Tinkernut Labs



  • THE NSA KNOWS EVERYTHING!!!

    August 31, 2013 // davisde // Safety & Security Tags: government, illegal, leak, nsa, security, spy, tracking, usa 1 Response


    The NSA has been getting a lot of coverage about it’s spying tactics. What does it know? Is it acting illegally? This is an American perspective about an American agency, so while this isn’t directed towards the rest of the world, it may be helpful to know.

    LINKS USED IN THIS VIDEO:
    http://www.zeit.de/datenschutz/malte-spitz-data-retention
    http://immersion.media.mit.edu/viz#
    http://www.buzzmachine.com
    http://www.eff.org
    http://www.fightforthefuture.org

  • Prevent Being Tracked Online!

    July 24, 2013 // davisde // Safety & Security Tags: email, facebook, google, media, nsa, online, plus, privacy, safety, security, social, track, tracking, twitter, vpn, websites 1 Response


    With recent events regarding Edward Snowden and the NSA, it’s hard to tell who’s watching us and what is private. This video will show you some free tools to ensure that you aren’t being tracked.

     

    Follow Tinkernut!

    Google + http://goo.gl/1dmi1

    Facebook http://www.facebook.com/tinkernut

    Twitter http://www.twitter.com/tinkernut

     

     

    Ghostery – http://www.ghostery.com/

    “Do Not Track Me” – https://www.abine.com/dntdetail.php

     

    Disposable E-mail Addresses – http://10minutemail.com/

    Fake Phone Numbers – http://lifehacker.com/5994262/burner-brings-disposable-phone-numbers-to-android-for-private-calls-texts-and-more

     

    Mailvelope – http://www.mailvelope.com/

     

    CyberGhost – http://cyberghostvpn.com/

  • Hacking Tip: Password Cracking with Cain & Abel

    March 2, 2013 // davisde // Hacks Tags: attack, brute, decrypt, dictionary, encryption, facebook, force, password, rainbow, safe, security, twitter, youtube 7 Responses


     

    Cain & Abel – http://www.oxid.it/cain.html

    MD5 and SHA-1 Hash generator – http://www.md5-lookup.com/

    Top 10,000 most commonly used passwords – http://xato.net/passwords/more-top-worst-passwords/

  • How To Make Your Own Encryption

    December 10, 2011 // davisde // Programming Tips Tags: decode, decrypt, encode, encrypt, hacking, privacy, programming, script, Scripting, security, vb 62 Responses


    ****UPDATE: DOWNLOAD THE PROJECT FILES****

    This video lays out the steps for creating a very simple encryption and decryption program using free tools. The programming language we will be using is VB Script.  See if you can decrypt this text:

    wkjlue#vnrro#huxwxi#uxr\

     

    The code below is for the encrypting program:

    <—–Start copying below this line—–>
    ‘SIMPLE VB ENCRYPTION PROGRAM
    ‘Create a dialogue box that asks for the text to encode
    set x = WScript.CreateObject(“WScript.Shell”)
    mySecret = inputbox(“Enter text to be encoded”)
    ‘Reverse the submitted text
    mySecret = StrReverse(mySecret)
    ‘Open up an instance of Notepad to print the results after waiting for 1 second
    x.Run “%windir%\notepad”
    wscript.sleep 1000
    x.sendkeys encode(mySecret)’This function encodes the text by advancing each character 3 letters
    function encode(s)
    For i = 1 To Len(s)
    newtxt = Mid(s, i, 1)
    newtxt = Chr(Asc(newtxt)+3)
    coded = coded & newtxt
    Next
    encode = coded
    End Function
    <—-Stop copying above this line——>
    <—–Start copying below this line—–>
    ‘SIMPLE VB DECRYPTION PROGRAM
    ‘Create a dialogue box that asks for the text to encode
    set x = WScript.CreateObject(“WScript.Shell”)
    mySecret = inputbox(“Enter text to be encoded”)
    ‘Reverse the submitted text
    mySecret = StrReverse(mySecret)
    ‘Open up an instance of Notepad to print the results after waiting for 1 second
    x.Run “%windir%\notepad”
    wscript.sleep 1000
    x.sendkeys encode(mySecret)’This function encodes the text by advancing each character 3 letters
    function encode(s)
    For i = 1 To Len(s)
    newtxt = Mid(s, i, 1)
    newtxt = Chr(Asc(newtxt)-3)
    coded = coded & newtxt
    Next
    encode = coded
    End Function
    <—-Stop copying above this line——>
    <—–Start copying below this line—–>
    –Applescript encryption program
    set words_to_encrypt to “I want to encrypt sentences. Not just words!”
    set multiplier to 5
    set charList to {“a”, “b”, “c”, “d”, “e”, “f”, “g”, “h”, “i”, “j”, “k”, “l”, “m”, “n”, “o”, “p”, “q”, “r”, “s”, “t”, “u”, “v”, “w”, “x”, “y”, “z”,”A”, “B”, “C”, “D”, “E”, “F”, “G”, “H”, “I”, “J”, “K”, “L”, “M”, “N”, “O”, “P”, “Q”, “R”, “S”, “T”, “U”, “V”, “W”, “X”, “Y”, “Z”, “1”, “2”, “3”,”4″, “5”, “6”, “7”, “8”, “9”, “0”, ” “, “~”, “!”, “@”, “#”, “$”, “%”, “^”, “&”, “*”, “(“, “)”, “_”, “+”, “{“, “}”, “|”, “:”, “\””, “<“, “>”, “?”, “`”, “-“,”=”, “[“, “]”, “\\”, “;”, “‘”, “,”, “.”, “/”, “a”}considering case
    –get a list of numbers for the words corresponding to the item numbers of the characters in charList
    set p_letter_list to text items of words_to_encrypt
    set p_num_list to {}
    repeat with i from 1 to (count of p_letter_list)
    set this_letter to item i of p_letter_list
    repeat with j from 1 to count of charList
    set this_char to item j of charList
    if this_letter is this_char then
    set end of p_num_list to j
    exit repeat
    end if
    end repeat
    end repeat
    –encrypt the numbers
    set modulus to count of charList
    set c_num_list to {}
    repeat with i from 1 to (count of p_num_list)
    set p_num to item i of p_num_list
    set c_num to ((p_num * multiplier) mod modulus)
    set end of c_num_list to c_num
    end repeat
    –get the characters for the encrypted numbers corresponding to the characters in charList
    set c_letter_list to {}
    repeat with i from 1 to (count of c_num_list)
    set this_item to item i of c_num_list
    set end of c_letter_list to (item this_item of charList)
    end repeat
    –coerce the encrypted characters into a string
    set c_string to c_letter_list as string
    end considering
    <—-Stop copying above this line——>
  • Hacking Tip: How To Use Proxies

    July 21, 2011 // davisde // Hacks Tags: address, anonymous, browser, chrome, hidden, hide, internet, ip, private, proxy, secure, security, web 32 Responses






    Proxies are great for surfing the web anonymously. This video will show you how to set up them up and use them.

    Proxify – http://proxify.com
    HideMyAss – http://hidemyass.com
    WhatIsMyIPAdress – http://whatismyipaddress.com
    Foxy Proxy – https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard
    Proxy Switchy – https://chrome.google.com/webstore/detail/caehdcpeofiiigpdhbabniblemipncjj
    Tor Project – https://www.torproject.org
    IP Hider – http://www.allanonymity.com/ip-hider-hide-ip-software
    Tutorial on using IP Hider –

    Firesheep is a hacking program that can steal the facebook and twitter accounts of anyone on a shared Wi-Fi connection. This video will show you how to protect yourself against that.

    Firesheep – http://codebutler.github.com/firesheep
    Idiocy – http://jonty.co.uk/idiocy
    Fireshepard – http://notendur.hi.is/~gas15/FireShepherd
    HTTPS Everywhere – https://www.eff.org/https-everywhere

  • Super Simple Webcam Surveillance System

    October 4, 2010 // davisde // Safety & Security Tags: computer, diy, free, home, internet, protection, security, tutorial, ustream, Video, webcam 13 Responses






    In this episode, we will learn how to create a multi-webcam surveillance system using free software.

    VH Toolkit: http://www.tinkernut.com/demos/VHToolkit_inst.exe
    Ustream: http://www.ustream.tv

  • Hacking Tip: Hide Secret Files In Plain Sight

    May 12, 2010 // davisde // Hacks Tags: files, hack, hacking, hide, password, pictures, private, secret, security, steganography, tips, tricks, tutorial, twitter 5 Responses






    This video covers the art of steganography, or hiding messages in plain sight. The three methods covered are hiding files on Microsoft documents, hiding files inside pictures, and hiding messages inside Twitter messages.

    http://www.irongeek.com/i.php?…..stego-code

    http://sourceforge.net/project…..in-picture

    http://www.irongeek.com/i.php?…..stego-code

  • How To Protect Your Website

    April 28, 2010 // davisde // Web Tips Tags: gfi, hackers, protect, scan, security, webmaster, website 4 Responses






    This video will show you how to monitor and protect your website.

    http://www.247webmonitoring.com/

    http://www.gfi.com/it-managed-services-software

    http://www.avg.com.au/resources/web-page-scanner/

    http://sucuri.net/index.php?page=home

  • Backup Your Entire Computer For Free

    November 4, 2009 // davisde // Safety & Security, Software Tips Tags: backup, computer, data, free, restore, save, security, software, tinkernut, tips, tricks, tutorial 19 Responses





    Protect yourself from computer crashes by backing up your computer using this free software. GFI Backup utility: http://www.gfi.com Belarc Advisor (License Keys) http://www.belarc.com/free_download.html

← Older posts