http://techierambles.blogspot.com/2008/09/outlook-2007-stuck-disconnected.html
Chris Conway criticized Most Haunted

Chris Conway Statement
Yes I know it don’t fit in the post but still 🙂 I’ve put a link to the image above.
I hate Mediums. They prey on the weak and gullible for money. This guy is just as bad. But its interesting here that he criticizes Most Haunted now he’s lost his contract with them. Most Haunted clearly having something to hide, had him remove it from his site. They forgot about Google Cache. It’s gone from that now too but I got a pic before it went.
Quality video tutorial on installing BackTrack 4 in a VMware+VMware tools-Not by me.
WEP Cracking using BackTrack 4
Little vid I created to show how easy it is to crack WEP. Shockingly people still have WEP set on their WIFI setups. You need to change it to WPA2 ASAP.
This vid is for educational purposes only as it’s illegal to crack anyone’s WIFI unless you have permission.
WPA and WPA2 is a lot harder to crack if you use a strong password as it requires a dictionary attack. If your password isn’t in their dictionary because you made it strong with special characters etc, then it will be harder for someone to crack.
You have to remember that you may think “So what if someone gets on my router. If they just download the odd e-mail then so be it.” Problem is once they are on, they can download anything. What with the new Copyright Bill act in place, they could download a Hollywood movie and it would trace back to your IP. You’re the one that would get the warning letters not them. Your internet connection is the one that would get cut off, not theirs. Also once they are on your network, they can perform a Man in The Middle Attack (mentioned in my other security posts). They could then intercept your banking details, e-mail login details and more. They could also, even jump onto your PC without you even knowing about it.
I’ll add more to these notes later when I can be bothered. To explain the commands and what it’s all doing.
Derren Brown Interview with Richard Dawkins
A quality and great interview with Richard Dawkins and Derren Brown. Explains so much, about cold reading, bullshit shows like Most Haunted and more. Best one is part 4 at 5:35. He’s talking about Most Haunted as I remember that episode. Most Haunted is fine if you look at it as entertainment. When it becomes an issue is if you base your beliefs on the message it puts across.
Oddly part 3 is blocked even though I’m in the UK. So I used www.hidemyass.com which is a US proxy which then oddly works.
Dan and Dan Films New Release
Yeah a new one
Dan and Dan Films
Twitter Security Hole 2-NOW FIXED-
Same idea as the other security flaw I found. The change password page I thought would at least be secure but it appears, even this page, Twitter is sending the passwords out in plain text instead of encrypting them.
Here the new password appears in the Username field of NetworkMiner. People may wonder what’s the use without a user name for these passwords. Well using other tabs in NetworkMiner you can get the username as well but I just never bothered to show that. Also, a lot of people have a bad habit of using the same password on other sites. So if someone gets your password for Twitter and you’re using it for, say, your googlemail account. If they find out your e-mail address then they’ll be able to get into that as well.
Further testing I changed the http to https before typing in the password. It’s making no difference. The password is still picked up by Wireshack and NetworkMiner. Meaning Twitter is sending the passwords in plain text.
I’m crap at explaining stuff so for a better and easier to understand explanation of a Man in The Middle Attack, check out Hak5’s vid
http://www.youtube.com/watch?v=N86xJpna9Js
UPDATE:
netresec.com used this video on their blog and said they reported this issue to Twitter security and got a swift reply. Good on them, but fuckers at Twitter never replied to me when I originally reported this. Besides, took them months to fix this which isn’t good.
Twitter Security Hole-NOW FIXED-
Found this issue while sniffing traffic on my network. You only really need to worry about this if you’re on a public network, such as an Internet Cafe etc. You can use Twitter just don’t update anything in your settings as that’s where the password gets sniffed. Although I wouldn’t really use Twitter on a public network full stop as there are other ways they can get into your account while sniffing the traffic.
This is also a reason you need to protect your WIFI. Using WPA2 is best with a strong password.
All this is doing is using a Man in The Middle Attack. Basically someone will get onto your network and then listening in to the traffic. They will fool your PC into thinking they are the router and the router into thinking they are your PC. They can then sniff all the traffic (as I’m doing with NetworkMiner in the video). With this they can pick up chat messages being sent, get login details where the login isn’t encrypted and more. Best way to protect yourself is to know who is on your network, which you obviously won’t if you’re on a public one. And all sites with https are secure (not totally but that’s another story and it’s a lot harder to break). Anyway, enough waffle, enjoy the vid.
Further testing I changed the http to https before typing in the password. It’s making no difference. The password is still picked up by Wireshack and NetworkMiner. Meaning Twitter is sending the passwords in plain text.
UPDATE:
netresec.com used my 2nd video in this series on their blog and said they reported this issue to Twitter security and got a swift reply. Good on them, but fuckers at Twitter never replied to me when I originally reported this. Besides, took them months to fix this which isn’t good.