How to check who logged in and when via Windows Remote Desktop

Hello,

Remote Deskop is a nice facility built-in Microsoft Windows from XP and up.

You can use it to remotely administer your computer or simply do programming work.

Many times you may want to keep track and see who is logging into your PC for security reasons. This article will show you how. Let’s proceed!

rdp-cover Continue reading “How to check who logged in and when via Windows Remote Desktop”

How to capture and analyze HTTP/HTTPS from your smartphone or tablet using Fiddler

Hello,

In the previous article, I showed you how to capture traffic from WiFi devices. In this article, I will illustrate how to capture HTTP/HTTPS traffic using Fiddler.

This skill is very useful for web programmers or security engineers who want to debug their application or audit third party applications that use web services over an encrypted channel. Let’s get started! Continue reading “How to capture and analyze HTTP/HTTPS from your smartphone or tablet using Fiddler”

How to capture all network traffic going through your smartphone/tablet/laptop or other wireless devices

Hello,

In this blog post, I am going to show you how to record all inbound and outbound network traffic from a wireless device (smartphone, tablet, laptop, etc…).

People desire to capture traffic for many reasons, namely for/by:

  • Security Auditing and penetration testing
  • Programmers and testers
  • Application protocol analysis and recovery
  • etc…

Let’s get started! Continue reading “How to capture all network traffic going through your smartphone/tablet/laptop or other wireless devices”

How to show saved Windows 8 and Windows 10 Wifi passwords

In this blog post, I am going to illustrate how to reveal the saved Wifi passwords under Windows 8, 8.1 and Windows 10 in three easy steps.

flower separator
batchography-good-resDo you want to master Batch Files programming? Look no further, the Batchography is the right book for you.

Available in print or e-book editions from Amazon.
flower separator

Alternative method

You can just use the WifiPasswordReveal script to automatically reveal the saved password with a click of a button!

WifiPasswordReveal article

You might also like the following posts:

Step 1 – Open the Network and Sharing Center

Right click on the wireless networks icon in the tray bar (just next the clock):

image

Then right click on select “Open network and sharing center”

Step 2 – List all network adapters

Select “Change adapter settings”

image

This will give you a list of all available network adapters:

image

Step 3 – Show the WiFi properties and reveal the password

Double click on the Wifi card adapter icon for which you want to retrieve the password. In my case, I double-clicked on the “Wi-Fi” card.

The “Wi-Fi Status” dialog will show up. Press the “Wireless Properties” button:

image

Then switch to the “Security” tab:

image

Press “Show characters” to reveal the password.

I hope this short and concise article was useful. Please leave your comments or start following this blog to get notified about new / other useful tips.

Free WifiShare Tool – Turning your laptop into a hotspot and internet connection sharing station

In this blog post, I am going to share with you this free utility that allows you to turn your laptop (via your Wifi network card) into a hotspot so that you can share your internet connection with other portable devices or with your friends.

wifi-sharing-tool
Continue reading “Free WifiShare Tool – Turning your laptop into a hotspot and internet connection sharing station”

Change hard disk volume serial number

A few years ago, I wrote an article explaining how to change the volume serial number.

Volume Serial Number Changer

This program does not work properly now under Windows Vista or Windows 7 unless executed as administrator. Following many suggestions, I updated the tool to support the latest Windows version.

Please note that after you change the serial number you may need to reboot the PC for the settings to take effect.

Download:

Note: You may need to download and install the Microsoft Visual C++ 2010 Redistributable Package (x86).

How your Yahoo! Mail account can be hacked with phishing – A real life example explained

Introduction

In this article, I am going to illustrate a real life scenario where an attempt to hack my email account was carried by fooling me into giving my user name / password through a fake website that looks like Yahoo! Mail.

Such attacks, where the victim is lured into entering information in what looks like an innocent website, are called “phishing attacks”. Wikipedia defines “phishing” as the following:

Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication

In the subsequent sections I will show you how the attack is carried, how you can inspect such emails by yourself and then conclude by giving you some safety guidelines. Continue reading “How your Yahoo! Mail account can be hacked with phishing – A real life example explained”

Me, myself and smoking cigarettes – A little story

Introduction

In this blog post I am going to share with you my story with smoking cigarettes for five or so years, how it all started, why I stopped and how.

I will try to make this post pleasant to read and inspirational so by the end of it you will get encouraged to think again about your smoking habit.

Before we begin, would you care for a short story? Continue reading “Me, myself and smoking cigarettes – A little story”

Partition tables explained

Introduction

partition_viewer

I’ve always been curious about how disks are partitioned, and how the partition table looks like. This article will explain the format of the partition table and will provide a small tool (Partition Viewer) to demonstrate what we explained.

The information in this article apply for x86 systems, I don’t know about disk partitioning on other systems.
You are not required to have prior knowledge about disk partitioning; The goal of this article is to provide just the needed knowledge to understand disk partitioning, hence many details are left out for the readers to investigate by themselves.

Please note that this article does NOT cover the GPT (GUID Partition table). Continue reading “Partition tables explained”

How to show saved Windows 7 Wifi passwords

In this blog post, I am going to illustrate how to view saved Wifi keys under Windows 7 in four easy steps.

Alternative method

You can just use the WifiPasswordReveal script to automatically reveal the saved password with a click of a button without needing administrative privileges!

WifiPasswordReveal article

 

Related posts:

Let’s get started! Continue reading “How to show saved Windows 7 Wifi passwords”

Disposable emails with Gmail

What are disposable emails?

Disposable emails are emails that you can use temporarily with websites you don’t trust and that require registration and/or an email address. After you use the email address you can discard it by creating a filter that redirects the disposable email address to the trash bin directly.

How to use disposable emails in Gmail?

It is very simple. Unlike Yahoo Mail Plus! there is nothing to be created. Suppose your email address is, of course ;), John.Doe@gmail.com; to use a disposable email address for a website, say called www.myshopping.com, simply append a “+myshopping” after the email account name. The disposable email address will be: John.Doe+myshopping@gmail.com.

If you want to keep this email address just create a filter that moves the message to an appropriate Gmail folder. If you discover that this disposable address is amassing a lot of spam then create a filter that redirects all messages to that address directly into the trash bin.

Resetting NTFS files security and permission in Windows

UPDATE:

I have released a new graphical user interface utility to reset the files permissions.

Try it out!

I was running Vista with two NTFS partitions (C: and D:), then formatted C: partition and installed Windows 7. The second partition (D:) had some files security set on files and folders.

After Windows 7 was installed, some files on drive D: were not accessible anymore and I was getting “Access Denied”. I tried to right-click/properties on the folders that were not accessible and changed their owner and changed permissions but still some folders were still inaccessible not matter what I did.

After some research, it turned out the tool “cacls” that allows one to display or change ACLs (access control lists) can help to reset ACLs. In Windows 7 it is called “icalcs”.

To reset files permissions, follow these easy 3 steps:

Step 1: Run “cmd” as Administrator.

Note: In MS Windows 8 and above, press the Win+X keys, then choose “Command Prompt (Admin)”.

Step 2: Go to the drive or folder in question, for example:

CD /D D:

Step 3: To reset all the files permissions, type:

icacls * /T /Q /C /RESET

That’s it! After that, the files permissions were reset and I could access them back again.

Very Important note:

Step 3 is irreversible. Make sure you backup the permissions before you proceed!

It is possible that “icacls” might fail. For that try to take ownership of the files first. Just before Step (3), please type the following command:

takeown /R /F *

flower separator

Download the graphical utility instead!

flower separator
batchography-good-resDo you want to master Batch Files programming? Look no further, the Batchography is the right book for you.

Available in print or e-book editions from Amazon.
flower separator

You might also like:

PHP5 on Vista 64 and IIS7

Hello,

The other day I wanted to install PHP the Vista 64 with IIS7, however IIS7 is totally changed and couldn’t get PHP to work without doing some research on how to use IIS7 and add PHP handlers to it.

At first, I found “How to install PHP on IIS7 (RC1) – BillS’ IIS Blog” excellent article describing how to get started.

However, after following the exact steps, PHP still failed to load, saying:
After some research it turned out to be that the ISAPI modules are for x86 (32bits) and this is why they are not being loaded.
For this reason you have to do these additional steps:

  1. Open IIS Manager and expand the root node
  2. Click on the “Applications Pool” node
  3. Notice you have “DefaultAppPool” and one more  entry in the list
  4. Now to the right, select “Advanced Settings”
  5. In the “Advanced Settings” dialog, select “General: -> “Enable 32-bit Applications” and set to True (screenshot)

Now everything should be working.

While you’re here trying to fix your PHP / IIS7 installation, you might want to take a look at FastCGI a collaborative work between Microsoft and Zend.

More useful links: