Google Adsense Scam

Google has been in the business for some time. From the beginning they have had the motto, "Do no Evil." However, I believe Google is breaking away from there non evil heritage. I believe this has been going on for some time. Years ago I ran a computer hardware review site. This was a very small time site and it didn't stay active long. Part of the reason for this was that the site was banned from Google Adsense. The excuse was invalid clicks. Hardware was expensive and because it was such a small site review samples from manufacturers where quite rare and with absolutely no revenue the site quickly became vacant of any updates and died. The only reason it still lives today is because I used the name in my current business.

Hacking WEP in under 10 minutes

WEP, also known as Wired Equivalent Privacy is a form of encryption used in early WiFi networks. While its not recommended today they're are still a very high percentage of people still using it. As with most technology people just set it and forget it leaving a high number of under secured networks in the air waves. As always I am not recommending you try hacking your neighbors WiFi networks. This should be done with all of your own equipment.

Find Hidden SSID's

Known as security though obscurity many people may hide there ssid's from broadcasting. Just like mac address blocking this is a worthless form of protection. There is nothing secure about hiding your SSID. Its like the wizard hiding behind the curtain. It just does not add any value to your security and like mac address blocking it adds complication with no reward. Today I am going to show you how easy it is to reveal a hidden SSID using the aircrack-ng suite. First things first. Start airdump-ng by using the following command. Replace the interface with your own.

Linux Tip: (Wireless Deauthing)

I found a great way to have some fun with friends and family. Using Linux to kick an individual or everyone off of an access point. Fun times you say, well lets see.

Deauthing is you pretending to be the access point asking the client to re connect. You spoof a re authorization packet to the client which makes the client try to reconnect to the access point. However, because you are constantly sending these packets the client can't connect because they continuously need to re authenticate. This is also how people kick users to set up a man in the middle attack. When you kick the client the client will automatically find another known access point. If you provide that to then they will connect to it. However, we are not going to get in to man in the middle attacks today. Maybe another time. ;-)

Linux Tip: (Bootsplash)

This tip is something I have wanted to do for ages.

Has anyone ever wanted to change the bootsplash to something a little more personal. Personally I don't like the color green and the pale green bootsplash that openSUSE uses looks more like the poop from a sick baby. Well its supper easy to change. I had no idea how easy it was until I did it.


Subscribe to The Linux Geek RSS