Experiment: Just how real is this WPA threat? (how to hack into your own WPA router using WPS and prevent others from doing so)

Last month I read the "Brute forcing Wi-Fi Protected Setup" document by Stefan Viehböck which explains a vulnerability in the WPS system which is a feature available in most modern wifi routers.
The flaw can be exploited using a tool called reaver which gives you the ultra-secure wpa password of your Wireless Network after it brute forces the WPS system. [simplified explanation in n00b terms]
The document lit a small spark in my mind wondering how hard it actually would be to "exploit" this weakness for a hacker with barely any experience [which would be me 🙂 ]. So I grabbed some gear and did a quick experiment to find out…

Read moreExperiment: Just how real is this WPA threat? (how to hack into your own WPA router using WPS and prevent others from doing so)

Which process is keeping this file in use in Windows 2003?

Have you ever found yourself wanting to replace a file but you couldn’t because Windows (2003) kept saying it was in use in Windows? Well today was one of those days where I was struggling to replace a corrupt Softgrid package on the Softgrid Server but kept getting: "File is being used by another person or program". This is how I managed to track the culprit down.

Read moreWhich process is keeping this file in use in Windows 2003?