This time on the show, locking down your PC with proximity and a little bluetooth magic -- I'll be showing you how. Then, what's the IEEE on about these days? Darren reports from South-by-South-West. More fun bash tips and VPN security - who do you trust? All that and more, this time on Hak5!

Download HD Download MP4

If you're into Hak5 you'll love our new show by hosts Darren Kitchen and Shannon Morse. Check out HakTip!

Whether you're a beginner or a pro, HakTip is essential viewing for current and aspiring hackers, computer enthusiasts, and IT professionals. With a how-to approach to all things Information Technology, HakTip breaks down the core concepts, tools, and techniques of Linux, Wireless Networks, Systems Administration, and more

And let's not forget to mention that you can follow us on Twitter and Facebook, Subscribe to the show and get all your Hak5 goodies, including the infamous WiFi Pineapple over at HakShop.com. If you have any questions or suggestions please feel free to contact us at feedback@hak5.org.

Youtube Description (No HTML):

This time on the show, locking down your PC with proximity and a little bluetooth magic -- I'll be showing you how. Then, what's the IEEE on about these days? Darren reports from South-by-South-West. More fun bash tips and VPN security - who do you trust? All that and more, this time on Hak5!

If you're into Hak5 you'll love our new show by hosts Darren Kitchen and Shannon Morse. Check out http://www.revision3.com/haktip

Whether you're a beginner or a pro, http://www.revision3.com/haktip is essential viewing for current and aspiring hackers, computer enthusiasts, and IT professionals. With a how-to approach to all things Information Technology, HakTip breaks down the core concepts, tools, and techniques of Linux, Wireless Networks, Systems Administration, and more

And let's not forget to mention that you can follow us on http://www.twitter.com/hak5 and http://www.facebook.com/technolust, http://revision3.com/hak5/subscribe to the show and get all your Hak5 goodies, including the infamous http://hakshop.com/collections/frontpage/products/wifi-pineapple over at http://hakshop.com . If you have any questions or suggestions please feel free to contact us at feedback@hak5.org.

Leave a Reply

Your email address will not be published. Required fields are marked *

*

5 Comments

  • Galaxy Note with K&M is just sweet!

    • Jiffy 2 years ago

      What is K&M. Figured out it was a note and I was looking to see how to get linux to run on it. Can’t find any relevant info on K&M!

  • Jacob 2 years ago

    Seems like a lot of the technical hurdles with the shadow file could have been resolved by using an encrypted volume instead of an encrypted file. In that way, you don’t have to worry about where to put the temp file, you just mount the volume and your symlink is set to that mount. You won’t have to worry about powering off, less likely to worry about cold memory attacks, etc, and simplifies the setup a bit. Additionally, since you can store other things in the volume, you could set up a third token that has to be present before it even considers the shadow… a bit over kill to be sure..
    I like the overall simplicity of this two-factor process, though.