Showing posts with label Tutorials. Show all posts
Showing posts with label Tutorials. Show all posts

2012/02/22

The easiest way to penetrate wireless networks


Also used previously, we have always used the password more complex and encryption more powerful, but this time it will not go into these things about how to protect the network for wireless your own, but Sasahm to attack you, so the wait should not be one of Jerank read this explanation, and then you have to change Ndham encryption and password if you are using 123456.
But the truth is these were not my intention, but I was going to explain Ndham works alone push of a button that is to encrypt the rest Ndham wep and wpa for use in verifying the security of wireless networks, the piece will be the explanation for this Kmahh Alndham and not explained from A to Z

2012/02/21

What is the safest? joomla, WordPress or Drupal

Is the first question that appears in the form of rock over the head programmer and you want to drop it when you remember the safety of sites and the use of these systems in a project, the question appears easy at first such differentiate between the security of Windows and Linux. But the security of these systems to manage content coincides with the additions used it, how many of us use Ndham content alone, without any addition? However, the latter of which is classified programs such as the good and the good of others,