Welcome!

Welcome one and all exclusively to Musings on Tap! Our doctrine is that all thought is free thought (we even share tea;)). Download at your leisure and be comforted that ideas will never die. The purpose is to incite thought and revolutionize ideas. We, the authors, yet never finishers, share different perspectives on life and so this blog will indeed be two-dimensional. Topics will be humorous and perhaps quite silly. Topics will be serious and perhaps quite morbid. Sentences will even contain unparalleled parallel structure. Oh and we cater:).

Friday, May 27, 2011

The Hangover Part II (a review, kinda)

Called up my main man De-Money yesterday told him we had to go hit up the midnight premiere of the Hangover, and like the true bff he is, he went and got the tix. Cool.

Later that night we arrived at Tinseltown, and hung out in the line for a good 15 minutes, woulda been boring if it hadn't been for one of the Mannliest men and his posse. Oh, and "Stoner Jesus" was in line too, long hair, eyes more glazed over than a krispy kreme doughnut, yeah. Then the line began to trickle along, and after being carded, lwl, we went to the actual theater and found our seats...in the front row. Call me front row Joe. And I will bore you no longer..except I have one kvetch

To the guy sitting next to me who absolutely wreaked of cigarette smoke:
1)Shut the fuck up.
2)You smell awful-- like shit to be precise.
3)Stop trying to front and encroach on my arm/leg space, I'm sorry if you had to settle for the arm-brushing/leg-rubbing because all the girls think you're repugnant.

Alright alright, on to the movie

it gets a 7/10 from me

Was it funny? It definitely had it's moments, but I was't guffawing.
Was it original? Absolutely it wasn't. Do these guys only drink right before a wedding? c'mon. Is Alan the only one that can slip them drugs? cmon.
Was there too much penis? Yes
Was it more shocking than the first? No doubt.

The story was lame. The smoker-drug-dealing monkey was pretty sweet. The getaway scene was cool. Galifanakis was hit and miss with his awkward jokes. Ed Helms likes to freak out in stressful situations. yeah. Ken Jeong was my favorite, except for his penis. The soundtrack was pretty good, played really nice in a movie theater. Bradley Cooper was solid.

Bottom line- Solid Cast, and lazy writers make for an enjoyable movie first time through, but definitely did not meet expectations.

Spoiler. Stu does it with a transexual

-Mi

Friday, May 13, 2011

Practice Safe Computing

Seriously guys, after reading this post, I hope some of you will be a little more weary about your information's
safety on the computer, and the internet. Over the past year, I have come across a variety of tools that if in the
wrong hands could wreak a lot of havoc. Mostly because there are so many casual computer users that are unaware of such security risks. I would also like to add that though aware of these tools, I am nowhere near what one would be considered an expert "hacker" (hacker here used loosely, as the definition has caused a schism between "power" users).

Anyways here is the list in no particular order of potency, they each have their own strengths.
_____
opchcrack http://ophcrack.sourceforge.net/

This little bugger is the reason I changed all my passwords to 14 characters. Doing a little research, it can
be said with certainty that the majority of people's passwords are 4-8 characters in length. To ophcrack, that's nothing. Do you have a password that contains a word in the dictionary? a common first name? Consider yourself compromised...

I personally have tested ophcrack on my own computer, running Vista, and now windows 7, and on my home computer, running xp and it worked like a charm. How does it work? Well I'm not going to write a tutorial on how to access your friends' comp, cause that's what the rest of the internet is for :p..Basically, you boot up Linux from USB and if configured correctly the program  will start after linux boots, and then ophcrack loads the rainbow tables (those are important)..then ophcrack reaches into the depths of your windows files, and pulls out SAM (the guy with the passwords) then ophcrack tortures SAM until he giveth forwardeth the password(s)...Nearly all computers nowadays are bootable from USB, but alas, you on your triceratops that can only boot from a CD, do not feel so safe, it is indeed possible to make a bootable CD that runs ophcrack

Sooo, the solution? Make your password at least 12 characters, and do flourish those special characters/numbers
Example: Fu$kW!Tm3Br0
______
Chntpw http://pogostick.net/~pnh/ntpasswd/

So you rockin' your longer and bigger password? Ok good! Except, well maybe not.

The ironic thing is, Chntpw will go in and merely reset the password of any windows user. Yes, all that work for nothing. So to continue the analogy, ophcrack interrogates the hell out of SAM, but Chtnpw gets sick of it and decides NO own shall ever know, and drugs SAM and causes permanent memory loss. In a more technical sense, this too is a linux program that can be used with little know-how, and yes, straight from USB or CD.

How to guard against it? If you're username and password is associated with a domain, you're probably good. But seeing as most personal computers don't run on a domain..there are a few ways to protect against this:
1) Watch your shit
2) Slightly more practical, change the BIOS settings so that booting from USB and CD aren't an option. In addition, set a password for the BIOS so the potential hacker can't try. Yes your CD and USB will be useable when you start windows, no your computer will not spontaneously combust ;), and yes you can change the settings in the future.
3) Know which of your friends are more advanced with computers, and don't let them stick any dongly bits or CD's in or around your computer, and if they absolutely insist, watch them closely, and tell them to lay their grubby fingers off the function keys.
_______
John The Ripper http://www.openwall.com/john/
Similar to ophcrack, except John the Ripper will crack username/passwords from a variety of services online like Email or facebook or porn sites..well basically anything. It works in several ways. The user supplies separate dictionaries for both the usernames and passwords, and the program will try every combination-- a bruteforce attack. However the user can simplify things by providing the username, or in rare cases, the password.

Here is a list of the 500 worst passwords -- http://www.whatsmypass.com/the-top-500-worst-passwords-of-all-time these passwords are surely included in the Dictionaries. In addition, extended dictionaries can be found online that can provide for a powerful attack on anyone's password.

Defense? Make sure your password isn't on the list of 500, or completely in the dictionary. Again make it at least 12 characters, and use different passwords for all your online activities..your car keys don't open your house, don't open your mailbox, and don't unlock your bike (if you're into that sort of thing).

This is just an example, there are tons more password crackers out there.
________
Keyloggers http://www.desktopshark.com/

Desktop Shark is also one example of many keyloggers out there. A keylogger does exactly what is says, it will log every keystroke entered on the computer. There is a multitude of ways a keylogger can be placed on your computer without your knowledge. This program will run in the background, virtually undetectable. The person keylogging, has a secret method to reach the logged keys, in the case of Desktop Shark it's typing "desktopshark" and it will pop up. Other more advanced keyloggers will send an email containing the files to the person.

The best way to protect against keyloggers is to make sure your Antivirus on your computer is up to date. There are a bunch of good, free antivirus programs out there. In addition, there are special usb's that can be placed into a computer and will automatically start keylogging. So just unglug any suspicious dongles from your comp.
________
Ettercap http://ettercap.sourceforge.net/

Ettercap is a versatile network packet sniffer. When your computer is on the internet it is constantly sending and receiving packets of information. Included, are what websites you visit, and passwords for such websites, encrypted but I think you guys have learned that that doesn't really mean anything anymore.

With Ettercap the "hacker" can monitor a network (wifi or wired) and literally listen in on the computer of their choice, gathering tons of sensitive information.

The rubber? Well if you're on a school network, generally IT can find those that are disturbing the network, and shut their connection down. Though that isn't to say you are safe. At the local starbucks? Simply don't access anything of real importance. Or run ettercap yourself which allows you to seek others who are sniffing the network.
__________

The key thing to take away is that there are a bunch of different tools used to compromise someone's privacy online. A very good step is to make your password more complex, and generally be more aware that such things exist.

Beware MoT nation, Big Brother might not be watching you, but your 4th cousin might be.

-Mi

Followers