Author Archive for Jon Armani


Safe Mode Boot to Windows in a Dual-Boot Environment

I was trying find this earlier, but the top 10 Google results [I don’t look very far] didn’t have what I needed, so I figured it out and decided to post my solution!

Continue reading ‘Safe Mode Boot to Windows in a Dual-Boot Environment’


Windows 7 includes a virtual XP environment

Microsoft announced that Windows 7 will include a virtual environment for Windows XP for backward compatibility for applications . . . that’s awesome! This is the first time they’ve relied on virtualization (processor-level virtualization in this case) to solve compatibility issues, and I think it’s a good move and shows improvement in Microsoft’s thinking. The virual OS will have service pack 3 installed and comes with a full license, so you don’t even have to worry about acquiring a license for it.


Conficker Worm

April 26: Conficker has finally delivered some massive-scale payload, but unfortunately it was just boring spam.
Conficker delivers boring spam
This is obviously not very creative. But nonetheless, I believe Conficker’s reign is wrapping up . . . it is scheduled to stop most of its spreading and spamming May 3rd, though the path it laid would still be vulnerable for exploit later on.
Continue reading ‘Conficker Worm’


world’s smallest “Hello, World” program

This is fun for a rainy day. I tried it out and it worked, giving me a smile and a better understanding of assembly commands.

How to write the world’s smallest “Hello, World” program


E-mail Spoofing Tutorial

Here is an awesome tutorial for spoofing e-mails without using software:
E-mail Spoofing Tutorial


MD5 Decryption

I’ve made it my mission recently to find a decryption algorithm for this so-called “one way hash” algorithm.

The goal of this project is to make rainbow tables obsolete by providing an extremely efficient way of decrypting MD5 hashes. One application I know of is to easily modify Facebook cookies to impersonate anybody on Facebook, or any other site for that matter. Many sites nowadays use MD5.

Because of the way the rounds work during the encryption loop, I’m pretty sure I would only be able to backtrack messages of less than 448 bits, or 56 ASCII characters. That is still a pretty hefty size, though, considering many applications simply hash a short string of numbers or a password, even though MD5 can also be used as a checksum for large files, or even a complete ISO.

You can see my progress on the forum: under the Encryption topic, or by clicking HERE.

Bookmark This Blog

Bookmark and Share

View By Category