouldn't forget how difficult it is to process natural language) is also incredibly similar to the operation of Google Glass. Glass is an amazing bit of technology and definitely a rough approximation of Google's future, but it's also not for everyone. It's just a bit too geeky, too obvious.

To combat this Google has been pushing hard to associate the technology with the world of high fashion (they've had it on catwalks and even splashed it around in a feature for Vogue) but even this seems less like an effort to 'normalise' the device than it is a campaign to make Glass a product for the elite. Seeing it worn by the self-consciously high-powered at Fashion Week and film premieres makes it aspirational - not normal.

In a recent interview with MIT Technology Review, Mary Lou Jepsen (head of Google's secretive Google X Lab) described wearable computers as "a way of amplifying you", saying of the technology: "It’s coming. I don’t think it’s stoppable [...] you become addicted to the speed of it, and it let's you do more fast and easily."

It's clear that a big part of Google's future will be involved in stitching together some form of wearable tech with predictive software and a natural language driven search that helps you in your daily life. Amit Singhal, head of search at the company, has described the future of Google as "someone by your side who can help you".

Google Glass is the most public example of this but the technology remains just a little too conspicuous and self-aggrandizing for most of us. We don't want a digital butler, poised at the elbow and glaring frostily at the hoi polloi - we want a discrete helper, offering the luxury and ease of a butler without the palaver. A smartwatch with the same functionality as Glass could be just the ticket - a gateway drug to get us all addicted.

Friday, 18 October 2013

'Smartphones and tablets making people less human' ? Is it Possible?

Smartphones and tablets making people less human'

Yeah technology is making us less human day by day. The shows that Human are more dependent on Technology than Before.


Millennials are tech-savvy young adults who grew up with smartphones and iPads, but many think technology makes people less human, according to a poll released on Thursday.

The survey of 12,000 people aged 18 and older in eight countries, commissioned by Intel Corporation, also showed that 18- to 24-year-olds want technology to be more personal and know their habits. Older women and those living in emerging markets are the most enthusiastic about the role technology can play in their lives, the findings showed.

Dr. Genevieve Bell, an anthropologist and research director at Intel Labs, said although the results of the survey that examined global attitudes towards technology innovation may indicate that young adults are rejecting technology, the findings could be more complicated.

"A different way to read this might be that millennials want technology to do more for them," she said in a statement.

Nearly 90 percent of young adults questioned in the poll admitted innovations in technology make life easier, but about 60 percent said people rely on it too much and that it can be dehumanizing.

Seventy percent said technology enhances their personal relationships and about half believe it will have a good impact on education, transportation and healthcare.

Women age 45 and older, and those living in emerging markets such as Brazil and India, are more enthusiastic about the impact technology could have on their lives.

In China, more than 70 percent of women said technology is not used enough.

"Women historically have become avid users of technology when that technology solves a problem, helps us organize our live and that of our families, as well as aids us in saving time and time shifting," Bell said.

The findings showed that Italians and Japanese held the most negative attitudes toward technology.

The survey, which was conducted in Brazil, China, France, India, Indonesia, Italy, Japan and the United States from July 28 to August 15, has a margin of error of plus or minus 0.89 percentage points.


From now onwards, Let's be more Human and stop relying on technology. If you agree with me hten share this with your Tech addicted friends and Family :-P 

Support me by liking our Facebook page

Tuesday, 17 September 2013

Global Positioning System (GPS)


INTRODUCTION

The Global Positioning System (GPS) is a space-based satellite navigation system that provides location and time information in all weather, anywhere on or near the Earth. Global Positioning Systems usually refer to the GPS receiver. It was developed by the U.S. military and after a while, the U.S. government opened it up for the public.
The GPS receiver receives signals coming from 27 satellites orbiting the Earth and from those signals the GPS receiver can calculate it’s absolute position of Earth. These satellites circle the Earth making two complete rotations everyday. Their orbits are planned in such a way that at any time and anywhere on Earth, there are at least four satellites visible in the sky.

FACT: There are only 24 satellites that are operational, the additional 3 are meant for backup in case one of the 24 fails

A GPS receiver locates four or more satellites through signals coming from these satellites which are sent constantly, and then calculates the distance to each of the satellites and from this information calculates its exact position on Earth. This process of pinpointing the location of the GPS receiver is based on the mathematical principal called ‘trilateration’.

The signals that the satellites are constantly transmitting are high-frequency, low power radio waves which contain information about the satellite and its location. GPS receivers can calculate the distance to the satellite by the time it takes for signal to get from the satellite to the receiver.

The above mentioned process works well but it has some inaccuracies due to a variety of reasons like signal interference, weather and more. Differential GPS (DGPS) helps correct those inaccuracies. This enhancement is based on stations located on Earth. The hardware at these stations know exactly where the satellites are, and constantly send information to GPS receivers (but only to those in which this technology is implemented) to correct their results, thus making it more accurate.

Once the GPS receiver makes all the necessary calculations, it can tell the latitude, the longitude and the altitude of its current position. This doesn’t tell much to the average user. So in order to make the use of the GPS receiver more user-friendly many receivers send this data to a program which displays a map and can show the position on it.

Other things that can be determined besides latitude, longitude, and altitude would include things like speed, sunrises and sunsets, bearing, distance and more.

BENEFITS OF GPS


Fuel economy: If you want to maximize your fuel economy you’ll need a good GPS system. Saving money at the pump as well as wear and tear on your vehicle should be one of the main reasons why you should want a good GPS system in your vehicle. Accurate driving directions not only save time, but also helps save a substantial amount of gas money while travelling from place to place.

Travel directions: Utilizing a GPS system will give you accurate directions for travel. Whether you are travelling locally, across the country, or globally, you will get accurate directions and constant monitoring of your current position.

Recreation: While out on a camp or a hike, a hand held GPS unit will benefit you. Imagine going camping in the middle of the woods and not being able to find your way out. You often hear stories about people that go out camping or hiking and don’t find their way back home. A GPS unit is the answer for these people.

Maritime GPS: GPS systems on a ship or a boat helps greatly not only because they tell you where you located in the middle of the sea but also give you warnings about weather changes as well as any dangers there might be at sea like an iceberg for instance. Another great function of the GPS device used by fishermen is the hotspot finder. A fisherman can relocate a certain spot out at sea by saving his current location, which he may think is ideal for fishing.

GPS Tracking: If you run a courier business, rental business, or just plain delivery service, and need to keep track of several vehicles, then GPS is what you need. Keeping track of your vehicles will keep your overhead down. The other end of tracking is keeping track of a family member or child, a GPS tracking system will aid in your efforts.

RESTRICTIONS ON CIVILIAN GPS DEVICES


While there are many benefits from using a GPS device, the U.S. Government controls the export of some civilian receivers. All GPS receivers capable of functioning above 18 kilometers altitude and 515 meters per second are classified as weapons for which export licenses are required. These limits attempt to prevent the use of a receiver in a ballistic missile and other weaponry.

OTHER SYSTEMS


Other satellite navigation systems which are either in use or under development are:
GLONASS – Russia’s global navigation system. Works worldwide.
Galileo – A global system which is being developed by members of the European Union and other partner countries.
Beidou – China’s own regional navigation system which is limited to Asia and the West Pacific
COMPASS – China’s global navigation system. Will be operational by the year 2020.
IRNSS – India’s regional navigation system, covering mainland India and the northern parts of the Indian Ocean
QZSS – Japan’s regional system covering Asia and Oceania


Now many more peoples in the world use GPS!!!So now GPS technology is revealed!!!

If you have any confusion about inventory things visit 

Early History of Chocolates

  EARLY HISTORY OF CHOCOLATE 

Yummy chocolates
Love chocolatesThe earliest record of chocolate was over fifteen hundred years ago in the Central American rain forests, where the tropical mix of high rain fall combined with high year round temperatures and humidity provide the ideal climate for cultivation of the plant from which chocolate is derived, the Cacao Tree. 
The Cacao Tree was worshipped by the Mayan civilisation of Central America and Southern Mexico, who believed it to be of divine origin, Cacao is actually a Mayan word meaning "God Food" hence the tree's modern generic Latin name 'Theobrama Cacao' meaning ‘Food of the Gods’. Cacao was corrupted into the more familiar 'Cocoa' by the early  European explorers. The Maya brewed a spicy, bitter sweet drink by roasting and pounding the seeds of the Cacao tree (cocoa beans) with maize and Capsicum (Chilli) peppers and letting the mixture ferment. This drink was reserved for use in ceremonies as well as for drinking by the wealthy and religious elite, they also ate a Cacao porridge. 
The Aztecs of central Mexico also prized the beans, but because the Aztec's lived further north in more arid regions at higher altitudes, where the climate was not suitable for cultivation of the tree, they had to acquire the beans through trade and/or the spoils of war. The Aztecs prized the beans so highly they used them as currency - 100 beans bought a Turkey or a slave - and tribute or Taxes were paid in cocoa beans to Aztec emperors. The Aztecs, like the Mayans, also enjoyed Cacao as a beverage fermented from the raw beans, which again featured prominently in ritual and as a luxury available only to the very wealthy. The Aztecs called this drink Xocolatl, the Spanish conquistadors found this almost impossible to pronounce and so corrupted it to the easier 'Chocolat', the English further changed this to Chocolate.
The Aztec's regarded chocolate as an aphrodisiac and their Emperor, Montezuma reputedly drank it fifty times a day from a golden goblet and is quoted as saying of Xocolatl: "The divine drink, which builds up resistance and fights fatigue. A cup of this precious drink permits a man to walk for a whole day without food" 
In fact, the Aztec's prized Xocolatl well above Gold and Silver so much so, thatwhen Montezuma was defeated by Cortez in 1519 and the victorious 'conquistadors' searched his palace for the Aztec treasury expecting to find Gold & Silver, all they found were huge quantities of cocoa beans. The Aztec Treasury consisted, not of precious metals, but Cocoa Beans.

CHOCOLATE IN EUROPE

Xocolatl! or Chocolat or Chocolate as it became known, was brought to Europe by Cortez, by this time the conquistadors had learned to make the drink more palatable to European tastes by mixing the ground roasted beans with sugar and vanilla (a practice still continued today), thus offsetting the spicy bitterness of the brew the Aztec's drank.
The first chocolate factories opened in Spain, where the dried fermented beans brought back from the new world by the Spanish treasure fleets were roasted and ground, and by the early 17th century chocolate powder - from which the European version of the drink was made - was being exported to other parts of Europe. The Spanish kept the source of the drink - the beans - a secret for many years, so successfully in fact, that when English buccaneers boarded what they thought was a Spanish 'Treasure Galleon' in 1579, only to find it loaded with what appeared to be 'dried sheep's droppings', they burned the whole ship in frustration. If only they had known, chocolate was so expensive at that time, that it was worth it's weight in Silver (if not Gold), Chocolate was Treasure Indeed!
Within a few years, the Cocoa beverage made from the powder produced in Spain had become popular throughout Europe, in the Spanish Netherlands, Italy, France, Germany and - in about 1520 - it arrived in England.
The first Chocolate House in England opened in London in 1657 followed rapidly by many others. Like the already well established coffee houses, they were used as clubs where the wealthy and business community met to smoke a clay pipe of tobacco, conduct business and socialise over a cup of chocolate.

BACK TO THE AMERICA'S

Event's went full circle when English colonists carried chocolate (and coffee) with them to England's colonies in North America. Destined to become the United States of America and Canada, they are now the worlds largest consumers - by far - of both Chocolate and Coffee, consuming over half of the words total production of chocolate alone.

THE QUAKERS

The Quakers were, and still are, a pacifist religious sect, an offshoot of the Puritans of English Civil War and Pilgrim Fathers fame and a history of chocolate would not be complete without mentioning their part in it. Some of the most famous names in chocolate were Quakers, who for centuries held a virtual monopoly of chocolate making in the English speaking world - Fry, Cadbury and Rowntree are probably the best known.
It's probably before the time of the English civil war between Parliament and King Charles 1st, that the Quaker's, who evolved from the Puritans, first began their historic association with Chocolate. Because of their pacifist religion, they were prohibited from many normal business activities, so as an industrious people with a strong belief in the work ethic (like the puritans), they involved themselves in food related businesses and did very well. Baking was a common occupation for them because bread was regarded as the biblical " Staff Of Life", and Bakers in England were the first to add chocolate to cakes so it would be a natural progression for them to start making pure chocolate. They were also heavily involved in breakfast cereals but that's another story.

CHOCOLATE AS WE KNOW IT!!!

The first mention of chocolate being eaten in solid form is when bakers in England began adding cocoa powder to cakes in the mid 1600's. Then in 1828 a Dutch chemist, Johannes Van Houten, invented a method of extracting the bitter tasting fat or "cocoa butter" from the roasted ground beans, his aim was to make the drink smoother and more palatable, however he unknowingly paved the way for solid chocolate as we know it.
Chocolate as we know it today first appeared in 1847 when Fry & Sons of Bristol, England - mixed Sugar with Cocoa Powder and Cocoa Butter (made by the Van Houten process) to produce the first solid chocolate bar then, in 1875 a Swiss manufacturer, Daniel Peters, found a way to combine (some would say improve, some would say ruin) cocoa powder and cocoa butter with sugar and dried milk powder to produce the first milk chocolate.
What is certain is that the Fry, Rowntree and Cadbury families in England among others, began chocolate making and in fact Joseph Fry of Fry & Sons (founded 1728 in Bristol, England) is credited with producing and selling the worlds first chocolate bar. Fry's have now all but disappeared (taken over by Cadbury) and Rowntree have merged Swiss company Nestle, to form the largest chocolate manufacturer in the world. Cadbury have stayed with chocolate production and are now, if not quite the largest, probably one of the best known Chocolate makers in the world.
From their earliest beginnings in business the Quakers were noted for their enlightened treatment of their employees, providing not just employment but everything needed for workers to better themselves such as good housing etc. In fact, Cadbury built a large town for their employees around their factory near Birmingham, England. Complete with libraries, schools, shops and Churches etc, they called it Bourneville. So next time you see Cadbury's chocolate with the name Bournville on it you will know where it comes from and what the name relates to!!!

SEPTEMBER 13 WE CELEBRATE AS A CHOCOLATES DAY!!!
Now chocolates invention is revealed!!!

For more information about inventory things you can also visit INVENTORYBLOGGER



Saturday, 10 August 2013

How are Wireless networks secured




An internet connection has become a basic necessity in our modern lives. Wireless hot-spots (commonly known as Wi-Fi) can be found everywhere!
If you have a PC with a wireless network card, then you must have seen many networks around you. Sadly most of these networks are secured with a network security key.
Have you ever wanted to use one of these networks? You must have desperately wanted to check your mail when you shifted to your new house. The hardest time in your life is when your internet connection is down.
Cracking those Wi-Fi passwords is your answer to temporary internet access. This is a comprehensive guide which will teach even complete beginners how to crack WEP encrypted networks, easily.

Table of Contents

  1. How are Wireless networks secured?
  2. What you'll need
  3. Setting up CommView for Wi-Fi
  4. Selecting the target network and capturing packets
  5. Waiting...
  6. Now the interesting part... CRACKING!
  7. Are you a visual learner?

How Are Wireless Networks Secured?

In a secured wireless connection, internet data is sent in the form of encrypted packets. These packets are encrypted with network security keys. If you somehow manage to get hold of the key for a particular wireless network you virtually have access to the wireless internet connection
Broadly speaking there are two main types of encryptions used:
WEP (Wired Equivalent Privacy):
This is the most basic form of encryption. This has become an unsafe option as it is vulnerable and can be cracked with relative ease. Although this is the case many people still use this encryption.
WPA (Wi-Fi Protected Access):
This is the more secure alternative. Efficient cracking of the passphrase of such a network requires the use of a wordlist with the common passwords. In other words you use the old fashioned method of trial and error to gain access. Variations include WPA-2 which is the most secure encryption alternative till date. Although this can also be cracked using a wordlist if the password is common, this is virtually uncrackable with a strong password. That is, unless the WPA PIN is still enabled (as is the default on many routers).
Hacking WEP passwords is relatively fast, so we'll focus on how to crack them for this guide. If the only networks around you use WPA passwords, you'll want to follow this guide on how to crack WPA WiFi passwords instead.

What You'll Need...

  • A compatible wireless adapter:
This is by far the biggest requirement.The wireless card of your computer has to be compatible with the software CommVIew. This ensures that the wireless card can go into monitor mode which is essential for capturing packets.Click here to check if your wireless card is compatible
  • CommView for Wi-Fi :
This software will be used to capture the packets from the desired network adapter.Click here and download the software from the website.
  • Aircrack-ng GUI:
After capturing the packets this software does the actual cracking.Click here-Click here and download the software from the website.
  • A little patience is vital!!

Step 1: Setting Up CommView for Wi-Fi

  • Download the zip file of CommView for Wi-Fi from the website. Extract the file and run setup.exe to install CommView for Wi-Fi. When CommView opens for the first time it has a driver installation guide. Follow the prompts to install the driver for your wireless card.
  • Run CommView for Wi-Fi.
  • Click the play icon on the top left of the application window.
Start scanning for wireless networks.
CommView now starts scanning for wireless networks channel by channel. After a few minutes you will have a long list of wireless networks with their security type and signal. Now it is time to choose your target network

Step 2: Selecting the Target Network and Capturing Packets

A few things to keep in mind before choosing the target wireless network
  • This tutorial is only for WEP encrypted networks.
So make sure you select a network with WEP next to its name
  • Choose a network with the highest signal.
  • Each network will have its details in the right column.
  • Make sure the WEP network you are choosing has the least the least dB (decibel) value.
Once you have chosen your target network,select it and click Capture to start capturing packets from the desired channel.
Now you might notice that packets are being captured from all the networks in the particular channel. To capture packets only from the desired network follow the given steps.
  • Right click the desired network and click on copy MAC Address.
  • Switch to the Rules tab on the top.
  • On the left hand side choose MAC Addresses
  • Enable MAC Address rules
  • For 'Action' select 'capture' and for 'Add record' select 'both'.
  • Now paste the mac address copied earlier in the box below.
We need to capture only data packets for cracking. Hence select D on the bar at the top of the window and deselect M (Management packets) and C (Control packets).
Now you have to save the packets so that they can be cracked later. To do this-
  • Go to the logging tab on top and enable auto saving.
  • Set Maximum Directory Size to 2000
  • Set Average Log File Size to 20.

Step 3: Waiting...

Now the boring part- WAITING!
NOTE: The amount of time taken to capture enough data packets depends on the signal and the networks usage. The minimum number of packets you should capture should be 100,000 for a decent signal.
After you think you have enough packets (at least 100,000 packets)
  • Go to the log tab and click on concatenate logs.
  • Select all the logs that have been saved.
  • Do not close CommView for Wi-Fi
  • Now navigate to the folder where the concatenated logs have been saved
  • Open the log file
  • Select File- Export -Wire shark tcpdump format and choose any suitable destination.
  • This will save the logs with a .cap extension to that location

Now the Interesting Part... CRACKING!

  • Download Aircrack-ng and extract the zip file.
  • Open the folder and navigate to 'bin'.
  • Run Aircrack-ng GUI
  • Choose WEP
  • Open your .cap file that you had saved earlier.
  • Click Launch.
  • In the command prompt type in the index number of your target wireless network.
  • Wait for a while .If everything goes fine the wireless key will be shown.
You may also receive a request to try with more packets. In this case wait until more packets have been captured and repeat the steps to be performed after capturing packets
BEST OF LUCK

Cracking those Wi-Fi passwords




An internet connection has become a basic necessity in our modern lives. Wireless hot-spots (commonly known as Wi-Fi) can be found everywhere!


If you have a PC with a wireless network card, then you must have seen many networks around you. Sadly most of these networks are secured with a network security key.


Have you ever wanted to use one of these networks? You must have desperately wanted to check your mail when you shifted to your new house. The hardest time in your life is when your internet connection is down.


Cracking those Wi-Fi passwords is your answer to temporary internet access. This is a comprehensive guide which will teach even complete beginners how to crack WEP encrypted networks, easily.


Table of Contents

  1. How are Wireless networks secured? 
  2. What you'll need 
  3. Setting up CommView for Wi-Fi 
  4. Selecting the target network and capturing packets 
  5. Waiting... 
  6. Now the interesting part... CRACKING! 
  7. Are you a visual learner?

1.How Are Wireless Networks Secured?



In a secured wireless connection, internet data is sent in the form of encrypted packets. These packets are encrypted with network security keys. If you somehow manage to get hold of the key for a particular wireless network you virtually have access to the wireless internet connection


Broadly speaking there are two main types of encryptions used:

WEP (Wired Equivalent Privacy):


This is the most basic form of encryption. This has become an unsafe option as it is vulnerable and can be cracked with relative ease. Although this is the case many people still use this encryption.

WPA (Wi-Fi Protected Access):


This is the more secure alternative. Efficient cracking of the passphrase of such a network requires the use of a wordlist with the common passwords. In other words you use the old fashioned method of trial and error to gain access. Variations include WPA-2 which is the most secure encryption alternative till date. Although this can also be cracked using a wordlist if the password is common, this is virtually uncrackable with a strong password. That is, unless the WPA PIN is still enabled (as is the default on many routers).


Hacking WEP passwords is relatively fast, so we'll focus on how to crack them for this guide. If the only networks around you use WPA passwords, you'll want to follow this guide on how to crack WPA WiFi passwords instead.

What You'll Need...

  • A compatible wireless adapter:
This is by far the biggest requirement.The wireless card of your computer has to be compatible with the software CommVIew. This ensures that the wireless card can go into monitor mode which is essential for capturing packets.Click here to check if your wireless card is compatible
  • CommView for Wi-Fi :
This software will be used to capture the packets from the desired network adapter.
  • Aircrack-ng GUI:
After capturing the packets this software does the actual cracking.Click here-Click here and download the software from the website.
  • A little patience is vital!!

Step 1: Setting Up CommView for Wi-Fi

  • Download the zip file of CommView for Wi-Fi from the website. Extract the file and run setup.exe to install CommView for Wi-Fi. When CommView opens for the first time it has a driver installation guide. Follow the prompts to install the driver for your wireless card. 
  • Run CommView for Wi-Fi. 
  • Click the play icon on the top left of the application window.

Start scanning for wireless networks.


CommView now starts scanning for wireless networks channel by channel. After a few minutes you will have a long list of wireless networks with their security type and signal. Now it is time to choose your target network

Step 2: Selecting the Target Network and Capturing Packets 



A few things to keep in mind before choosing the target wireless network
  • This tutorial is only for WEP encrypted networks.
So make sure you select a network with WEP next to its name
  • Choose a network with the highest signal. 
  • Each network will have its details in the right column. 
  • Make sure the WEP network you are choosing has the least the least dB (decibel) value.

Once you have chosen your target network,select it and click Capture to start capturing packets from the desired channel.


Now you might notice that packets are being captured from all the networks in the particular channel. To capture packets only from the desired network follow the given steps.

  • Right click the desired network and click on copy MAC Address. 
  • Switch to the Rules tab on the top. 
  • On the left hand side choose MAC Addresses 
  • Enable MAC Address rules 
  • For 'Action' select 'capture' and for 'Add record' select 'both'. 
  • Now paste the mac address copied earlier in the box below. 

We need to capture only data packets for cracking. Hence select D on the bar at the top of the window and deselect M (Management packets) and C (Control packets).


Now you have to save the packets so that they can be cracked later. To do this-

  • Go to the logging tab on top and enable auto saving. 
  • Set Maximum Directory Size to 2000 
  • Set Average Log File Size to 20.

Step 3: Waiting...


Now the boring part- WAITING!


NOTE: The amount of time taken to capture enough data packets depends on the signal and the networks usage. The minimum number of packets you should capture should be 100,000 for a decent signal.

After you think you have enough packets (at least 100,000 packets)

  • Go to the log tab and click on concatenate logs.
  • Select all the logs that have been saved.
  • Do not close CommView for Wi-Fi
  • Now navigate to the folder where the concatenated logs have been saved
  • Open the log file
  • Select File- Export -Wire shark tcpdump format and choose any suitable destination.
  • This will save the logs with a .cap extension to that location

Now the Interesting Part... CRACKING!

  • Download Aircrack-ng and extract the zip file. 
  • Open the folder and navigate to 'bin'. 
  • Run Aircrack-ng GUI 
  • Choose WEP 
  • Open your .cap file that you had saved earlier. 
  • Click Launch. 
  • In the command prompt type in the index number of your target wireless network. 
  • Wait for a while .If everything goes fine the wireless key will be shown. You may also receive a request to try with more packets. In this case wait until more packets have been captured and repeat the steps to be performed after capturing packets 


BEST OF LUCK!!!

Monday, 8 July 2013

How To Prepare For a INTERVIEW?

Interview Tips

Interviews makes you to show your talent and ability whether you can fit for that particular job or not. So make use of the following tips to improve your knowledge in attending the interview.

1.Practice makes the man perfect. So practice in front of the mirror or with your friends/colleagues.

2.Dress professionally for the job and do not wear jeans,T-shirts etc

3.Proper preparation will help to reduce the tension, nervousness 



1) Dress well, be on time
2) Feel confident and enjoy the process
3) Greet everyone looking them in the eye
4) Listen carefully to their questions, think and then answer. You don't have to start speaking immediately. Take a small pause - it will only impress the interviewers that you are thinking about the answer.
5) Don't try to bluff - if you don't know something, say so

visit our blog for many more informations