it gets annoying sometimes when my internet goes down and only connections nearby are super strong id like to connect to those but dont cant connect because of the wep code please help
New: Run-Command (Dec 2, 2024), Platform 29.5.3 (Jun 27, 2024)
1,100+ portable packages, 1.1 billion downloads
No Ads November!, Please donate today
Of course we won't help you to do illegal things.
I am a Christian and a developer and moderator here.
“A soft answer turns away wrath, but a harsh word stirs up anger.” – Proverbs 15:1
WEP keys exist for a reason, and cracking it and using their internet access would be just like stealing water, electricity, or cable.
I'm tired of people living in their fantasy world when the clock is ticking away, and when they are unable to see reality for what it is.
I think we have a late entry for most humorous post of the year (for all the wrong reasons).
It pleazuz I zat you dont cant connect because of the wep code and me hopes ur neighbors updaten will to WPA2 soon.
Oh boy! Where’s ethics gone? (And orthography, too.)
Darkbee:
In all earnestness: Of course it’s annoying when the Internet connection breaks down. But don’t you think it’s wiser inviting your neighbor over for a beer and explaining the situation? I’ve seen people happily sharing their Internet connections in case of emergencies, sometimes even using a 300 ft cable hanging out of the window and over the balcony …
Preferred App Language:
LOLCat(OMG)
I made this half-pony, half-monkey monster to please you.
Man, it took me five minutes (and some Googling) to decode your message. »LOLCat« indeed! Actually, the answer came quite naturally: I just tried to speak like the thread opener, so that he should be able to understand me better …
Likely as not they are WPA or WPA2 which can't be cracked as easily.
Too many lonely hearts in the real world
Too many bridges you can burn
Too many tables you can't turn
Don't wanna live my life in the real world
Not necessarily, but your point is well taken.
I purchased a router not too long ago and it supports WEP, presumably for backwards compatibility reasons. As an example, I have a Nintendo DS (or something like that) in my household that doesn't appear to support WPA in any form, so in that instance I'd have no choice but to use WEP if I wanted any kind of security on my wireless network. Granted, it's almost completely pointless since WEP is fundamentally broken but still.
More interestingly, I'm actually amazed by the number of people that have no encryption on their wireless networks at all. When I lived in an apartment I was able to connection to quite a random selection of wireless networks if I so chose (about 3 or 4, depending).
i test on my router, WEP(with macadress limitaion) is in 3-5 minutes cracked and WPA little longer 5-20 minutes.
thanks for lettin me know now that i think of it it is kinda illegal but thanks for the help
Some guys did a study and found that the most common password amongst Americans is 123456. It hasn't worked for me, though (yet).
That's not so much a WEP cracker, as social engineering. If you looked at the lifehacker info breach, there were quite a few bad policies in place. Most notably was the use of a single password everywhere.
Users passwords also tended to be similar to user names, and tons of people used other passwords they shouldn't be.
Too many lonely hearts in the real world
Too many bridges you can burn
Too many tables you can't turn
Don't wanna live my life in the real world
Use of only a few passwords isn't really a problem if they're good and if they're never shared with anyone (even people who can be trusted never to intentionally reveal the passwords can be careless). Using 20 different passwords for 20 different things isn't secure if they're all easily guessed or vulnerable to simple dictionary attacks. Using 3 passwords for those same twenty can be very secure if they require brute force to guess. There's no single policy that works for everyone, but it's not a matter of choosing an insecure policy, but rather that some people are just too lazy to take security seriously at all.
Vintage!
Humans are the weakest link in security, not the security policies themselves. It doesn't matter how many times you tell everyone that the "helpdesk" never asks for passwords or personally identifiable information, some moron will always willingly hand it over when prompted illicitly. Half the time you don't even need to crack passwords, you just need to ask. :|
Too many lonely hearts in the real world
Too many bridges you can burn
Too many tables you can't turn
Don't wanna live my life in the real world
Key size also matters too. There's a big difference between a 64-bit key and a 128-bit key.
Also, a WEP cracker wouldn't necessarily be an "illegal" tool. There are legitimate network testing uses for such a tool. Even so, there are already portable network tools out there, and I don't think pa.c needs to focus on that right now.
SWAG
Not if the other 19 are easy to guess. Then I have all twenty. Good luck getting any one of mine. The idea is to make it difficult to get any. It's easier to rob 100 liquor stores than 1 Fort Knox.
A person can only remember so much. Ideally, I should use extremely long random passwords for every single thing, but there's no way I'd remember all that. Writing down passwords opens a huge hole, and using a password manager would almost defeat the purpose of using many passwords when it comes to local attacks (i.e. someone has direct local access; it greatly increases security against remote attackers, however).
A password manager is a great tradeoff for most people, assuming every password is strong (especially the master). Personally, though, I like to keep everything in my head. It's not really the security factor of keeping passwords recorded (in fact, I'm actually sacrificing security a bit), but rather that I don't want to be dependent on anything in order to access my accounts.
Vintage!
"password123"
"password456"
"password789"
...
I can barely remember two or three rock solid passwords. I highly doubt unless you're Rainman that you could remember 20.
one needs access to the drivers and administrative rights to change the mode of the wireless card. the tools that are out there for doing this are mostly linux based and are not portable by design.
design being how they are suppose to work on getting and sniffing the possibly keys and then working on breaking it. you need access and a capable GPU that can compute to send a lot of the load off the CPU. that capability is NOT portable.