free hit counter

MnRTV Live Show Wed February 5, 2014 @ 730 EST-Hackers Crackers Code breakers and the NSA - How to protect your PC and your Privacy!

This Wednesday on MnRTV we look at  -Hackers Crackers Code breakers and the NSA - How to protect your PC and your Privacy! These days now we have to worry about Hackers Crackers Code breakers and the NSA when we go online and how safe are we. Are there programs that can make our computers safe from Hackers and Crackers. Is there hardware that can actually stop the NSA from spying on us. Do we need white hackers to discover bugs and software holes and also to keep the government from checking to much info on the public and individual.  Join us for this and the news at the beginning of the show! Youtube link will be up 15 min before the show!


 

  • up

    suzie

    Looks interesting Robert .. Will be listening :)
    1
    • up

      opt˟

      Originally, password crackers were fairly easy tools to gather millions of accounts with, for people used common passwords, such as "password" or simply their first name, or their firstname1.

      There are a few different cracking tiers. For mass bulk cracking you might try the top 5 most common passwords per account before giving up. For deep bulk cracking you might try 20-100 passwords per account. For targeted you try to attempt a list of like 30,000-100,000 passwords and if that fails, you hit up every permutation possible, which is billions and billions. Eventually you hit limits from CPU and network speed, or the target machine, making the attempts per second finite so it can take hours, days, or weeks to crack, depending on what you do.

      Advanced systems rate limit various aspects of the authentication protocols but you can get around that with spoofing.

      By u$1ng!~ a password like that, you almost certainly guarantee that no one can crack it.

      The next threat comes from key loggers and Trojans.

      Climbing higher you find data centers and network infrastructure vulnerability.

      And the easiest always being, hack the human, not the machine.

      2