The vast majority of the posts in this blog are about software development. A good part of most of my posts have some source code. My previous template was a three column one. Most of the code didn’t fit into the middle column of the template, so people had to scroll all the time and formatting was awful.

[ad#half_banner_inline]

I tried quite a few templates, but they didn’t match what I wanted. Finally I ended up Continue reading

I was reading a blog post the other day that in order to upgrade from OSX Lion to OSX Mavericks you need to first upgrade to mountain lion (paying the $20 upgrade fee). Checking the description by apple as pointed out here: http://www.apple.com/osx/how-to-upgrade/
it is evident that there is no such requirement:

You can upgrade to OS X Mavericks from Snow Leopard (10.6.8), Lion (10.7), or Mountain Lion (10.8).

So, I have backed up everything and I am going to start the upgrade process now!

I wanted to add a new device to my wireless network, but I had forgotten the wireless key. My network uses WEP encryption. So, I used aircrack to recover the key. Basically what I had to do was:

    • use airodump to save a large number of  transmissions between the wireless router and a device that is already connected to the network.
    •  use aircrack to analyse the file produced by airodump and find the password

In particular, I managed to recover the key in the following simple steps:

  1. Download BackTrack Linux Distribution and burn it on a DVD.
  2. Boot my laptop using the live DVD
  3. On command prompt type:
    ifconfig to see the available network interfaces in Linux. Doing this I was able to find my laptop’s wireless interface.
  4. Type: airodump-ng -write afile.cap wlan0 , where afile.txt is the file that airodump will save all communication and wlan0 is the wireless network interface of my laptop as discovered in step 3. Let it run and collect packets for quite some time. It may a few hours (in my case it took 6 hours) for this step to collect enough packets. The time it will require depends on the traffic of the network. The more traffic the better. Once enough packets have been collected press Ctr+c to kill the process.
  5. Type: ivstools -convert afile.cap afile.ivs to convert the captured packets to ivs format compatible with aircrack
  6. Use aircrack-ng afile.ivs. Aircrack will pop up a menu to ask you which network you want to crack. Select the SSID of your network and if enough packets have been collected in step 3, you will have the key of your wireless network in no time!