12 Jun 2012
8 Jun 2012
2 Jun 2012
Speed up your pendrives file copying speed in Windows
![]() |
| Many brand of Pen Drives |
You might have noticed slow copy speeds with some pen drives. Here is a tweak which help in increasing the speed or giving a speed boost to your pendrive.
By enabling this tweak, the write caching option in windows will be enabled.
- Plug in your USB Drive.
- Then Open My Computer> right-click on your USB Drive >click Properties.
- Select your USB drive Under Hardwares and choose Properties.
- You will see a dialog box saying ” Optimize for quick removal”.This option is selected by default.
- Select “Optimize for Performance”option.
- Now, remove USB drive and plug it again.
- Copy some files from the drive to your system or vice-versa. You can notice the speed increase.
External Hdd has become write protected
Here are a few things to try:
1. This can be caused by malware, are you sure your machine is clean?
2. Plug in your device, right-click Computer > Manage > Storage > Disk Management, then right-click the
drive graphic of the device and select Change Drive letter, then change it to one nearer the end of the alphabet.
3. Change these registry keys but create a system restore point first, just in case you have problems. Note that the keys do not necessarily exist, so don't create them as it's probably a different issue.
A.
Click the Windows Orb (Start), type regedit, press Enter and in the left pane navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies, double click on WriteProtect and change Value Data to 0 (zero).
B.
Now go to HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\StorageDevicePolicies, double click on WriteProtect and change Value Data to 0 (zero).
C.
Lastly go to HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\StorageDevicePolicies, double click on WriteProtect and change Value Data to 0 (zero).
Good Luck
1. This can be caused by malware, are you sure your machine is clean?
2. Plug in your device, right-click Computer > Manage > Storage > Disk Management, then right-click the
drive graphic of the device and select Change Drive letter, then change it to one nearer the end of the alphabet.
3. Change these registry keys but create a system restore point first, just in case you have problems. Note that the keys do not necessarily exist, so don't create them as it's probably a different issue.
A.
Click the Windows Orb (Start), type regedit, press Enter and in the left pane navigate to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies, double click on WriteProtect and change Value Data to 0 (zero).
B.
Now go to HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\StorageDevicePolicies, double click on WriteProtect and change Value Data to 0 (zero).
C.
Lastly go to HKEY_LOCAL_MACHINE\SYSTEM\ControlSet002\Control\StorageDevicePolicies, double click on WriteProtect and change Value Data to 0 (zero).
Good Luck
1 Jun 2012
Wifite + Reaver WPA/WPA2 crack in BackTrack 5 R2 Longjidin
wifite
An automated wireless attack tool.What's New?
The biggest change from version 1 is support for "reaver", a Wifi-Protected Setup (WPS) attack tool. Reaver can compromise the PIN and PSK for many routers that have WPS enabled, usually within hours.Other changes include a complete code re-write with bug fixes and added stability. Due to problems with the Python Tkinter suite, the GUI has been left out of this latest version.
About
Wifite is for Linux only.Wifite was designed for use with pentesting distributions of Linux, such as Backtrack 5 R1, BlackBuntu, BackBox; any Linux distributions with wireless drivers patched for injection. The script appears to also operate with Ubuntu 11/10, Debian 6, and Fedora 16.
Wifite must be run as root. This is required by the suite of programs it uses. Running downloaded scripts as root is a bad idea. I recommend using the Backtrack 5 R1 bootable Live CD, a bootable USB stick (for persistent), or a virtual machine. Note that Virtual Machines cannot directly access hardware so a wireless USB dongle would be required.
Wifite assumes that you have a wireless card and the appropriate drivers that are patched for injection and promiscuous/monitor mode.
Execution
To download and execute wifite, run the commands below:wget https://raw.github.com/derv82/wifite/master/wifite.pychmod +x wifite.py./wifite.py Required Programs
Please see the installation guide on the wiki for help installing any of the tools below.- Python 2.6.x or 2.7.x. Wifite is a Python script and requires Python to run.
-
aircrack-ng suite.
This is absolutely required. The specific programs used in the suite are:
- airmon-ng,
- airodump-ng,
- aireplay-ng,
- packetforge-ng, and
- aircrack-ng.
-
Standard linux programs.
- iwconfig, ifconfig, which, iw
Suggested Programs
* indicates program is not included in Backtrack 5 R1*reaver, a Wifi-Protected Setup (WPS) attack tool. Reaver includes a scanner "walsh" (or "wash") for detecting WPS-enabled access points. Wifite uses Reaver to scan for and attack WPS-enabled routers.*pyrit, a GPU cracker for WPA PSK keys. Wifite uses pyrit (if found) to detect handshakes. In the future, Wifite may include an option to crack WPA handshakes via pyrit.- tshark. Comes bundled with Wireshark, packet sniffing software.
- cowpatty, a WPA PSK key cracker. Wifite uses cowpatty (if found) to detect handshakes.
Licensing
Wifite is licensed under the GNU General Public License version 2 (GNU GPL v2).(C) 2011 Derv Merkler
i am testing the Wifite
![]() |
| starting up the wifite v2 BETA |
![]() |
| Wifite in action using BT5 R2 and RTL8187 wireless adapter |
![]() | |
| see the result its take time 2 or 10 hour to gathering the pin |
thanks to the BackTrack and derv82 for his nice job.....happy hunting!!
Langgan:
Ulasan (Atom)





