Free Essay

Lab Crack Wep

In: Computers and Technology

Submitted By cmiltonenrique
Words 1215
Pages 5
LABORATORIO

12
CRACKEANDO WEP/WPA CON KALI-LINUX
OBJETIVOS
Aircrack-ng es un programa cracking de claves WEP y WPA-PSK 802.11 que recupera las claves una vez que los suficientes paquetes de datos han sido capturados. Implementa el ataque estándar FMS junto con algunas optimizaciones como ataques KoreK, así como el ataque totalmente nuevo PTW, que hace el ataque mucho más rápido en comparación con otras herramientas de cracking.
AMBIENTE DE LABORATORIO
Para llevar a cabo este laboratorio necesitas:
 Un computador virtual que ejecute Windows 7
 Un computador virtual que ejecute Kali Linux 1.04 o superior
VISIÓN GENERAL
Como un Profesional en Sistemas Operativos de una organización, tu director IT te asignará una tarea testear la seguridad Wireless, explotar el flujo en WEP, y crackear las claves presentes en WEP de una organización..
OBJETIVOS DEL LABORATORIO
El objetivo de este laboratorio es proteger la red inalámbrica de los atacantes. En este laboratorio aprenderás como:
 Crackear WEP / WPA usando diferentes herramientas
 Capturar tráfico de red.
 Analizar y detectar tráfico inalámbrico.
AMBIENTE DEL LABORATORIO
Para ejecutar este laboratorio, tú necesitas:
KALI-LINUX
KALI-LINUX aircrack-ng y otras herramientas.
DURACION DEL LABORATORIO: Tiempo 45 MINUTOS
VISION GENERAL DE Aircrack-ng
Las redes Wireless se refieren a algún tipo de red de computadoras que es inalámbrico y es generalmente asociado con una red de telecomunicaciones cuya interconexiones entre nodos son implementados sin el uso de cables. Las redes de telecomunicaciones inalámbricas son generalmente implementadas con algún tipo de sistema de transmisión de información remoto que usa ondas electromagnéticas, tales como ondas de radio, para el carrier y esta implementación usualmente toma lugar en el nivel físico o capa de la red.

pmchinch@cibertec.edu.pe

TARJETA INALAMBRICA (WNIC)
1.
Marca Alfa Network, Modelo AWUS036Nh, chipset Ralink RT2870/3070, IEEE802.11 b/g/n
(150Mbps) vía usb2.0, , soporta Windows XP/Vista/7 y Linux 2.6, con alta seguridad de encriptación WEP 64/128, TKIP, AES, WPA y antena 5dBi, PRECIO S/. 150.00 + IGV. Los driver lo encuentras en: http://www.alfa.com.tw/in/front/bin/ptdetail.phtml?Part=AWUS036NH, y lo instalas.

2.

KALI LINUX
Verificamos el reconocimiento de la tarjeta inalámbrica en dispositivos USB de la VM

pmchinch@cibertec.edu.pe

3.

4.

5.

6.

7.

Ejecutamos en el terminal iwconfig, ifconfig –a, para

Primero es necesario familiarizarse con airmon-ng --help para observar la sintaxis del comando, ahora Iniciamos wlan0, ejecuté airmon-ng start wlan0 para habilitar interfaz en modo monitor:

En algunos casos se puede observar que existan procesos que pueden causar problemas, por lo que se recomienda utilizar previamente, airmon-ng check, luego utilizar el comando airmon-ng check kill, se debe matar esos procesos O usando kill #proceso.
Verificando las interfaces wlan0 y mon0, utilizar solo airmon-ng

mon0 ha sido creado usando airmon-ng, en este caso se apaga mon0 así como wlan1 para cambiar la mac, y facilitar el proceso de auditoría, luego se inicia, y se activa

Vamos a ejecutar airodump-ng para localizar nuestro punto de acceso con el comando airodump-ng mon0. Como se puede ver en la siguiente captura de pantalla, podemos ver el Laboratorio de punto de acceso inalámbrico funcionando WEP:

pmchinch@cibertec.edu.pe

8.

9.

10.

11.

12.

Para este ejercicio, sólo estamos interesados en AP (BSSID) con encriptación WEP, digite airodump-ng mon0 --bssid 00:0F:66:5A:6B:61 --channel 10 --write test, para sólo ver los paquetes de la red Cm1lt0n. Por otra parte, vamos a solicitar a airodump-ng para que guarde los paquetes en un archivo pcap usando la directiva --write:
Ahora vamos a conectar nuestro cliente inalámbrico al punto de acceso. Una vez que un cliente esté conectado, airodump-ng debe informar en la pantalla

Si usted hace un ls en el mismo directorio, usted podrá ver los archivos con el prefijo test* como se muestra, estos son de descarga del tráfico de los archivos creados por airodumpng:

Si se observa la pantalla de airodump-ng, el número de paquetes de datos que figuran en la columna #data es muy pocas en número (sólo 104). Para romper el protocolo WEP, es necesario un gran número de paquetes de datos, cifrado con la misma clave para explotar las debilidades en el protocolo. Por lo tanto, vamos a tener que obligar a la red para producir más paquetes de datos. para hacer esto, vamos a utilizar aireplay-ng:
Procedemos con una autenticación falsa, (-b cambiar a –h en caso no autentifique):

Vamos a capturar los paquetes ARP en la red inalámbrica usando aireplay-ng e inyectarlos en la red, para simular respuestas ARP. Comenzaremos aireplay-ng en una

pmchinch@cibertec.edu.pe

ventana diferente, como se muestra en la siguiente captura de pantalla. Reproduciendo estos paquetes unos pocos miles de veces, vamos a generar una gran cantidad de tráfico de datos en la red. A pesar de que aireplay-ng no sabe la clave WEP, es capaz de identificar los paquetes ARP mirando el tamaño de los paquetes. ARP es un protocolo de cabecera fija y por lo tanto el tamaño de los paquetes ARP se puede determinar fácilmente y se puede utilizarlos para la identificación de ellos, incluso dentro del tráfico encriptado.
Vamos a correr aireplay-ng con las opciones que se discuten a continuación.
 -b especifica el BSSID (D8:5D:4C:C5:8A:38) de nuestra red
 -h especifica la dirección MAC del cliente (D8:5D:4C:D7:87:6E) que están en suplantación de identidad.
Tenemos que hacer esto, como ataque de repetición sólo funcionará para autenticar y se asocia las direcciones MAC de los clientes.

Se visualiza aumento

13.

Muy pronto, usted debe ver que aireplay-ng es capaz de esnifear los paquetes de ARP y ha comenzado a reproducir a la red. En este punto, airodump-ng también comenzará a registrar una gran cantidad de paquetes de datos. Todos estos paquetes capturados se almacenan en los archivos test-01.cap.

pmchinch@cibertec.edu.pe

Ahora, vamos a empezar con la parte real del Cracking! Arrancaremos aircrack-ng con las opciones test-01.cap en una nueva ventana. Esto iniciará el aircrack-ng software y comenzará a trabajar el cracking de la clave WEP usando el paquetes de datos en el archivo. Tenga en cuenta que es una buena idea contar con la recolección de paquetes airodump-ng de los paquetes WEP, aireplay-ng-haciendo el ataque de repetición, y Aircrack-ng tratando de obtener la clave WEP basada en los paquetes capturados, todos en el mismo tiempo. En este experimento, todos ellos están abiertos en ventanas independientes:
LA RUTA DEL DICCIONARIO EN KALI LINUX CAMBIAR A DIFERENCIA DE BACKTRACK5
14.

COMANDOS COMPLEMENTARIOS
En caso no se cuente un usuario se puede ingresar WEP:

Inyectas tráfico

Para deautenticar en WPA

pmchinch@cibertec.edu.pe

Inyección

Inyección

pmchinch@cibertec.edu.pe

WPA

LA CLAVE EN WPA ES LA DEAUTHENTICACIÓN
Aireplay –fakeauth 0 – a MACap -h MACcl mon0
Aireplay –0 0 – a MACap mon0
Aireplay –0 0 – a MACap -h MACcl mon0 o Aireplay --deauth 1 – a MACap -c MACcl mon0
CRACKING CON CAPTURA DE ACUERDO DE CUATRO VIAS
AIRCRACK-NG –w rockyou.txt –b MACap fichero-01.pcap
AIRCRACK-NG fichero-01.pcap –w ./rockyou.txt

pmchinch@cibertec.edu.pe…...

Similar Documents

Free Essay

Labs

...POINT LISAS CAMPUS Esperanza Road, Brechin Castle, Couva www.utt.edu.tt LAB 1 Decomposition reaction Aim: Determination of the number of moles of water molecules of crystallization present in hydrated Magnesium Sulphate (MgSO4.xH2O) Apparatus: Mass balance, test tube, test tube holder, heat-proof mat and bunsen burner. Reagents: Hydrated sodium carbonate. Theory: Chemical decomposition, analysis or breakdown is the separation of a chemical compound into elements or simple compounds. A more specific type of decomposition is thermal decomposition or thermolysis, which is caused by heat. ABA+B, the reaction is endothermic, since heat is required to break the chemical bonds. Most decomposition reaction require energy either in the form of heat, light or electricity. Absorption of energy causes the breaking of the bonds present in the reacting substance which decomposes to give the product. When a hydrated salt is heated it decomposes into a pure form of the salt and water. MgSO4.xH2O MgSO4 + H2O Procedure: Refer to Handout Results: A. Mass of test tube/g = 21.77 B. Mass of the tube and salt/g = 24.0 A table showing the mass of the test tube and salt after 3 consecutive heating: Heating | Mass of the test tube and salt/g | 1st | 23.96 | 2nd | 23.81 | 3rd | 23.81 | Calculations: G. Mass of anhydrous magnesium sulphate/g = F - A = 23.81 – 21.77= 2.04 H. Mass of water of crystallization......

Words: 2572 - Pages: 11

Free Essay

Wep Cracking Steps

...Basic steps to get you cracking WEP (for scriptkiddies) Once you got your tools ready it is time to get cracking. Routers especially those given out by our local ISP have their default security settings set to WEP to encrypt their traffic. This can be easily cracked by aircrack-ng suite in about 5 min once you are “au fait” with the setup. For those who want to jump straight into the cracking process here are the basic steps you need to take. Step 0: Spoof MAC address Open terminal and run the command: sudo ifconfig < attacker’s wlan interface > hw ether Step 1: Gather essential background data about yourself and your target. target_router SSID -> target_router target_router MAC address -> 00:14:7F:99:EB:99 target router channel-> 6 attacker’s MAC address -> 00:0f:b5:ff:ff:f9 attacker’s wlan interface: wlan0 attacker’s monitoring interface name (spawned from wlan0): mon0 Note: Replace the above variables with your own. These were mine for my setup. Step 2: Using aircrack-ng suite to crack WEP. sudo airmon-ng start wlan0 -> spawn a monitoring interface from wlan0. sudo airodump-ng mon0 -> survey / scan for your target router. sudo airmon-ng stop mon0 -> stop the monitoring interface so that you can start it again to listen on channel 6. sudo airmon-ng start wlan0 6 -> This starts the mon0 interface listening to only channel 6 [Important step!]. sudo airodump-ng -c6 -w outputfile mon0 -> pump output to a file called......

Words: 363 - Pages: 2

Free Essay

The Difference Between Cracking a Wep and a Wpa Network Passkey and How to Protect Yourself from It

...networking, and my goal is to inform you of those vulnerabilities to help you stay protected from them. Wired Equivalent Protocol (WEP) was the original wireless security protocol. WEP was flawed in numerous ways and hackers were able to get information in minutes. WPAv1 was then introduced as an interim replacement because WEP was that flawed. WPAv1 was made to improve on the secure wireless networks and also used a newer and more improved algorithm. When WPAv2 was finally released, many devices began to be created to be compatible with the AES algorithm WPAv2 uses. There still have not been any major hacks or attacks on a WPAv2-AES network that would cause the Wi-Fi alliance look into using another algorithm a replacement. WPAv1 is too easy to hack so it is not recommended and WPAv1 is now susceptible to multiple types of attacks. There are several different ways you can help to protect yourself and your information. Verify your spam in your e-mail to make sure a file accidentally was not forwarded to spam. There are also others to improve your security. The length of your passkey is very important in security, as well as keeping an up-to-date anti-virus and staying up-to-date on all the latest hacks, cracks, and technology are critical for your protection. N. Justin Bernard Network Security Term Paper November 13, 2012 The difference between cracking a WEP and a WPA network passkey and how to protect yourself from it In today’s always evolving and improving......

Words: 3607 - Pages: 15

Free Essay

Crack the Whip

...Crack the whip Recently I don't know if it's just me or not, but I've noticed that everywhere I go there happens to be a child that is throwing a fit, crying or even scream at their parents. Generally it seems to be the subject they're not getting what they want that day at that moment. And it doesn't bother me that it's happening, the thing that bothers me is that parents give in to their child's or children's demand and walks them back into Walmart, Toys R Us, Target or whatever store that I happen to be at that day and them whatever it is that they want. It's kind of sad to see that today's kids lack discipline and that parents don't do anything about it beside turn. Kids today are spoiled and parents are not doing what is necessary to fix. As I said last kids are spoiled, at least kinds where I live are spoiled. I believe it starts with the parents. Parents who don't feel like standing their ground because their kids happen to throw a tantrum, cry, and complain at them. Parents have become pushovers and cave in at the signs that their children might become upset or cause a scene. The parents have I believe gotten lazy when it comes to keeping their kids in line or so self-absorb they care more about their image and how their children are acting. Parent who believe that they can buy their children's affection by giving them everything they want. Are just as bad those parents are just trying to fill a void that they have made with material items saying yes to everything...

Words: 923 - Pages: 4

Free Essay

Crack Cocaine & Mass Incarceration

...The American Crack Epidemic: How the War on Drugs was as Detrimental to Society as Drugs Themselves. Lucas Carneiro U.S. History 4/21/2013 Throughout the mid-20th century, Americans have experimented with illicit drugs, from marijuana to LSD. In the late 70s and early 80s, the high cost of cocaine made it the drug of choice for wealthy, elite, White Americans. On the other side of the social spectrum, lower-class African Americans sought an escape from their difficult circumstances in impoverished inner-city neighborhoods. They found refuge in crack, a smokeable form of cocaine, whose low production cost, high addictiveness, and debilitating nature made it the drug of choice for urban African American communities in 1986 (Reinarman, 1997; Watkins, 1998; Fullilove, 1998). The drug contributed to the increase in disease, violence, and poverty in these communities, turning inner-city neighborhoods into “war zones”. The U.S. Government’s War on Drugs campaign did little to solve this crisis, using aggressive, military tactics to address an epidemic surrounded by socioeconomic and health issues. In the 1960s, the Vietnam conflict among several unpopular moves by the U.S. government created a generation of rebellious, young Americans. This generation experimented with drugs in order to alter their state of mind, and to escape from the problems that came with politics and society. The generation of young “hippies” ignited a drug culture in the U.S. As time progressed,......

Words: 2189 - Pages: 9

Premium Essay

A Crack in the Mug, Can Starbucks Mend It?

...A crack in the mug, can Starbucks mend it? In January 2008 Starbucks announced the closer of 100 US stores, but that number grew to 600 by July of 2008. After 20 years of remarkable growth, the last six months of 2007 saw Starbucks shaken by a decline in share price of 50 per cent and a reduction in customer visits to its outlets in North America. Its share price declined from $19 to $18.00 by mid-2008. The company’s brand image took a major hit with a $0.09 cent increase per cup and several similar increases in price over the past four years. All of this has led to disapproval from their shareholders. To increase favor with their shareholders, Starbucks will need to do a combination of tactics .They need to increase their sales quite a bit in order to suppress the shareholders fears. As long as consumers buy, the shareholders will buy stock, and feel comfortable with keeping it. To get consumers to consume more, they need to offer more of their products. They could possibly start offering products that they currently do not offer but use in making their products. For example they could start selling the accessory items like spices, syrups, sprinkles and the rest of the things that makes Starbucks so great. These are items that already have a great demand with preexisting Starbucks customers since they are used with all of their most popular items. Also, since Starbucks has no complete advantage over their major competitors like McDonalds and Dunkin Donut, one thing they......

Words: 408 - Pages: 2

Free Essay

Lab 4

...Willie Harris ------------------------------------------------- is3230 lab 4.2 Implement Organizational-Wide Network and WLAN Access Controls 1. Each time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to othersEach time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to others. 2. 2. By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall. 3. First if you’re sitting in a coffee shop and decide you want to check your Facebook page and your email to kill some time. You scan the available networks and see one that’s open and unsecured. You connect and start surfing. Coffee and free WiFi, what could be better, right? Wrong! A hacker is also fond of coffee shops and he is located within range of the router you connected to. He’s waiting for one or more people to connect to the network so he can start......

Words: 628 - Pages: 3

Free Essay

Labs

...Tissues The Integumentary System 35 43 The Cell: Transport Mechanisms and Permeability–Wet Lab Classification of Covering and Lining Membranes 49 Overview of the Skeleton: Classification and Structure of Bones and Cartilages 53 The Axial Skeleton The Fetal Skeleton 59 67 81 87 93 103 77 The Appendicular Skeleton Articulations and Body Movements Microscopic Anatomy and Organization of Skeletal Muscle Gross Anatomy of the Muscular System Histology of Nervous Tissue 113 119 125 Exercise 16A Skeletal Muscle Physiology: Frogs and Human Subjects Exercise 18A Neurophysiology of Nerve Impulses: Wet Lab Gross Anatomy of the Brain and Cranial Nerves Electroencephalography Human Reflex Physiology General Sensation 153 157 167 177 173 Special Senses: Vision 133 Spinal Cord, Spinal Nerves, and the Autonomic Nervous System 145 137 Special Senses: Hearing and Equilibrium Special Senses: Olfaction and Taste Functional Anatomy of the Endocrine Glands iii Exercise 28A Role of Thyroid Hormone, Pituitary Hormone, Insulin, and Epinephrine: Wet Lab 183 Exercise 29A Blood Exercise 30 Exercise 31 Exercise 32 189 199 205 209 Anatomy of the Heart Conduction System of the Heart and Electrocardiography Anatomy of Blood Vessels Exercise 33A Human Cardiovascular Physiology: Blood Pressure and Pulse Determinations 217 Exercise 34A Frog Cardiovascular Physiology: Wet Lab Exercise 36 Exercise 38 Exercise 40 Exercise 42 Exercise 43 Exercise 44 Exercise 45 Exercise......

Words: 120457 - Pages: 482

Free Essay

Science Labs

...Chemical and Mechanical Weathering of Rock Lab Lauren Templeton, Heather Mullen, Katherine Welmaker, Becca Gojda 2 October 2015 Abstract This lab explores several different forms of weathering and the specific effects they have on rocks. Mechanical Weathering was found to reduce the weight of different types of rocks more efficiently than others. Geological Changes were found to make small physical changes to the exterior of the rock. Glacial Changes were found to affect the ground through the the sand the “glacier” moved around. Chemical Weathering was found to quickly dissolve the marble but not the granite. Oxidation was found to dissolve the pyrite very quickly and continue to dissolve it over the next 2-3 days. Organic Processes were found to have a major physical effect on the paste as it broke it apart. Materials Bean Seeds, 10 Magnifying glass Calcium sulfate, CaSO4, 2 spoonfuls Marker Granite chips, 20 g Paper towels Halite chips, 15 g Pipets, Beral, graduated Hydrochloric acid solution, HCl, 1 M, 15 mL Plastic cups, small, 3 Ice cube Sample......

Words: 1232 - Pages: 5

Free Essay

Labs

...© Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones Bartlett Lab #2© Jones &SALE ORLearning, LLC Vulnerabilities to &SALE ORLearning, LL AligningBartlett DISTRIBUTION Risks, Threats, and NOT FOR DISTRIBUT NOT FOR COBIT P09 Risk Management Controls © Jones & Bartlett Learning, LLC Introduction © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, © Jones & Bartlett Learning, LLC first released in 1996.Jones & Bartlett Learning, LLC © ISACA is an IT professionals’ association centered on auditing and IT governance. This NOT FOR SALE OR DISTRIBUTION The lab lab will focus on the COBIT framework. NOT FOR SALE OR DISTRIBUTION uses the latest two versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which is the latest version released in June 2012. Because COBIT 4.1 is freely available at the time of this writing, the lab uses this version to © Jones & Bartlett Presentation is done making use of a © Jones & Bartlett Learning, LL present handling of risk management. Learning, LLC set of COBIT......

Words: 2487 - Pages: 10

Premium Essay

Safety in the Lab

...extinguishers, phones, showers, etc. The safety equipments available to me while doing the experiments are safety gear, such as gloves, goggles, and protective clothing. Also, equipments such as extinguishers, fire blankets, shower and eye washes are important to have and should be located around and near you for quick use. 2. What is an MSDS? An MSDS is a material safety data sheet where it contains the chemical’s or item’s physical or chemical characteristics. It also lists the information about health and safety about the usage of the product. 3. What can make glassware unuseble? Glassware become unusable when it has cracks on them because they become dangerous when experimenting anything especially using them with heating. 4. When should you wear goggles in the lab? You should wear goggles when doing lab at all times to prevent any injury or damage. 5. How long should you wash your eyes if you get a chemical in them? You should wash your eyes for at least fifteen minutes immediately after coming contact with chemicals. 6. What should you do if your clothing catches on fire? When your clothes get on fire, you should immediately go to the safety shower. If there is none, you should attempt the stop-drop-roll-yell technique or get the fire blanket as soon as possible. Also, yell for help when needed. 7. How should you heat the liquid in a test tube to a temperature less than 100 (C? When heating the liquid in a......

Words: 524 - Pages: 3

Premium Essay

The Patient Who Ll Through the Cracks

...care and lacks knowledge about his medical condition. Nurses have numerous legal, professional and ethical duties. The three main duties are to respect all patients’ confidentiality and autonomy and to recognize duty of care owed to all patients. This paper will explore the ethical dilemma involved with a patient unwillingness to comply and the nurse’s duty to respect the patient’s wishes. Further discussion will give insight into the nurse’s legal responsibilities and elaborate on the principle of beneficence, health concepts, autonomy vs. paternalism, patient teaching, family as caregiver, Eco mapping, and therapeutic nursing interventions. Analysis of a Case Study Situation Overview The article, “The Patient Who Fell Through The Cracks,” described Mr. H as a 65 years old, morbidly obese man diagnosed with CHF, PVD, bilateral venous stasis ulcers, and HTN. He lived at home with his diabetic wife and mentally-challenged adult son. The environment in which they resided was unhealthy, possibly due to self-care deficit and lack of knowledge about health and wellness. Mr. H. lacked the support system that he needed to care for himself. Due to Mr. H’s inability to comprehend and self-care deficit immediate intervention had to be initiated by the nurse which involved providing wound care and health promotion. Principle of Beneficence: Rule of utility Beneficence is the concept of supporting the patient by preventing further harm, yet the nurse has an ethical......

Words: 3145 - Pages: 13

Free Essay

Lab 7

...Laboratory 7: Security Basics December 1, 2014 Lab 7: Security Basics Task 1: Procedure 1. Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Locate an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zonelabs Zone-Alarm firewall is an example of a software firewall. a. Cisco RV082 Dual WAN VPN Router i. Dual Fast Ethernet WAN ports for load balancing and/or business continuity ii. Built-in 8-port Fast Ethernet switch iii. Strong security iv. High capacity VPN capabilities v. Optional cloud-based web security service vi. Support for Small Business QuickVPN software b. Linksys WRT54GS Wireless i. G Broadband Router with SpeedBooster IEEE 802.3/3u, IEEE 802.11b/g ii. VPN Pass Through iii. Stateful Packet Inspection (SPI) Firewall, Internet Policy Wi-Fi Protected Access 2 (WPA2), WEP, Wireless MAC Filtering Task 2: Procedure 1. By 2010 the number of different known viruses numbered over 4 million. Many companies produce anti-virus programs to help protect your computer against these threats. Some of the companies are Panda, Norton, McAfee, AVG, and Kaspersky. Which of these companies provide free versions of their software? Which ones provide trial versions? a. Free versions i. AVG b. Trial versions i. Panda ii. Norton iii. McAfee iv. AVG v. Kaspersky 2. Viruses and......

Words: 1291 - Pages: 6

Premium Essay

Crack Epidemic

...In 80s and 90s the crack epidemic took over the ghetto world and played a big role in developing hip hop music. Black Americans even sung about it in their songs. Drug dealers distributed crack in black neighborhoods and got them involved into that business. For African Americans it was a way to earn money and get out of ghetto. Especially back then when they were discriminated. So, the crack epidemic and hip hop back in 80s and 90s went hand in hand. It was very interesting to read the "Dark Alliance". I found out a lot of interesting staff of which I didn't know before. Of course, not every black american was involved in drug distribution and consumption. There were the ones who worked hard to pursue their dreams; however, there were more people who consumed and distributed than those who didn't. Rappers raped about it in their songs. The song "White Lines" describes how at parties MC and other party people consumed it. MC also tells us about his feelings and illusions he had. Once, people get involved into the crack epidemic, it is hard to stop. Also in the song, MC tells that every time you want it more and more. So, the dosage increases and money decreases. Some still suffer from the crack epidemic. People who used to party and play cool are now addicts who just think about getting drugs. The Crack Epidemic brought violence and sickness. People on crack are not stable and can think straight. As a consequence they are more violent and uncontrollable. People also become......

Words: 767 - Pages: 4

Premium Essay

Crack

...CRACK Should women addicted to crack be able to have children? Barbara Harris says no. Harris has adopted four children from a drug addict. She has also founded CRACK (Children Requiring A Caring Kommunity) a non-profit organization that offers $200 in cash to addicts who agree to be sterilized or undergo long-term contraception like Norplant, which is surgically imbedded under the skin. In this essay I will be discussing what the ethical dilemma is, who the stakeholders are in this ethical dilemma, analyzing the problem by reference to the categorical imperative, analyzing the problem from a Kantian and utilitarian standpoint and giving my overall opinion of this matter. As I understand it the ethical dilemma here is the procedure in itself. Some are saying that the women are doing it for the money to buy more drugs. Also, saying that it takes away women rights to reproduce. Physicians and attorneys are saying that the women are in no condition to consent to being sterilized. They say that because these women are mentally ill and poor they are not capable of making their own decisions. But Barbara Harris from her own experiences says that women addicted to crack do not need to have babies. These women are bringing babies into the world addicted to crack. She tells of a story of how she adopted four children from a crack addicted woman. One of the children would wake up screaming in the middle of the night. She says it looked like his eyes were about to pop out of his......

Words: 1057 - Pages: 5