Monthly Archives: September 2002

Wireless Scanning – Wardriving / Warchalking

In my previous article about wireless security and hacking, I introduced common security threats in WLANs and ways that wireless hackers use them to break into a wireless network. Before a wireless hacker breaks into a WLAN, he/she must identify a suitable open network to launch her/his attack. This article explains what the common methods… Read More »

LastLog Editor – Unix LogFiles

This tutorial was written to show Unix users how to create a simlpe Unix LogFile editor. I decided to write this article, right after I have read the tutorial by pajka (, which talks about Unix LogFiles. This tutorial gives detailed information about LastLog logging file, the structure of the log file and how to… Read More »