Tag Archives: cd

IT How to: Backup broken WindowsXP Computer with Linux LiveCD

IT How to: Backup broken WindowsXP Computer with Linux LiveCD Terminal Commands used: sudo /bin/bash mkdir /media/disk1 mount -t ntfs-3g /dev/sda1 /media/disk1 -o force mount -t filesys device folder -o force You can repeat the mkdir with disk2 and change the device to the correct device and get access to the other drives.

Linux time-shift installing from the Ubuntu 10.10 Live CD !!

Linux installing time-shift 4000x !!!!!! All the Eye Candy included !! Believe me, tis IS legacy hardware !!! It is a 3Ghz Pentium 4 !!

Ubuntu 10.10 – A quick look at Linux running from a live CD

A quick look at Ubuntu, a Linux based OS you can use for free. I download, burn to CD, and take a look at Ubuntu 10.10. Ubuntu is a Linux based operating system.

Ubuntu 11.04 (natty narwhal) daily live cd.mkv

Ubuntu 11.04 PS3 Download

WEP Cracking Wireless Hacking Live CD Download [FBI Version] (Nov 28 2010)

Download Latest File Now: www.filelarge.com This version used by the FBI and is for all systems except systems with the Intel B/G wireless cards (IPW2200). Live CD with all the tools you need to h@ck a WLAN / wireless Access point Linux (Live CD) and OS (runs from CD). WEP H@cking The Next Generation WEP is an encryption scheme, based on the RC-4 cipher, that is available on all 802.11a, b and g wireless products. WEP uses a set of bits called a key to scramble information in the data frames as it leaves the access point or client adapter and the scrambled message is then decrypted by the receiver. Both sides must have the same WEP key, which is usually a total of 64 or 128 bits long. A semi-random 24 bit number called an Initialization Vector (IV), is part of the key, so a 64 bit WEP key actually contains only 40 bits of strong encryption while a 128 bit key has 104. The IV is placed in encrypted frames header, and is transmitted in plain text. Traditionally, cr@cking WEP keys has been a slow and boring process. An attacker would have to capture hundreds of thousands or millions of packets—a process that could take hours or even days, depending on the volume of traffic passing over the wireless network. After enough packets were captured, a WEP cr@cking program such as Aircr@ck would be used to find the WEP key. Fast-forward to last summer, when the first of the latest generation of WEP cr@cking tools appeared. This current generation uses a combination of statistical