Not all people use RSS readers so I’m also going to use twitter to push out notifications. If you want to stay up to date just follow me on twitter @virtualistic or use the button on the sidebar.
Last month I read the "Brute forcing Wi-Fi Protected Setup" document by Stefan Viehböck which explains a vulnerability in the WPS system which is a feature available in most modern wifi routers.
The flaw can be exploited using a tool called reaver which gives you the ultra-secure wpa password of your Wireless Network after it brute forces the WPS system. [simplified explanation in n00b terms]
The document lit a small spark in my mind wondering how hard it actually would be to "exploit" this weakness for a hacker with barely any experience [which would be me 🙂 ]. So I grabbed some gear and did a quick experiment to find out…
Watch this video during your lunch break. Its 6 minutes long but well worth it. Don’t have the words to describe how well made this is..! Where is my C64 with the yellow tapeunit..?
Screen recording is hot so Citrix doesn’t waist any time and launches its own GoView Beta product.
Thursday, March 26, 2009…Citrix is hosting a webinar with Ruben Spruijt and Jeroen van de Kamp. If I don’t have to call a number in the US for audio, I’ll be attending this session
I saw this process WISPTIS.exe kept popping up on my TS from time to time and wondered what this thing was doing on my server.
After careful deliberation (:)) with the CEO of Datacrash, I’m proud to announce that Datacrash and Virtualistic have joined forces and will be sharing thoughts, articles and other stuff we find interesting.
I want to write something non-technical today to try and touch a different subject all sysadmins face today.
Let’s take a trip to the wild side of being a sysadmin: The side,I like to call the: “Zen and Frustration” side of the job. (No, I’m not high and “yes” it’s late and I’m jotting this down as we go…)
People around me who know I’m a sysadmin always think that this line of work only involves exact science, bits and bytes, ones and zero’s. Of course I won’t deny that these trades plays a big part but…