Experiment: Just how real is this WPA threat? (how to hack into your own WPA router using WPS and prevent others from doing so)

Last month I read the "Brute forcing Wi-Fi Protected Setup" document by Stefan Viehböck which explains a vulnerability in the WPS system which is a feature available in most modern wifi routers.
The flaw can be exploited using a tool called reaver which gives you the ultra-secure wpa password of your Wireless Network after it brute forces the WPS system. [simplified explanation in n00b terms]
The document lit a small spark in my mind wondering how hard it actually would be to "exploit" this weakness for a hacker with barely any experience [which would be me 🙂 ]. So I grabbed some gear and did a quick experiment to find out…

Read more

Which process is keeping this file in use in Windows 2003?

Have you ever found yourself wanting to replace a file but you couldn’t because Windows (2003) kept saying it was in use in Windows? Well today was one of those days where I was struggling to replace a corrupt Softgrid package on the Softgrid Server but kept getting: "File is being used by another person or program". This is how I managed to track the culprit down.

Read more