Windows Password Security- Disclaimer

Disclaimer: While this series of posts may include information that could be used for illegal purposes, that is not what I had in mind while writing these posts. Instead, I meant for it to be an educational post about the feasiblity of hacking and allowed you to decide to use this information best.

This series will update around once a day, and I know the next two posts will be at noon on the 25th GMT (or 7:00 Eastern time) WITHOUT daylight savings (for all you folks ’round the equator) and the next will be at noon the next day.

IMPORTANT: Windows is not the only OS to be vulnerable to these hacks, but I am working with windows only. ALL OS’s are vulnerable to the likes of fgdump (explained in third entry)



Source one

Source two

In terms of router security, both WEP  and WPA have been cracked (see links above). All that’s still secure is WPA2 with AES. However, I would like your opinion on what is the best to use for home routers right now: WPA2, WEP, or nothing? WPA2 is more of a hassle than WEP, but it’s secure.

(Having trouble getting poll to work)

Laptop Security

I found an article on laptop security at Here is my opinion on some things he talks about:

If your machine and data are super-sensitive, you can have tracking software installed in your laptop. Security experts can then track and follow the location of your machine as it moves. It works in the same fashion as a global positioning system does for your vehicle. This proposition is expensive, but it does increase your computer security and your overall chance of data recovery should your machine ever get stolen or lost.

So they undo some screws and pop a GPS in. I’m sure the prospect of buying a screwdriver will make hackers cower in fear.

-Make certain that using hard to decipher passwords enhances your laptop security. If someone does steal or come into possession of your computer, security caused by passwords will make it difficult for someone to access your data.

Lies, man, all lies. As I have stated before, I someone comes into possession of a computer, they’re in. They are in.

-Purchase a laptop security cable and lock so you can tightly keep your laptop closed when it’s not in use.

Because garden shears are so expensive.

Physical Vulnerability

I’ve witnissed it firsthand: if someone has experience, time, tools, and physical access to most electronics, it’s as good as broken in to. Take a router for example: a paperclip and ten seconds resets it to its default settings, which is  username/password of admin/admin. And this person agrees: