<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>101hacker </title><description>Ethical Hacking |cyber security</description><managingEditor>noreply@blogger.com (John ( Admin ))</managingEditor><pubDate>Sun, 1 Mar 2026 12:02:27 -0800</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">223</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://www.101hacker.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>Ethical Hacking |cyber security</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Quantum Cryptography - Security for mobile phones </title><link>http://www.101hacker.com/2014/07/quantum-cryptography-security-for.html</link><category>Articles</category><category>Cryptography</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Wed, 16 Jul 2014 20:02:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-5011122939431168630</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcSJ8K_V3GvNLtmVyJYo3G3NImWweh8SHPTh4Eb6f8SZKW6DqFZc" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcSJ8K_V3GvNLtmVyJYo3G3NImWweh8SHPTh4Eb6f8SZKW6DqFZc" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-size: large;"&gt;M&lt;/span&gt;odern technologies have made cutting-edge breakthroughs in the domains of safety, security, privacy and confidentiality aspects of mobile devices such that increased use of technology of Quantum Cryptography using &amp;nbsp;&lt;b&gt;Quantum Key Distribution&lt;/b&gt; as ultra-high security strategy have been advocated by promoters and marketers of this security system for mobile devices. &amp;nbsp;Indeed the need for gaining and enforcing secure mobile communications underpin societal needs with robust security offerings are now most in demand in society and business settings. This is most necessary to gain cover and security from online frauds, attacks, threats and attacks.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Moreover, it is also necessary to infer that &lt;b&gt;QC &lt;/b&gt;is very much in its infancy in modern times with its implementation and enforcement mainly confined to bulky, expensive, highly physically tethered server rooms in banks and other financial institutions which, by virtue of being custodians of valuable public funds, resources and assets, need highest degree of secure, safe and protected environments. The usage of QC in the domains of mobile devices is indeed of recent innovations based on research conducted by researchers in University of Bristol, who have successfully demonstrated use of this technology by cutting down the bulky, costly resources reduced to the extent of just using a chip into a hand held mobile device. Simply speaking, QC employs single particles of light (photons) as data couriers and scheme is dependent on IQC (integrated quantum circuit) or chip that is crucial for adoption of secure quantum communication networking, which could lead to making of mobile devices.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Before entering into detailed aspects of QC in the domains of &lt;b&gt;&lt;span style="color: #cc0000;"&gt;QKD&lt;/span&gt;&lt;/b&gt; it is necessary to understand how QKD operates. In a typical example as shown below, it is evidenced that sender generates random stream of classical bits and encodes them into sequence of non orthogonal quantum state of light over the quantum channel. Next, the recipient performs certain calculations which enable him to share some data with sender’s bit stream upon gaining of these quantum states. Next, channels check these correlations and presence of high correlations is enough to suggest that no major eavesdropping has taken place and the evidence of highly secure communication is evident.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Coming to the realms of getting &lt;b&gt;QC using QKD&lt;/b&gt; into mobile devices have been tried and tested by researchers in the Centre under the aegis of University of Bristol for Quantum Photonics in collaboration with Nokia. This experiment considered client-server quantum key distribution scheme under which lasers and detectors are situate on server side, accessible via telecom fibre networks to client needing only on-chip polarization rotator, fixed on mobile devices. The outcomes of research seem to be optimistic about increased usage of quantum enhanced secure communications between Companies and Members of public community equipped with mobile devices that could offer telecom-fiber tethering.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
With major breakthrough technology designing to delink QC in QKD from heavy, onerous and bulky tethered servers into the realms of mobile technology, the floodgates have opened to make optimum and greater use of &lt;b&gt;Quantum Cryptography &lt;/b&gt;security for mobile technology in most appropriate, convenient and user friendly manner, after due consideration and remedial actions for the threats and challenges of QC also.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;Author bio:&lt;/b&gt; I am Manton Angus. I focus on&lt;a href="http://www.essayreviewo.com/" rel="nofollow" target="_blank"&gt; honest essay writing &lt;/a&gt;reviews many years which have helped me out to gain knowledge in various disciplines of writing assignments for all class of students. I have worked in different essay writing companies from the last many years&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Android Hacking And Penetration Testing Course Launched With Special Discounts for 101Hacker Readers </title><link>http://www.101hacker.com/2014/05/android-hacking-and-penetration-testing_31.html</link><category>Android</category><category>Articles</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Sat, 31 May 2014 10:15:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-4211263749505383590</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: justify;"&gt;
We are happy to announce the launch of our &amp;nbsp;course &lt;span style="color: #38761d;"&gt;&lt;b&gt;&lt;span style="color: black;"&gt;"&lt;/span&gt;&lt;a href="http://goo.gl/PR0ETk" target="_blank"&gt;Android Hacking and Penetration Testing&lt;/a&gt;&lt;span style="color: black;"&gt;"&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;at &lt;a href="http://www.jsinfosec.com/" target="_blank"&gt;JSinfosec.com &lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span class="note"&gt;About The Course&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&amp;nbsp;&amp;nbsp; &lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/mq0zq1aqeiY" width="560"&gt;&lt;/iframe&gt;&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
The course will focus on the tools and techniques for testing the Security of Android Mobile applications. During the course, you will learn various topics such as Android architecture,Android security model, Android Application Pen testing and Exploitation, Reversing Android applications,static and dynamic analysis of android malware etc. After finishing the course you will be able to carry out a Penetration Test on a Android device and its applications. To get more in depth details, Please download our course syllabus from the following link&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;a href="http://goo.gl/78qFYV" target="_blank"&gt;&lt;b&gt;Syllabus -Android Hacking &amp;amp; Penetration Testing&amp;nbsp;&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
The course starts from the very basics and slowly takes you to more complicated topics, making it ideal for self paced learning. Following are a some of the Free Preview videos from the course&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;
1. Setting Up a Pen-testing Environment&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/eWowGSHSK5o?rel=0" width="560"&gt;&lt;/iframe&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
2. Android Architecture&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/n-gjH1QI52g?rel=0" width="560"&gt;&lt;/iframe&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
3. APK Files in a Nutshell&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/3n9wH2qVo2E?rel=0" width="560"&gt;&lt;/iframe&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://goo.gl/PR0ETk" target="_blank"&gt;&lt;img alt="http://goo.gl/PR0ETk" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijg9aUKR5deboQ-EQ-dX0XDqg2dmd5Hw1T-MZtlOSjB7M-v9d2mv-F2Dn8TlQqfY5LoFQrHyKx4jp9Y4WMva9TzNj83jy8jjczdUymA2IBuCq8tpH9PAkqV2RjtemacG5qwLy84KRsX7KB/s1600/POSTER.jpg" height="222" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
The Course Currently costs&lt;span style="color: #cc0000;"&gt;&lt;b&gt; 99$&lt;/b&gt;&lt;/span&gt; and is available at Udemy, You can join the course from the following Link&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;(&lt;span style="color: #cc0000;"&gt;Update :- &lt;/span&gt;&lt;/b&gt;We are giving special discounts for 101hacker followers and readers, Use the following coupon code to avail the course for jus&lt;b&gt;t &lt;span style="color: #cc0000;"&gt;75 $&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&amp;nbsp;)&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;b&gt;Coupon code :-&lt;/b&gt; &amp;nbsp;&amp;nbsp;&lt;b&gt;&lt;span style="color: #cc0000;"&gt;101hacker &lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;&lt;a href="http://goo.gl/PR0ETk" target="_blank"&gt;Join Now &lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijg9aUKR5deboQ-EQ-dX0XDqg2dmd5Hw1T-MZtlOSjB7M-v9d2mv-F2Dn8TlQqfY5LoFQrHyKx4jp9Y4WMva9TzNj83jy8jjczdUymA2IBuCq8tpH9PAkqV2RjtemacG5qwLy84KRsX7KB/s72-c/POSTER.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Android Hacking And Penetration Testing Course Promo</title><link>http://www.101hacker.com/2014/05/android-hacking-and-penetration-testing.html</link><category>Android</category><category>Articles</category><category>tutorials</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Mon, 26 May 2014 08:18:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-7410068471031246546</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
Hi guys, we will be launching &amp;nbsp;our new course "&lt;b&gt;&lt;span style="color: #990000;"&gt;Android Hacking and Pen-testing&lt;/span&gt;&lt;/b&gt;" at &lt;span style="color: blue;"&gt;&lt;a href="http://jsinfosec.com/"&gt;JSinfosec.com&lt;/a&gt; &lt;/span&gt;very soon hope you guys will like it&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;&lt;span style="color: #cc0000;"&gt;&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #cc0000;"&gt;&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;&lt;b&gt;Android Hacking And Pen testing &amp;nbsp;Course Promo&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="270" src="//www.youtube.com/embed/VTBkc_5Af_I" width="480"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;A&lt;/span&gt;ndroid Hacking and Penetration Testing course is a highly practical and hands on video course. The course will focus on the tools and techniques for testing the Security of Android Mobile applications. During the course, students will learn various topics such as Android architecture,Android security model, Android Application Pentesting and Exploitation, Reversing Android applications,static and dynamic analysis of android malware etc.&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
Course Release Date :-&amp;nbsp; With in May end&lt;br /&gt;
&lt;br /&gt;
Contact :- feedback@jsinfosec.com

&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Launching Our New Website JSinfosec &amp; 101hacker's Future plans</title><link>http://www.101hacker.com/2014/04/launching-our-new-website-jsinfosec.html</link><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Tue, 1 Apr 2014 22:16:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-6239633087533358354</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1uWfeJcb5oFnefwjOP5-UkdjdnLV2keGOIyIjnmqFQL55xf6yHmeYP4xaVo_OKlo3DAUaH6Mq-llBfb93mOcUJfWFqENJcotXh4m2NlgW9fuIDgLe7XZQy-k_i2-yzUi4k4kfh7tNScwi/s1600/jsinfosec.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1uWfeJcb5oFnefwjOP5-UkdjdnLV2keGOIyIjnmqFQL55xf6yHmeYP4xaVo_OKlo3DAUaH6Mq-llBfb93mOcUJfWFqENJcotXh4m2NlgW9fuIDgLe7XZQy-k_i2-yzUi4k4kfh7tNScwi/s1600/jsinfosec.png" height="102" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Hi guys, Its been a very long time since i wrote an article at 101hacker.com the main reason for this is, I've been busy building &amp;nbsp;my new website Jsinfosec.com&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span class="note"&gt;&lt;b&gt;&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;About Jsinfosec.com&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;JSinfosec&lt;/b&gt; is actually a joint venture by me and my good friend Srinivas. Jsinfosec.com is still in its beta stage and we are working hard to build the website as soon as possible, At jsinfosec you can expect some high quality tutorials, Info sec News etc. We have planned many things, we have already started our Wireless hacking and pen-testing video series, we have planned to release android hacking and pen-testing video series by the end of April or the first week of May, for more info please visit &lt;a href="http://jsinfosec.com/"&gt;&lt;b&gt;&lt;span style="color: blue;"&gt;JSinfosec.com&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span class="note"&gt;&lt;b&gt;&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;Plans For 101hacker.com&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;/div&gt;
&lt;/div&gt;
We will continue to update 101hacker.com when ever we get time, so you need not worry about it . For people who have been following our wireless pen testing videos you can continue to watch them from &lt;a href="https://www.udemy.com/wireless-hacking-and-penetration-testing/"&gt;&lt;span style="color: blue;"&gt;&lt;b&gt;Udemy&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&amp;nbsp;, we have had problems uploading to you tube so we are uploading our videos to Udemy&amp;nbsp;

&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1uWfeJcb5oFnefwjOP5-UkdjdnLV2keGOIyIjnmqFQL55xf6yHmeYP4xaVo_OKlo3DAUaH6Mq-llBfb93mOcUJfWFqENJcotXh4m2NlgW9fuIDgLe7XZQy-k_i2-yzUi4k4kfh7tNScwi/s72-c/jsinfosec.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Know all about Chameleon Virus</title><link>http://www.101hacker.com/2014/02/know-all-about-chameleon-virus.html</link><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Wed, 26 Feb 2014 18:53:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-4543417863356297274</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQysqiYxSeZhdoIkGSlZaeh1KSUMtZrRHgAE7IAnBDgtmBfP5zRtpA_Lz-XZpxWDS_XTRzLYIkrO5-xvDRLGFPQ7iPPzeG33TuMEH5aE28Mw3z-srhbOVlQjr9bcBQqADwxMMjGE3n4rGI/s1600/Wi-f-virus-hacking-malware.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQysqiYxSeZhdoIkGSlZaeh1KSUMtZrRHgAE7IAnBDgtmBfP5zRtpA_Lz-XZpxWDS_XTRzLYIkrO5-xvDRLGFPQ7iPPzeG33TuMEH5aE28Mw3z-srhbOVlQjr9bcBQqADwxMMjGE3n4rGI/s320/Wi-f-virus-hacking-malware.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;T&lt;/span&gt;he past few days there's been a lot of buzz about a virus called Chameleon with spreads like common cold, between Wireless Access Points .&lt;span style="font-family: inherit;"&gt; &lt;b&gt;Chameleon &lt;/b&gt;is the product of the University of Liverpool’s School of Computer Science and Electrical Engineering and Electronics and shows for the first time that WiFi networks can be infected with a virus that moves through the air, jumping from access point to access point.&lt;/span&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b style="font-family: inherit;"&gt;WiFi access points&lt;/b&gt;&lt;span style="font-family: inherit;"&gt; have long been known to be potentially weak spots onto networks, often left unprotected by passwords or encryption, or still using the manufacturer’s or telecoms operator’s default security codes. But up until now, there hasn’t been a virus that could attack a WiFi network.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;
Chameleon behaves just as a disease would in a viral outbreak, moving faster through cities with dense populations, where access points (and humans) are closer together. The computer scientists simulated its outbreak in Belfast and London and found that in the higher density of London, the connectivity between devices was a more important factor than how susceptible the access points were.&lt;br /&gt;
&lt;br /&gt;
The&lt;b&gt; malware&lt;/b&gt; was also able to avoid detection and find the other visible WiFi access points from its current location that were least protected by encryption and passwords.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;It propagates in the following sequence:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ol style="text-align: left;"&gt;
&lt;li&gt;It Establish a list of susceptible APs within the range&lt;/li&gt;
&lt;li&gt;Bypass any encryption Security on the targeted AP&lt;/li&gt;
&lt;li&gt;Bypass the administrative interface on the targeted AP&lt;/li&gt;
&lt;li&gt;Identify and Store AP System Settings&lt;/li&gt;
&lt;li&gt;Replace the AP firmware on with the virus-loaded firmware.&lt;/li&gt;
&lt;li&gt;Import the victim original AP System Settings on newly loaded firmware&lt;/li&gt;
&lt;li&gt;Let's Propagate! Back to Step one to next Target.&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
The Chameleon attack is a serious threat for &lt;b&gt;WiFi network security.&lt;/b&gt; The research shows that this kind of attack is undetectable to any Antivirus and Wireless Intrusion Detection System (IDS).&amp;nbsp;However, the virus itself doesn’t exist in the wild and created for the demo purpose in the research lab only, though it is very likely that a malicious version could be created and released into the wild by cyber criminals and malware writers. To know more about the Chameleon you can have a look at the &lt;a href="http://jis.eurasipjournals.com/content/pdf/1687-417X-2013-2.pdf" rel="nofollow" target="_blank"&gt;&lt;b&gt;white paper&amp;nbsp;&lt;/b&gt;&lt;/a&gt;&amp;nbsp;released by the researchers&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: x-small;"&gt;Source :- &lt;i&gt;&lt;span style="color: #cc0000;"&gt;TheHackersNews ,&amp;nbsp;forbes&lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgQysqiYxSeZhdoIkGSlZaeh1KSUMtZrRHgAE7IAnBDgtmBfP5zRtpA_Lz-XZpxWDS_XTRzLYIkrO5-xvDRLGFPQ7iPPzeG33TuMEH5aE28Mw3z-srhbOVlQjr9bcBQqADwxMMjGE3n4rGI/s72-c/Wi-f-virus-hacking-malware.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Analyzing Beacon Frames Using Wire shark - Part 6 of Wireless Hacking Series</title><link>http://www.101hacker.com/2013/12/analyzing-beacon-frames-using-wire.html</link><category>Articles</category><category>kali</category><category>Wifi Hacking</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Tue, 24 Dec 2013 08:22:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-9070818123133510184</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1EF2Ntupq3sU6cZ2j7sDTp6tzGaDMp23Ac-XkM-kgbSBPf5mMP1Nu0y9Dsn_B9dneIbPLQIj5sySKK4BO5K583M-rFSsUDOOZRNNKId2EHWkOgN3K5H82ozEo370Zvdhax_3tYYZA9t0/s1600/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1EF2Ntupq3sU6cZ2j7sDTp6tzGaDMp23Ac-XkM-kgbSBPf5mMP1Nu0y9Dsn_B9dneIbPLQIj5sySKK4BO5K583M-rFSsUDOOZRNNKId2EHWkOgN3K5H82ozEo370Zvdhax_3tYYZA9t0/s1600/images.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Hi, Viewers This is the part 6 of the WiFi hacking series . In this Video we learn about beacon frames and we will analyze them using Wire shark&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
&lt;span class="note"&gt;&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;Analyzing Beacon Frames Using&amp;nbsp;Wire shark&amp;nbsp;- Part 6 of Wireless Hacking Series&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/KKNf9SKrKLQ" width="560"&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
I hope the above info helps you, If you have any doubts , queries or suggestions please comment below&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1EF2Ntupq3sU6cZ2j7sDTp6tzGaDMp23Ac-XkM-kgbSBPf5mMP1Nu0y9Dsn_B9dneIbPLQIj5sySKK4BO5K583M-rFSsUDOOZRNNKId2EHWkOgN3K5H82ozEo370Zvdhax_3tYYZA9t0/s72-c/images.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>7 Computer Security Protocols that should be Mandatory</title><link>http://www.101hacker.com/2013/12/7-computer-security-protocols-that.html</link><category>Articles</category><category>security</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Sun, 22 Dec 2013 18:52:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-4609834313306271696</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw-ASq1n337_-EKWA761df_n7AK6DyCGJuVEd8pVq56aHdnFeR54DuXrpPluM80-llzvQm270Zh29jbw7v8tnNJQSPdE4jOTEoZipBDBKhXSLLkAixhFFn00HplEIY4XZcn9yElulheR0/s1600/hacker.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw-ASq1n337_-EKWA761df_n7AK6DyCGJuVEd8pVq56aHdnFeR54DuXrpPluM80-llzvQm270Zh29jbw7v8tnNJQSPdE4jOTEoZipBDBKhXSLLkAixhFFn00HplEIY4XZcn9yElulheR0/s320/hacker.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Computer security entails protecting of the computer and the computer software from data loss, destruction and authorized access. There are several computer protocols put in place to ensure that chances of above mentioned are reduced or totally eliminated, they include practices carried out or installation of certain software or programs on the computer to enable and improve security.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Among the 7 computer security protocols that should be mandatory are&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;1. Using certified genuine Operating Systems &lt;/b&gt;&lt;/span&gt;- to ensure that your computer is secure from data loss, possible damage and software malfunctions ensure that you purchase and use the genuine operating systems. Always desist from installing any software that cannot be trusted.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;2. Protecting home and private computers &lt;/span&gt;&lt;/b&gt;– always ensure that your Personal computers are adequately protected to eliminate possible risk. Always lock your screens wherever you leave your computer be it at home or in the office. You should also ensure that you make use of available anti – virus for your computer and also computer software should be updated always in good time.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;3. Encrypting sensitive locally stored files&lt;/span&gt;&lt;/b&gt; - Windows Operating System usually comes with file encryption features, which are usually in-built. There are other encryption programs that can assist in encryption work such as the TrueCrypt utility among others. These programs easily integrate well with windows explorer.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;4. Encrypting of personal information that is stored in cloud &lt;/span&gt;&lt;/b&gt;– though vendors of cloud storage vendors will normally assure that the data you have stored in cloud is utterly safe, it’s strongly advised that you encrypt it to avoid it getting to the wrong hands.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000; font-weight: bold;"&gt;5. Preventing Keystroke loggers and other data snoops&amp;nbsp;&lt;/span&gt;- ensure that your firewall and antivirus are in good working order to eliminate vulnerability of your systems from computer criminals, they attack when there is weakness and easy access. There are so many antivirus software’s available online. User must choose best-rated antivirus software for his PC.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;6. Manual virus scanning&lt;/span&gt;&lt;/b&gt; - sometimes viruses sneak through even when there are automatic updates and regular malware scans, so it’s advisable to occasionally perform the scan manually.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;7. Destroying old data &lt;/span&gt;&lt;/b&gt;– old and unused data should be properly destroyed preferably using utilities that are erase secure. This prevents data which sometimes is sensitive from falling into wrong hands.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
The above 7 computer security protocols should be mandatory to ensure that the data and software in your computer is totally safe.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Ensure that all data is secured with strong encryptions, use genuine trusted software and programs and constantly update and scan your computer to improve on security. Keep your computer safe.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Author Bio:&lt;/span&gt;&lt;/b&gt; &lt;i&gt;&lt;b&gt;Samaira Rogers&lt;/b&gt;&lt;/i&gt; is a technical writer with more than 3 years of experience. She likes to keep herself updated with latest technology.&lt;/div&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhw-ASq1n337_-EKWA761df_n7AK6DyCGJuVEd8pVq56aHdnFeR54DuXrpPluM80-llzvQm270Zh29jbw7v8tnNJQSPdE4jOTEoZipBDBKhXSLLkAixhFFn00HplEIY4XZcn9yElulheR0/s72-c/hacker.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title> 802.11 Wlan Packets - Part 5 of Wireless Hacking Series </title><link>http://www.101hacker.com/2013/12/80211-wlan-packets-part-5-of-wireless.html</link><category>Articles</category><category>kali</category><category>Wifi Hacking</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Mon, 16 Dec 2013 05:50:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-1775690099320005597</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1EF2Ntupq3sU6cZ2j7sDTp6tzGaDMp23Ac-XkM-kgbSBPf5mMP1Nu0y9Dsn_B9dneIbPLQIj5sySKK4BO5K583M-rFSsUDOOZRNNKId2EHWkOgN3K5H82ozEo370Zvdhax_3tYYZA9t0/s1600/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1EF2Ntupq3sU6cZ2j7sDTp6tzGaDMp23Ac-XkM-kgbSBPf5mMP1Nu0y9Dsn_B9dneIbPLQIj5sySKK4BO5K583M-rFSsUDOOZRNNKId2EHWkOgN3K5H82ozEo370Zvdhax_3tYYZA9t0/s1600/images.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Hi, Viewers This is the part 5 of the WiFi hacking series . In this video we will have a look at Wireless Lan Packets and we will analyse them using wire shark&lt;/div&gt;
&lt;br /&gt;
&lt;span class="note"&gt;&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;802.11 Wlan Packets - Part 5 of Wireless Hacking Series&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/zn5FJHua1a4" width="420"&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
I hope the above info helps you, If you have any doubts , queries or suggestions please comment below&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1EF2Ntupq3sU6cZ2j7sDTp6tzGaDMp23Ac-XkM-kgbSBPf5mMP1Nu0y9Dsn_B9dneIbPLQIj5sySKK4BO5K583M-rFSsUDOOZRNNKId2EHWkOgN3K5H82ozEo370Zvdhax_3tYYZA9t0/s72-c/images.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Top 5  Must Read Articles Of 101hacker.com</title><link>http://www.101hacker.com/2013/11/top-5-must-read-articles-of-101hackercom.html</link><category>Articles</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Wed, 27 Nov 2013 19:46:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-7344053711880810314</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8GhEh2Ur3x7KLtBmxnU_UfhM5kV8UMkpj3TLapVRWfDvSCo3npGm5hVpEiSguDI3FqU9hy9Y7azo2x2aLkbQVXtmeRfBdNLDyuUZb_VU85OdiVBBOsqc0frzSTu9Wkfuzo1yXPeZm6d8/s1600/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="116" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8GhEh2Ur3x7KLtBmxnU_UfhM5kV8UMkpj3TLapVRWfDvSCo3npGm5hVpEiSguDI3FqU9hy9Y7azo2x2aLkbQVXtmeRfBdNLDyuUZb_VU85OdiVBBOsqc0frzSTu9Wkfuzo1yXPeZm6d8/s320/images.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Hi readers, Its been almost three and half years since i started this website , I first began this website as a small personal blog later realized that many where interested in my articles so i launched 101hacker.com . I have seen both the ups and downs in my blogging carrier. When feeling a bit low, the only thing that kept me going was the love and encouragement &amp;nbsp;of my blog &amp;nbsp;readers and followers . So at this moment i would like to specially thank all my blog readers and followers for their continuous support. To review what i did at 101hacker.com, i have compiled some of the best articles of 101hacker.com that every one should read&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span class="note" style="font-family: Georgia, Times New Roman, serif;"&gt;Top 5 Must Read Articles Of 101Hacker.com&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style="text-align: left;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;1. &lt;a href="http://www.101hacker.com/2012/12/phishing-attacks-in-public-hotspots.html#ixzz2luGCVfBG"&gt;&lt;span style="color: #cc0000;"&gt;Phishing Attacks In Public Hotspots&amp;nbsp;&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Dns Based Phishing attack in public Hotspots &amp;nbsp;gives a brief practical insight on how to carry out a DNS-based phishing attacks in public Wi-Fi hotspots to trick users into sharing their personal information such as passwords, credit card details etc&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style="text-align: left;"&gt;
&lt;span style="color: #cc0000;"&gt;2.&amp;nbsp;&lt;a href="http://www.101hacker.com/2011/07/hack-remote-routers-using-telnet.html"&gt;&lt;span style="color: #cc0000;"&gt;Hack Remote Routers Using Telnet&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvequceI759YYQgYRnRFBihyphenhyphenZ6NmKcpMjm8wEy4X6jCStbdGHdqL9haZaoHrzdf2qwC88wKWQrjz_6QRjKADBvuoLGfbKRv_I8khpLuyp-GMSJsmO7BQ9rseWY1xrZhowF5Anxfv1Yiks/s320/linksys.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvequceI759YYQgYRnRFBihyphenhyphenZ6NmKcpMjm8wEy4X6jCStbdGHdqL9haZaoHrzdf2qwC88wKWQrjz_6QRjKADBvuoLGfbKRv_I8khpLuyp-GMSJsmO7BQ9rseWY1xrZhowF5Anxfv1Yiks/s200/linksys.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Telnet is a legacy remote terminal TCP/IP application used for remote administration, Telnet is notorious for transmitting communications in plain text and has long since been superseded by SSH that uses encrypted channels so it is rare to see telnet in use on the Internet .But you will be surprised to know that most of the routers have telnet serveries running on them by default even today ,This is a serious vulnerability ,this allows malicious users to connect to the router from anywhere in the world using default credentials, and can wreak havoc.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style="text-align: left;"&gt;
&lt;span style="color: #cc0000;"&gt;3.&amp;nbsp;&lt;a href="http://www.101hacker.com/2011/08/how-to-hack-facebook-accounts-by.html"&gt;&lt;span style="color: #cc0000;"&gt;How To Hack Facebook Accounts By Tabnabbing&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZELL0lSuJfwx5tbjGnDyX8mWJCZCG5rknqH-LLse3gEnhtkxn354KvWnsUkHYd0ztgPj68bW38ixDtHwTtLbgCar6zgDQkKP2Tw8MCOUnl5QyxmvTETtZzhLmkWoOEH6WKxEhHkblQjM/s1600/hack-facebook-account-online.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="159" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZELL0lSuJfwx5tbjGnDyX8mWJCZCG5rknqH-LLse3gEnhtkxn354KvWnsUkHYd0ztgPj68bW38ixDtHwTtLbgCar6zgDQkKP2Tw8MCOUnl5QyxmvTETtZzhLmkWoOEH6WKxEhHkblQjM/s200/hack-facebook-account-online.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Tabnabbing is a new type of &amp;nbsp;phishing attack. It basically refers to a website that is changing its look and feels to a fake website after some time of inactivity. It is about a page we’ve been looking at, but will change behind our backs, when we aren’t looking....&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style="text-align: left;"&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;4.&amp;nbsp;&lt;a href="http://www.101hacker.com/2011/08/how-to-hack-remote-adsl-routers.html"&gt;&lt;span style="color: #cc0000;"&gt;How To Hack Remote ADSL routers&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/h4&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAqI-gbJ9Xb8OpoFo8smlgpqkmaaw1556RkUx_wTTmchTl0tXioU11l8HLx3MA5eqDSD8cpqxfjuUDskISlhqU_27XTxFpZ6LFnTesk1sPA9orFgH_9Roo8MbrTzi15FzpeEVCDeX6CWY/s200/1.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="163" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhAqI-gbJ9Xb8OpoFo8smlgpqkmaaw1556RkUx_wTTmchTl0tXioU11l8HLx3MA5eqDSD8cpqxfjuUDskISlhqU_27XTxFpZ6LFnTesk1sPA9orFgH_9Roo8MbrTzi15FzpeEVCDeX6CWY/s200/1.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
ADSL routers also known as DSL modems is a device used to connect the computer to the DSL phone line for using Internet Services (broad band ).Some of these ADSL routers have a serious vulnerability in them, which allows a attacker to have complete access to the router settings..&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style="text-align: left;"&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;5. &lt;a href="http://www.101hacker.com/2010/12/hashes-and-seeds-know-basics.html"&gt;&lt;span style="color: #cc0000;"&gt;Different Types Of Hashes And How To Identify Them&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/h4&gt;
&lt;div style="text-align: justify;"&gt;
A tutorial on how to identify different types of hashes by just looking at them, this info will help you when your cracking password hashes&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
I hope the above info was helpful , If you any queries or doubts please post your comments&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8GhEh2Ur3x7KLtBmxnU_UfhM5kV8UMkpj3TLapVRWfDvSCo3npGm5hVpEiSguDI3FqU9hy9Y7azo2x2aLkbQVXtmeRfBdNLDyuUZb_VU85OdiVBBOsqc0frzSTu9Wkfuzo1yXPeZm6d8/s72-c/images.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Wireless Sniffing - Part 4 of WiFi Hacking Series </title><link>http://www.101hacker.com/2013/11/wireless-sniffing-part-4-of-wifi.html</link><category>Articles</category><category>Backtrack tutorial</category><category>kali</category><category>Wifi Hacking</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Thu, 7 Nov 2013 19:04:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-7741549530470315833</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1EF2Ntupq3sU6cZ2j7sDTp6tzGaDMp23Ac-XkM-kgbSBPf5mMP1Nu0y9Dsn_B9dneIbPLQIj5sySKK4BO5K583M-rFSsUDOOZRNNKId2EHWkOgN3K5H82ozEo370Zvdhax_3tYYZA9t0/s1600/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="182" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1EF2Ntupq3sU6cZ2j7sDTp6tzGaDMp23Ac-XkM-kgbSBPf5mMP1Nu0y9Dsn_B9dneIbPLQIj5sySKK4BO5K583M-rFSsUDOOZRNNKId2EHWkOgN3K5H82ozEo370Zvdhax_3tYYZA9t0/s200/images.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
This Video is part of the Wireless Hacking Series by 101hacker.com. In this Video we will learn how to sniff wireless networks using tools Available in kali Linux&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/e5hCrlaZZX4?list=UUCpw5SuMq-FGcCX_T9dRxhg" width="560"&gt;&lt;/iframe&gt;
&lt;/div&gt;
&lt;br /&gt;
I hope the above info helps you, If you have any doubts , queries or suggestions please comment below&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1EF2Ntupq3sU6cZ2j7sDTp6tzGaDMp23Ac-XkM-kgbSBPf5mMP1Nu0y9Dsn_B9dneIbPLQIj5sySKK4BO5K583M-rFSsUDOOZRNNKId2EHWkOgN3K5H82ozEo370Zvdhax_3tYYZA9t0/s72-c/images.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>WiFi Standards, Bands and Channels - Part 3.1 Of WiFi Hacking Series </title><link>http://www.101hacker.com/2013/10/wifi-standards-bands-and-channels-part.html</link><category>Articles</category><category>kali</category><category>Wifi Hacking</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Thu, 31 Oct 2013 21:09:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-9051100004603363379</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.nit.edu.in/wp-content/uploads/2012/06/wifi63.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="179" src="http://www.nit.edu.in/wp-content/uploads/2012/06/wifi63.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
Hi, all this is the part 3.1 of the WiFi Hacking Series .In this video we will have a look the Wireless standards then we will discuss about &amp;nbsp;Various wireless bands and channels&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/QKJKUC6nj-s?list=UUCpw5SuMq-FGcCX_T9dRxhg" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
I hope the above info helps you, If you have any doubts , queries or suggestions please comment below&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>WiFi Basics - Modes  Part 3 of WiFi Hacking Series </title><link>http://www.101hacker.com/2013/10/wifi-basics-modes-part-3-of-wifi.html</link><category>Articles</category><category>kali</category><category>Wifi Hacking</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Mon, 28 Oct 2013 19:56:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-1903427607511621395</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1EF2Ntupq3sU6cZ2j7sDTp6tzGaDMp23Ac-XkM-kgbSBPf5mMP1Nu0y9Dsn_B9dneIbPLQIj5sySKK4BO5K583M-rFSsUDOOZRNNKId2EHWkOgN3K5H82ozEo370Zvdhax_3tYYZA9t0/s1600/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1EF2Ntupq3sU6cZ2j7sDTp6tzGaDMp23Ac-XkM-kgbSBPf5mMP1Nu0y9Dsn_B9dneIbPLQIj5sySKK4BO5K583M-rFSsUDOOZRNNKId2EHWkOgN3K5H82ozEo370Zvdhax_3tYYZA9t0/s1600/images.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
Hi, Viewers This is the part 3 of the WiFi hacking series . In this video we will first have a look at some of the commonly used abbreviations and terms, then we will have a look at the different Wireless Modes . Finally we will learn how we can switch between various modes&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/oC8wQDYdBos?list=UUCpw5SuMq-FGcCX_T9dRxhg" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
I hope the above info helps you, If you have any doubts , queries or suggestions please comment below&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1EF2Ntupq3sU6cZ2j7sDTp6tzGaDMp23Ac-XkM-kgbSBPf5mMP1Nu0y9Dsn_B9dneIbPLQIj5sySKK4BO5K583M-rFSsUDOOZRNNKId2EHWkOgN3K5H82ozEo370Zvdhax_3tYYZA9t0/s72-c/images.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>WiFi Hacking Series Part-2 Getting Started With Wireless Card </title><link>http://www.101hacker.com/2013/10/wifi-hacking-series-part-2-getting.html</link><category>Articles</category><category>kali</category><category>tutorials</category><category>Wifi Hacking</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Thu, 24 Oct 2013 18:39:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-4808011358287550050</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1EF2Ntupq3sU6cZ2j7sDTp6tzGaDMp23Ac-XkM-kgbSBPf5mMP1Nu0y9Dsn_B9dneIbPLQIj5sySKK4BO5K583M-rFSsUDOOZRNNKId2EHWkOgN3K5H82ozEo370Zvdhax_3tYYZA9t0/s1600/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1EF2Ntupq3sU6cZ2j7sDTp6tzGaDMp23Ac-XkM-kgbSBPf5mMP1Nu0y9Dsn_B9dneIbPLQIj5sySKK4BO5K583M-rFSsUDOOZRNNKId2EHWkOgN3K5H82ozEo370Zvdhax_3tYYZA9t0/s1600/images.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/TEQUcwLnIFQ?list=PL4KhypoaXQRALNLxpg59alqTUasJmPunp" width="560"&gt;&lt;/iframe&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
I hope the above info helps you, If you have any doubts , queries or suggestions please comment below&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1EF2Ntupq3sU6cZ2j7sDTp6tzGaDMp23Ac-XkM-kgbSBPf5mMP1Nu0y9Dsn_B9dneIbPLQIj5sySKK4BO5K583M-rFSsUDOOZRNNKId2EHWkOgN3K5H82ozEo370Zvdhax_3tYYZA9t0/s72-c/images.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Crack Password Protected Zip Files Using Fcrackzip </title><link>http://www.101hacker.com/2013/10/crack-password-protected-zip-files.html</link><category>Articles</category><category>cracking</category><category>hacktips</category><category>kali</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Tue, 22 Oct 2013 22:39:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-4902116047266139659</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGUtJPwmDwuVtMK9WenNmCX0DCcbyWEtTLvP-b1gpFrXt_l8ICfBxv1lpmchXr7gVwCEV7QUiFFpli0Zkew9mMyySxmcQh0IfctooQhkn22N3WGUAp9KcaxSLmelks2OCcGr5Z7GXuFoQ/s1600/images.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGUtJPwmDwuVtMK9WenNmCX0DCcbyWEtTLvP-b1gpFrXt_l8ICfBxv1lpmchXr7gVwCEV7QUiFFpli0Zkew9mMyySxmcQh0IfctooQhkn22N3WGUAp9KcaxSLmelks2OCcGr5Z7GXuFoQ/s1600/images.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
&lt;span class="note" style="font-family: Georgia, Times New Roman, serif;"&gt;Crack Password Protected Zip Files Using Fcrackzip&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/v9udzkdNnuQ?list=UUCpw5SuMq-FGcCX_T9dRxhg" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
Hope the above info helps you , If you have any doubts or queries regarding the post . Please comment below&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGUtJPwmDwuVtMK9WenNmCX0DCcbyWEtTLvP-b1gpFrXt_l8ICfBxv1lpmchXr7gVwCEV7QUiFFpli0Zkew9mMyySxmcQh0IfctooQhkn22N3WGUAp9KcaxSLmelks2OCcGr5Z7GXuFoQ/s72-c/images.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>WiFi Hacking Series Part-1 Introduction and Requirements </title><link>http://www.101hacker.com/2013/10/wifi-hacking-series-part-1-introduction.html</link><category>Articles</category><category>Wifi Hacking</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Mon, 21 Oct 2013 09:39:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-2163201074096937053</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcQvrURugoikzRMAVn4WOh5K46HZPWHMHcf17FF9CTnb9_Wfx7Vd" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="182" src="https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcQvrURugoikzRMAVn4WOh5K46HZPWHMHcf17FF9CTnb9_Wfx7Vd" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Hi readers, We are happy to announce the launch of our new video Tutorial series on Wireless Hacking .We will be posting videos on this topic regularly in our video channel 101hackervideos, So Please subscribe our channel and don't miss the updates&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
What to Expect from this Video Series ?&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Basics of IEEE 802.11 WLAN Communication&amp;nbsp;&lt;/li&gt;
&lt;li&gt;WLAN Vulnerabilities&lt;/li&gt;
&lt;li&gt;Attacking WLAN Infrastructure&lt;/li&gt;
&lt;li&gt;Cracking (WEP, WPA/WPA2 personal and enterprise) Encryption&lt;/li&gt;
&lt;li&gt;Real World Attacks (MITM , Spoofing , Honey pots, DDOS etc.)&lt;/li&gt;
&lt;li&gt;AP-less Hacking&lt;/li&gt;
&lt;li&gt;War driving&lt;/li&gt;
&lt;li&gt;Using Third Party Devices For Wi-Fi Pen testing (Android Phones)&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
And More .......&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class="note"&gt;WiFi Hacking Series Part-1 Introduction and Requirements&lt;/span&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/NdJgjVYJC88?list=UUCpw5SuMq-FGcCX_T9dRxhg" width="560"&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
I hope the above info helps you, If you have any doubts , queries or suggestions please comment below&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How To Create Dictionaries for password cracking using crunch </title><link>http://www.101hacker.com/2013/10/how-to-create-dictionaries-for-password.html</link><category>Articles</category><category>cracking</category><category>How to</category><category>kali</category><category>video</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Mon, 14 Oct 2013 01:23:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-3095885857701708159</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjOS2y6YaLgZdV38PRe41JALvSzb8u0rnfhzz19RzxsWOtNTeGcOrl-9UBG6v_S0xhq89I6TksT2bfAUYsN8lsvKt4k_GDtfyApnnALkJNdD23e2yn4faX8Dyu_XXNT2r85afX89CE5mI/s1600/68762075630_Password_DictionaryWordlist.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjOS2y6YaLgZdV38PRe41JALvSzb8u0rnfhzz19RzxsWOtNTeGcOrl-9UBG6v_S0xhq89I6TksT2bfAUYsN8lsvKt4k_GDtfyApnnALkJNdD23e2yn4faX8Dyu_XXNT2r85afX89CE5mI/s200/68762075630_Password_DictionaryWordlist.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
Hi, Readers from today onward's we will be posting some hack tips mostly small tutorials on how to use tools, scripts etc while pen-testing and hacking. Today i will be talking about a tool called crunch, which is used for creating dictionaries for password cracking (dictionary attack )&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="note" style="font-family: Georgia, Times New Roman, serif;"&gt;About Crunch :-&lt;/span&gt;
&lt;br /&gt;
Crunch is a wordlist generator where you can specify a standard character set or a character set you specify. crunch can generate all possible combinations and permutations.&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;a href="http://sourceforge.net/projects/crunch-wordlist/" rel="nofollow"&gt;&lt;b&gt;&lt;span style="color: blue;"&gt;Download&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class="note" style="font-family: Georgia, Times New Roman, serif;"&gt; Crunch Tutorial :-&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="360" src="//www.youtube.com/embed/z5npUfcVGOo" width="480"&gt;&lt;/iframe&gt;
&lt;/div&gt;
&lt;br /&gt;
Hope the above info helps you, For more such hack tips please subscribe our channel &lt;a href="https://www.youtube.com/user/101hackervideos"&gt;101hackervideos&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjOS2y6YaLgZdV38PRe41JALvSzb8u0rnfhzz19RzxsWOtNTeGcOrl-9UBG6v_S0xhq89I6TksT2bfAUYsN8lsvKt4k_GDtfyApnnALkJNdD23e2yn4faX8Dyu_XXNT2r85afX89CE5mI/s72-c/68762075630_Password_DictionaryWordlist.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Bruteforcing HTTP Basic Authentication Using Hydra </title><link>http://www.101hacker.com/2013/09/bruteforcing-http-basic-authentication.html</link><category>Articles</category><category>How to</category><category>tutorials</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Mon, 16 Sep 2013 21:09:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-1188492064176386020</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: left;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl4m6ntlnjs5AuRKLF5Ti7A9LOkrj2MUqJ9EYQPEPBpX0VABPG0bf-BAR-SNQoMCaili9EYblgDdv8-Zl8DyynYXQOGWuhjBWKUHOnePFEwst5zroCMHhAXn9cAjf7rDylHhKCwdGFz_M/s1600/term-bruteforce.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl4m6ntlnjs5AuRKLF5Ti7A9LOkrj2MUqJ9EYQPEPBpX0VABPG0bf-BAR-SNQoMCaili9EYblgDdv8-Zl8DyynYXQOGWuhjBWKUHOnePFEwst5zroCMHhAXn9cAjf7rDylHhKCwdGFz_M/s320/term-bruteforce.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
In the following tutorial i will explain how you can use hydra to brute force HTTP Basic authentication, So first a fall what is HTTP Basic Authentication and how does it work?&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class="note"&gt;&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;HTTP Basic Authentication&amp;nbsp;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
In the context of an HTTP transaction, basic access authentication is a method for an HTTP user agent to provide a user name and password when making a request. Working of the HTTP basic auth is shown in the following diagram&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu-mBP563849ZUSOIWqunVlAXrcQ-hTu360_EC-CWz0xcXtlb438L-1pr0oFuYvJquxqYer0xHxxiVgk7hTRNd1FhmDSBKf7Krk9V8Z8bexWKWZi1h4sIeG4qZhr36g0stAPuw6dlPqnE/s1600/security-httpBasicAuthentication.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhu-mBP563849ZUSOIWqunVlAXrcQ-hTu360_EC-CWz0xcXtlb438L-1pr0oFuYvJquxqYer0xHxxiVgk7hTRNd1FhmDSBKf7Krk9V8Z8bexWKWZi1h4sIeG4qZhr36g0stAPuw6dlPqnE/s1600/security-httpBasicAuthentication.gif" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
First the client requests for protected Resource (eg Login). The server responds to the client with a dialog box requesting user name and password. The client submits the user name and password to the server. If the credentials are correct the server will grant access to the protected resource. If the credentials are wrong the client will see the dialog box again till he logs in correctly. HTTP basic auth is implemented in many places the one that you can see commonly is in Router Log In's.&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class="note"&gt;&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;How To Use Hydra To Crack HTTP Basic Authentication &lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
In the following Video i will show you how you can crack router pass with hydra&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/t9LyUW51Klk" width="420"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
I hope the above information was helpful . If you have any doubts please pass your comments&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl4m6ntlnjs5AuRKLF5Ti7A9LOkrj2MUqJ9EYQPEPBpX0VABPG0bf-BAR-SNQoMCaili9EYblgDdv8-Zl8DyynYXQOGWuhjBWKUHOnePFEwst5zroCMHhAXn9cAjf7rDylHhKCwdGFz_M/s72-c/term-bruteforce.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Spot a Scam in Your Inbox or Online</title><link>http://www.101hacker.com/2013/08/how-to-spot-scam-in-your-inbox-or-online.html</link><category>Articles</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Fri, 30 Aug 2013 23:16:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-720146541390958525</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="western" lang="en-GB" style="margin-bottom: 0.28cm;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://farm5.static.flickr.com/4150/4848301770_178a68703a.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://farm5.static.flickr.com/4150/4848301770_178a68703a.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="western" lang="en-GB" style="margin-bottom: 0.28cm; text-align: justify;"&gt;
&lt;span style="font-size: large;"&gt;T&lt;/span&gt;he Internet, for the most part, is a fantastic resource that's full of useful information and entertainment. Never before have we had access to such a wealth of data and media and it's incredible to think that all of that sits in our pocket throughout the day.&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span style="font-size: large; text-align: justify;"&gt;B&lt;/span&gt;&lt;span style="text-align: justify;"&gt;ut making the most of the web means also understanding that it's not perfect, and while it certainly is an amazing tool, not every website is going to be a treasure trove of great information. In fact it's even fair to go as far as to say that there's a whole lot of rubbish across the net and some of it can even be dangerous if you end up falling for a scam and spending lots of money on a useless e-book/sending a stranger your PayPal details. Here we will look at how to spot a spam online whether it's on a website or in your Email. Read on to make sure the bad guys don't get to win.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="western" lang="en-GB" style="margin-bottom: 0.28cm; text-align: justify;"&gt;
&lt;span class="note" style="font-family: Georgia, Times New Roman, serif;"&gt;Spelling&lt;/span&gt;&lt;/div&gt;
&lt;div class="western" lang="en-GB" style="margin-bottom: 0.28cm; text-align: justify;"&gt;
One of the surest signs that what you're looking at isn't high quality is bad spelling. Sure, even the most professional website will occasionally let a typo slip through the net, but if the entire site is badly spelled and edited, then you're probably looking at something that isn't quite kosher. &lt;b&gt;Why is that?&lt;/b&gt; Well a) a legitimate company would have someone edit their content to ensure this didn't happen, and b) a lot of hackers are foreign and speak English as a second language.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="western" lang="en-GB" style="margin-bottom: 0.28cm; text-align: justify;"&gt;
&lt;span class="note" style="font-family: Georgia, Times New Roman, serif;"&gt;They Ask for Your Details&lt;/span&gt;&lt;/div&gt;
&lt;div class="western" lang="en-GB" style="margin-bottom: 0.28cm; text-align: justify;"&gt;
If ever you get an e-mail asking you to send your details - even if it's from PayPal - then ignore it. The same goes for e-mails that ask you to click a link to sign in to the site. Most companies like&lt;b&gt; PayPal&lt;/b&gt; that deal with sensitive information operate on the policy that they'll never ask for your details - so if they are, then it probably isn't them…&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="western" lang="en-GB" style="margin-bottom: 0.28cm; text-align: justify;"&gt;
&lt;span class="note" style="font-family: Georgia, Times New Roman, serif;"&gt;It Sounds too Good to be True&lt;/span&gt;&lt;/div&gt;
&lt;div class="western" lang="en-GB" style="margin-bottom: 0.28cm; text-align: justify;"&gt;
Tempted to buy that $100 e-book that promises to build you &lt;b&gt;10KG &lt;/b&gt;of muscle? Or by that e-mail that's offering to transfer millions of dollars into your bank account? Well we all would be, except things like that just don't tend to happen in the real world. In general this is a good rule to live by: if something seems too good to be true, then apply some cynicism…&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="western" lang="en-GB" style="margin-bottom: 0.28cm; text-align: justify;"&gt;
&lt;span class="note" style="font-family: Georgia, Times New Roman, serif;"&gt;It's Covered in Popups&lt;/span&gt;&lt;/div&gt;
&lt;div class="western" lang="en-GB" style="margin-bottom: 0.28cm; text-align: justify;"&gt;
Someone who's willing to break the law in order to get you to spend money with them is unlikely to care particularly whether their site looks nice or not. They're probably willing to do pretty much anything in fact to earn some money, and so chances are that their site will be covered in ads. Pay attention to the quality and quantity of those ads and ask yourself if that's the sort of thing a reputable company would do…&lt;/div&gt;
&lt;div class="western" lang="en-GB" style="margin-bottom: 0.28cm; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="western" lang="en-GB" style="margin-bottom: 0.28cm; text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: #990000;"&gt;Author Bio:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="western" lang="en-GB" style="margin-bottom: 0.28cm; text-align: justify;"&gt;
Today’s featured writer, Jason Haddad, works as a tester for &lt;a href="http://wellresearchedreviews.com/" rel="nofollow"&gt;&lt;span style="color: blue;"&gt;wellresearchedreviews.com&lt;/span&gt;&lt;/a&gt;. Being an ardent writer, he often shares his views and opinions on the issues related to information security via his articles.&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://farm5.static.flickr.com/4150/4848301770_178a68703a_t.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>The White Hat Alliance (WHA) - Who are They And What They do ?</title><link>http://www.101hacker.com/2013/08/the-white-hat-alliance-wha-who-are-they.html</link><category>Articles</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Wed, 28 Aug 2013 19:14:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-84317121682276108</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://s3.amazonaws.com/crunchbase_prod_assets/assets/images/resized/0025/0332/250332v2-max-250x250.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="262" src="http://s3.amazonaws.com/crunchbase_prod_assets/assets/images/resized/0025/0332/250332v2-max-250x250.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-size: large;"&gt;W&lt;/span&gt;hile for a lot of us online privacy means worrying about our Facebook privacy settings, there are some for whom it means a whole lot more. Nowhere is this more so than in the hacking community, where anonymity can be absolutely paramount. &lt;b&gt;Anonymity&lt;/b&gt; can easily mean the difference between success and failure, and, depending on your intentions, sometimes even keeps you out of prison.&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;div style="text-align: justify;"&gt;
That drive towards anonymity was clearly a motivating factor behind the formation and concept of Anonymous, the world’s most famous hacking collective, who have made the V for Vendetta Guy Fawkes mask famous as a symbol for their anonymity and protest.&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
But they’re not the only ones. The &lt;b&gt;&lt;span style="color: #cc0000;"&gt;White Hat Alliance,&lt;/span&gt;&lt;/b&gt; an ethical hacking group with some big name clients, have also prided themselves on their anonymity. As a business, that poses exactly the sort of problems that you might expect. How do clients get in touch with a company of anonymous individuals? How do clients even find them? For the WHA, the solution so far has been to approach clients themselves. Starting with big banks like Wells Fargo, the WHA approached companies to persuade them to take on their services as white hat hackers, testing and refining security systems, as well as defending against less ethically minded hackers.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
However, that anonymity is all changing. From their previously limited public online presence, simply a Twitter account, they’ve recently launched a new website, and seem ready to step into the public eye. More importantly than that, their first member has stepped out of the shadows of anonymity. Robin Haynes, known online as Black Mamba, has revealed himself to be a member of WHA. Based in the UK, Haynes is a key member of their British team, dealing with many of their UK-based clients.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Haynes is young, but don’t let his lack of experience fool you. The young hacker is a bit of a prodigy, with abilities that far outstrip his age - which is why it’s a good thing that with the WHA he’s turning himself to ethical hacking. It’s especially great news for his clients, who stand the chance to benefit from all of his skills, carefully honed over his teenage years. He was part of the WHA teams behind the defence of Wells Fargo and other banks from bot attacks. He's also known to have hacked a few other major corporations, alerting of them of these security vulnerabilities so that they have the chance to fix them. He also put his skills to work in creating mods and benign hacks for a few games such as Counterstrike, and has demonstrated both creativity and the ability to get past some of the toughest security in the world.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
With his anonymity out the window, you can expect to hear the name ‘Robin Haynes’ quite a bit more from now on.&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>4 Ways To Be Anonymous Online </title><link>http://www.101hacker.com/2013/08/4-ways-to-be-anonymous-online.html</link><category>Articles</category><category>How to</category><category>tutorials</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Mon, 19 Aug 2013 22:09:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-98719530526575214</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLGPBqON7dwu7UiUbcxeGWY_MSY5CmZN_DXif_fgQ-VsJTM-x5yuPps2XkeyWVhklW01lGBgGHFAaPjNtzd43tzunUIbaBMxggImeOaKYnPNfHI3LSwojfpAsRerLoy17VdWBR85vd17A/s1600/anonymity.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLGPBqON7dwu7UiUbcxeGWY_MSY5CmZN_DXif_fgQ-VsJTM-x5yuPps2XkeyWVhklW01lGBgGHFAaPjNtzd43tzunUIbaBMxggImeOaKYnPNfHI3LSwojfpAsRerLoy17VdWBR85vd17A/s1600/anonymity.bmp" /&gt;&lt;/a&gt;&lt;/div&gt;
Want to be anonymous online to view blocked websites, protect your self from hackers or want to hack some one and stay un-traced?. In the following post i will explain &amp;nbsp;4 easy ways by which you can stay anonymous online&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span class="note" style="font-family: Georgia, Times New Roman, serif;"&gt;1. Using Proxies&lt;/span&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZfBW-vjhW0ELcZSKDz39qFh23S8yzDeYsozuJb322aBt71D8RuLDauyxtLikSimXjlujt9WMAddboyxqUDplyjaQ5nbfq6JFCgx7OddXpaobUEbYwNUXnyFnfJw4qpyITuXhIA3eS-Zg/s1600/proxy-server-22.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="188" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZfBW-vjhW0ELcZSKDz39qFh23S8yzDeYsozuJb322aBt71D8RuLDauyxtLikSimXjlujt9WMAddboyxqUDplyjaQ5nbfq6JFCgx7OddXpaobUEbYwNUXnyFnfJw4qpyITuXhIA3eS-Zg/s320/proxy-server-22.jpg" style="cursor: move;" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
A proxy is an address ( IP address ) of a &amp;nbsp;Server (proxy server) &amp;nbsp;that is placed between your computer and the Internet The advantage of a proxy is that your real IP address is Hidden so when you hack your giving the IP address of the proxy sever and not your real IP address Same way if your a normal Internet user the hacker won't get your real IP but the IP of the proxy server.You can use it to enter site or forum that you are IP is banned . To know more about proxies click the following link&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;a href="http://www.101hacker.com/2011/02/how-to-surf-web-anonymously-with.html" target="_blank"&gt;&lt;span style="color: blue;"&gt;Proxy Guide&lt;/span&gt;&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
&lt;span class="note" style="font-family: Georgia, Times New Roman, serif;"&gt;2. Using Tor&lt;/span&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Tor-proxy is a free proxy-server service that Internet users can use to hide their IP address while surfing the Web.&amp;nbsp;Tor (The Onion Router) is free software for enabling online anonymity. Tor directs Internet traffic through a free, worldwide volunteer network consisting of more than three thousand relays to conceal a user's location or usage from anyone. I have written a complete How to guide on how to use tor, you can read it from the following link&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div style="text-align: center;"&gt;
&lt;a href="http://www.101hacker.com/2011/03/how-to-surf-web-anonymously-with-tor.html" target="_blank"&gt;&lt;span style="color: blue;"&gt;How use Tor to Stay anonymous&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;span class="note" style="font-family: Georgia, Times New Roman, serif;"&gt;3. SSH Tunneling&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
SSH &amp;nbsp;tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net without being monitored and even surf blocked sites too . To know more about SSH and SSH tunneling . Please have look at my &lt;a href="http://www.101hacker.com/2011/06/view-blocked-websites-by-ssh-tunneling.html" target="_blank"&gt;&lt;span style="color: blue;"&gt;SSH tunneling guide&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class="note"&gt;4. &lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;Using VPN&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
Virtual Private Network. Basically it’s a private network which lets users to connect to other users or remote sites using a public network usually internet. It uses “virtual” connections routed through the Internet from the company’s private network to the remote site or employee instead of physical connections. In short , it is private network constructed within a public network infrastructure, such as the global Internet. The Biggest difference between proxy and VPN is everything in a VPN is encrypted which gives an additional layer of security. There are some paid And free VPN services . we have already written an article on some of the best free VPN Service Providers . If your interested in using a VPN you can have look at my article on&lt;a href="http://www.101hacker.com/2011/04/top-10-free-vpn-servies.html" target="_blank"&gt;&lt;span style="color: blue;"&gt; Free VPN services&amp;nbsp;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLGPBqON7dwu7UiUbcxeGWY_MSY5CmZN_DXif_fgQ-VsJTM-x5yuPps2XkeyWVhklW01lGBgGHFAaPjNtzd43tzunUIbaBMxggImeOaKYnPNfHI3LSwojfpAsRerLoy17VdWBR85vd17A/s72-c/anonymity.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Android App Basics - Part3 Android Hacking And Pentesting Video Series </title><link>http://www.101hacker.com/2013/07/android-app-basics-part3-android.html</link><category>Android</category><category>Articles</category><category>tutorials</category><category>video</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Sun, 28 Jul 2013 23:12:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-3014884828568766354</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKRT5KO1wABhqC5aXgEWCflarV36MHKCMYTB8179HEFukL20i-zhOS4WQV7yz4PZxN6Zo3LcfSCvMWRPrvrx7_s27RsSj03vJv8vEKjwb53wFZ2bnm0Ny8zl9B9ZwrJzwLRhAT48Cm9Us/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKRT5KO1wABhqC5aXgEWCflarV36MHKCMYTB8179HEFukL20i-zhOS4WQV7yz4PZxN6Zo3LcfSCvMWRPrvrx7_s27RsSj03vJv8vEKjwb53wFZ2bnm0Ny8zl9B9ZwrJzwLRhAT48Cm9Us/s320/1.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="note"&gt;&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;Android App Basics - Part 3&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/zzkW6p8rdXQ" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
If you have any queries, doubts or suggestions, kindly comment below or drop us an email at srinivas@101hacker.com. We will be happy to answer them&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKRT5KO1wABhqC5aXgEWCflarV36MHKCMYTB8179HEFukL20i-zhOS4WQV7yz4PZxN6Zo3LcfSCvMWRPrvrx7_s27RsSj03vJv8vEKjwb53wFZ2bnm0Ny8zl9B9ZwrJzwLRhAT48Cm9Us/s72-c/1.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Lab Setup For Android Pen-testing  - Part 2</title><link>http://www.101hacker.com/2013/07/lab-setup-for-android-pen-testing-part-2.html</link><category>Android</category><category>Articles</category><category>tutorials</category><category>video</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Fri, 26 Jul 2013 06:18:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-2623416756566277732</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhC0ENYm82k9-iaNHA6GePHjxUEerc2xzPztSlak9_PpD-pg-IagifmotLzWivGaYIRq-rnfdkZ-J7d27iOpXG06mGCwhVKO4Q7L8FkuquffSGz_5BW2kalUUCmLM_8FYoNxhFCO2n0Eg/s1600/android.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhC0ENYm82k9-iaNHA6GePHjxUEerc2xzPztSlak9_PpD-pg-IagifmotLzWivGaYIRq-rnfdkZ-J7d27iOpXG06mGCwhVKO4Q7L8FkuquffSGz_5BW2kalUUCmLM_8FYoNxhFCO2n0Eg/s1600/android.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="note"&gt;&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;Lab Setup For Android Pen testing &amp;nbsp;- Part 2&lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/Ksvk21DDWow?list=UUCpw5SuMq-FGcCX_T9dRxhg" width="560"&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
If you have any queries, doubts or suggestions, kindly comment below or drop us an email at john@101hacker.com. We will be happy to answer them&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhC0ENYm82k9-iaNHA6GePHjxUEerc2xzPztSlak9_PpD-pg-IagifmotLzWivGaYIRq-rnfdkZ-J7d27iOpXG06mGCwhVKO4Q7L8FkuquffSGz_5BW2kalUUCmLM_8FYoNxhFCO2n0Eg/s72-c/android.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Android Hacking And Pentesting Video Series Part 1 - Brief Introduction to Android and its Architecture </title><link>http://www.101hacker.com/2013/07/android-hacking-and-pentesting-video_21.html</link><category>Android</category><category>Articles</category><category>video</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Sun, 21 Jul 2013 06:42:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-5214773348180339500</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQn8M0TUG5U5fNmbnYPAcuH3HiSMX5j05oVjklAiD6K6i1JmulfpXg1RWX4hV06oWGeJNysLus6jxbALmVbtfZRkDrRQJ1jTouPxav21Hp92-1yR_BZoVbBrqBPwhMz9nBZENNS0jWDbg/s1600/Android-system-architecture.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="229" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQn8M0TUG5U5fNmbnYPAcuH3HiSMX5j05oVjklAiD6K6i1JmulfpXg1RWX4hV06oWGeJNysLus6jxbALmVbtfZRkDrRQJ1jTouPxav21Hp92-1yR_BZoVbBrqBPwhMz9nBZENNS0jWDbg/s320/Android-system-architecture.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;I&lt;/span&gt;n the following Video srinivas will give you a brief introduction to Android and will also talk about Android architecture in detail&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class="note" style="font-family: Georgia, Times New Roman, serif;"&gt;Brief Introduction to Android and its Architecture&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/bMAtQXlKjtc" width="420"&gt;&lt;/iframe&gt;
&lt;span style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-family: inherit;"&gt;&lt;span style="font-family: inherit;"&gt;If you have any queries, doubts or suggestions, kindly comment below or drop us an email at srinivas@101hacker.com&lt;/span&gt;&lt;span style="font-family: inherit;"&gt;. We will be happy to answer them&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQn8M0TUG5U5fNmbnYPAcuH3HiSMX5j05oVjklAiD6K6i1JmulfpXg1RWX4hV06oWGeJNysLus6jxbALmVbtfZRkDrRQJ1jTouPxav21Hp92-1yR_BZoVbBrqBPwhMz9nBZENNS0jWDbg/s72-c/Android-system-architecture.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Android Hacking And Pentesting Video Series - Intro</title><link>http://www.101hacker.com/2013/07/android-hacking-and-pentesting-video.html</link><category>Android</category><category>tutorials</category><category>video</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Thu, 18 Jul 2013 19:55:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-4508343052106613307</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhE3hQhUnOdItFH8j5voDdVe3EVd_phaObZny9zVE4K6uNUAFwsnmgvoOafZp8v_SZpc_sD8oSc_uKDHjcTq2aWn-0rVDFDs4XqUXE4xrdEfuGkI2iLDTAqrzMFJLdU6ThtIYs6b5lC92s/s1600/android.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhE3hQhUnOdItFH8j5voDdVe3EVd_phaObZny9zVE4K6uNUAFwsnmgvoOafZp8v_SZpc_sD8oSc_uKDHjcTq2aWn-0rVDFDs4XqUXE4xrdEfuGkI2iLDTAqrzMFJLdU6ThtIYs6b5lC92s/s200/android.png" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-size: large;"&gt;W&lt;/span&gt;e are happy to announce the launch of our new &lt;b&gt;&lt;span style="color: blue;"&gt;&lt;a href="http://www.youtube.com/user/101hackervideos?feature=watch" rel="nofollow"&gt;Video Channel&lt;/a&gt; &lt;/span&gt;&lt;/b&gt;at YouTube, In this Video channel we will be posting videos related to Ethical Hacking, Pen Testing and cyber security . Our first venture is to launch a Video tutorial series on &lt;b&gt;Android &lt;/b&gt;Hacking And Pen Testing , Myself and Srinivas will be posting videos regularly on this channel.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span class="note" style="font-family: Georgia, Times New Roman, serif;"&gt;About Android Hacking And Pentesting Video Series&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="315" src="//www.youtube.com/embed/w3i7y35WcaM" width="560"&gt;&lt;/iframe&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I hope you will like our new Video channel. Please Subscribe our channel to get latest updates&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhE3hQhUnOdItFH8j5voDdVe3EVd_phaObZny9zVE4K6uNUAFwsnmgvoOafZp8v_SZpc_sD8oSc_uKDHjcTq2aWn-0rVDFDs4XqUXE4xrdEfuGkI2iLDTAqrzMFJLdU6ThtIYs6b5lC92s/s72-c/android.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Prism Yourself with MIT'S "Immersion" Project</title><link>http://www.101hacker.com/2013/07/prism-yourself-with-mits-immersion.html</link><category>Articles</category><category>Others</category><author>noreply@blogger.com (John ( Admin ))</author><pubDate>Mon, 8 Jul 2013 03:04:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-454571123505221237.post-640081312866447703</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwy8qrsppNQ0VTywSwgnGNjIZkgm1chmt_9rByMRImCTGq3VaEITe3DoE5u3jcEo2i_UWThcyG3YVI4nsey0BG3aKyYHCdGCmRHqDL2POtsWVlipe5nNLlDJkXDGlkF2GbiFizoRycbJ0/s1600/mymetadata-254edc70770ef432ea52e3c2a342f93287e54750-s4-300x224.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="149" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwy8qrsppNQ0VTywSwgnGNjIZkgm1chmt_9rByMRImCTGq3VaEITe3DoE5u3jcEo2i_UWThcyG3YVI4nsey0BG3aKyYHCdGCmRHqDL2POtsWVlipe5nNLlDJkXDGlkF2GbiFizoRycbJ0/s200/mymetadata-254edc70770ef432ea52e3c2a342f93287e54750-s4-300x224.jpg" width="200" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;I&lt;/span&gt;n the past two weeks there's been a lot of talk about&lt;b&gt; "Prism"&lt;/b&gt; a software that the&lt;b&gt; NSA&lt;/b&gt; uses to monitor your email activities , social networking activities and other Internet activity &amp;nbsp;in real time, If you're Curious to know how this is done, you can have look at the &lt;b&gt;MIT'S "Immersion Project"&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-size: large;"&gt;M&lt;/span&gt;it's Immersion Project gives you an idea how meta data can tell more about your online relationship. Immersion basically scans your mail's &amp;nbsp;specifically to the&lt;b&gt; To's, From's, CC&lt;/b&gt; and Timestamp fields in emails. All of this meta data is readily available using the proper API, but not directly accessible from the mail account itself. From there, all of the data is sorted, categorized and placed into a beautiful graphical pictures that shows all of your &lt;b&gt;“collaborators”&lt;/b&gt; on emails, including how often all of them talk to each other.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
It displays a series of &lt;b&gt;circles&lt;/b&gt; with fine lines that shows how different people converse with each other, The circles are filled with colors to subtly delineate the varied social groups a user interacts with on a long-term basis. The project mines an account’s overall history, tabulating the number of emails while also showing real-time data of how many messages were sent in a given week.&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="281" mozallowfullscreen="" src="http://player.vimeo.com/video/69464265?title=0&amp;amp;byline=0&amp;amp;portrait=0&amp;amp;color=7dd1ff" webkitallowfullscreen="" width="500"&gt;&lt;/iframe&gt; &lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
The project allows you to be your own &lt;b&gt;Big Brother&lt;/b&gt; in a way. To participate in MIT’s Media Lab Immersion project, visit &lt;a href="https://immersion.media.mit.edu/" rel="nofollow"&gt;&lt;span style="color: blue;"&gt;&lt;b&gt;Immersion&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwy8qrsppNQ0VTywSwgnGNjIZkgm1chmt_9rByMRImCTGq3VaEITe3DoE5u3jcEo2i_UWThcyG3YVI4nsey0BG3aKyYHCdGCmRHqDL2POtsWVlipe5nNLlDJkXDGlkF2GbiFizoRycbJ0/s72-c/mymetadata-254edc70770ef432ea52e3c2a342f93287e54750-s4-300x224.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>