There are many ways to introduce the company andasalah way is to have a website. The Internet is the easiest way to advertise your company in the world, better than conventional advertising. The first step, you must have a domain. Domain is like a "brand name" for your company.
Domain Yahoo is one of the leading domain registrars in the world and has had support from Yahoo, a leading Internet company as well. In fact, Yahoo led the domain and its own website on the server is really the same as Yahoo.com, making it the most reliable domain and hosting providers in the industry.
You do not have to worry about Domains Yahoo might go bankrupt then you lose your domain, as you may know there are providers that less known domains. You can have many names for registration. When you want to add content, organize your site from scratch is simple and easy ways. Yahoo! also provides site builders and guide you to create the site, so just ignore the knowledge that you already know about the site design.
Pages
Thursday, June 30, 2011
Domain yahoo
Today yahoo provide Internet services via HTTP, particularly in terms of domains, domains yahoo gives lengkap.Sekarang facility also has a lot of web services that provide domain and hosting sales. search engines also do not lose the business of selling domains. this is attested by the existence of a yahoo domain specifically address the issue of making service provision domain. good. com or other
this is in the trigger by the number of Internet users, especially the website. purchase domain and hosting services as well pace with other domain provider web by typing the domain name and click search purposes. for an order you simply follow the steps there. for those of you who want to try the yahoo domain, can click here
this is in the trigger by the number of Internet users, especially the website. purchase domain and hosting services as well pace with other domain provider web by typing the domain name and click search purposes. for an order you simply follow the steps there. for those of you who want to try the yahoo domain, can click here
Labels:
Domain Yahoo
Saturday, May 21, 2011
Wifi Hacking Tuttorial
WEP is Wired Equivalent Privacy. This is an encryption standard for wireless until now. Many people do not even use WEP due to weak security, hassle, or WEP is pointless, because it can dicrack, although usually take a while to obtain enough data to get the WEP passwords, especially passwords are very long.
WEP consists of secret passwords and encryption. Secret password that is shared between access point and everyone in the wireless network, consisting of 5 or 13 characters. Used by the process of encryption for communications package that is disguised throughout the WLAN, or Wireless Local Area Network. All packages are unique and random, so if someone makes a crack in one package key, they can not see what others have done without cracking on them too.
This is all done using the secret password together with the three characters (the Initialization Vector, or IV) who were randomly selected by the wireless device. For example, if you are the password "hello", may make "abchello" to a package, and "xyzhello" for the other.
WEP also uses XOR, or Exclusive OR, for encryption. XOR compares two bits, and if theyre different, it will return 1. If not, it will return 0. For example, 1 XOR 1 will be 0, and 1 XOR 0 is 1.
Array is a variable that can hold multiple values. For example, an array of alphabet [26] will continue to value 26, which are labeled 0 through 25.
Example:
alphabet [0] = 'A';
alphabet [1] = 'B';
void swap (char & first, char & second)
{
char temp = first;
first = second;
second = temp;
}
swap (alphabet [0], alphabet [1]);
If the values array randomely have swapped many times, it can not be sent to the array element that holds the value.
The actual algorithm used by WEP to encrypt packets is RC4. RC4 consists of two steps: with a password and Scheduling Algorithm Pseudo Random Generation Algorithm. The first part, the scheduling algorithm is a password, or KSA, like this in C code, assuming k [] is an array of secret passwords:
int n = 256;
char s [n];
/ / Initialization
for (int i = 0; i <= (n - 1); i + +) s [i] = i; int j = 0; / / scrambling for (int l = 0, l <= (n - 1); l + + ) {j + = s [l] + k [l]; swap (s [l], s [j]);}
Let's examine the code above until we know that:
1. Integer 'n' determines how we make kuay encryption. Here using WEP 256.
2. Array of characters 'k' is the secret password in combination with three fake character. This does not change at all in this program.
3. The '/ / Initialize' only represents the initialization, as much as the characters 0-255.
4. Integer 'j' is used to hold value during scrambling. Always initialized to 0, because it must always be in the range 0.
5. Furthermore, (where '/ / scrambling') scrambling process begins. Basically, will result in 's' array 'random' than ever before 's' specified array.
6. Inside the circle, which merges their first passwords (k) with a random array (s) to create a complete character. Then, the call to swap () puts into an array of characters is completed.
Now it's time for the second part of the RC4 algorithm, then the Pseudo Random Generation Algorithm (PRGA). This section of the output stream passwords based on KSA's pseudo-random array. This key stream will be merged with cleartext data to create the encrypted data.
int i = 0;
int j = 0;
int z;
while (data_disini)