Archive

Archive for September, 2002

Wireless Scanning – Wardriving / Warchalking

September 21st, 2002
Comments Off on Wireless Scanning – Wardriving / Warchalking

In my previous article about wireless security and hacking, I introduced common security threats in WLANs and ways that wireless hackers use them to break into a wireless network. Before a wireless hacker breaks into a WLAN, he/she must identify a suitable open network to launch her/his attack. This article explains what the common methods for wireless scanning are, and how to get protected against them as well.
Read more…

Uncategorized

LastLog Editor – Unix LogFiles

September 7th, 2002
Comments Off on LastLog Editor – Unix LogFiles

This tutorial was written to show Unix users how to create a simlpe Unix LogFile editor. I decided to write this article, right after I have read the tutorial by pajka (hysteria.sk), which talks about Unix LogFiles. This tutorial gives detailed information about LastLog logging file, the structure of the log file and how to change user´s entry. Of course, you are welcomed to try and build LogFiles editors for wtmp, utmp etc.
Read more…

Uncategorized