I hacked my secure wireless network: here’s how it’s done

February 6, 2007

I hacked my wireless networkWireless networks are everywhere; they are widely available, cheap, and easy to setup. To avoid the hassle of setting up a wired network in my own home, I chose to go wireless. After a day of enjoying this wireless freedom, I began thinking about security. How secure is my wireless network? 

I searched the Internet for many days, reading articles, gathering information, and participating on message boards and forums. I soon came to the realization that the best way for me to understand the security of my wireless network would be to test it myself. Many sources said it was easy, few said it was hard. 

How a wireless network works

A wireless local area network (WLAN) is the linking of 2 or more computers with Network Interface Cards (NICs) through a technology based on radio waves. All devices that can connect to a wireless network are known as stations. Stations can be access points (APs), or clients.

Access points are base stations for the wireless network. They receive and transmit information for the clients to communicate with.

The set of all stations that communicate with each other is referred to as the Basic Service Set (BSS). Every BSS has an Identification known as a BSSID, also known as the MAC address, which is a unique identifier that is associated with  every NIC.

For any client to join a WLAN, it should know the SSID of the WLAN; therefore, the access points typically broadcast their SSID to let the clients know that an AP is in range.

Data streams, known as packets, are sent between the Access Point, and it’s clients. You need no physical access to the network or its wires to pick up these packets, just the right tools. It is with the transmission of these packets that pose the largest security threat to any wireless network.

Wireless Encryption

The majority of home and small business networks are encrypted using the two most popular methods:

  1. WEP
  2. WPA

WEP – Wired Equivalent Privacy – comes in 3 different key lengths: 64, 128, and 256 bits, known as WEP 64, WEP 128, and WEP 256 respectively.  WEP provides a casual level of security but is more compatible with older devices; therefore, it is still used quite extensively. Each WEP key contains a 24 bit Initialization Vector (IV), and a user-defined or automatically generated key; for instance, WEP 128 is a combination of the 24 bit IV and a user entered 26 digit hex key. ((26*4)+24=128)

WEP also comes in WEP2 and WEP+, which are not as common and still as vulnerable as the standard WEP encryption.

WPA – WiFi Protected Access – comes in WPA and WPA2, and was created to resolve several issues found in WEP. Both provide you with good security; however, they are not compatible with older devices and therefore not used as widely. WPA was designed to distribute different keys to each client; however, it is still widely used in a  (not as secure) pre-shared key (PSK) mode, in which every client has the same passphrase.

To fully utilize WPA, a user would need an 802.1x authentication server, which small businesses and typical home users simply cannot afford. WPA utilizes a 48 bit Initialization Vector (IV), twice the size of WEP, which combined with other WEP fixes, allows substantially greater security over WEP.

Packets and IVs

It’s all in the packets. The bottom line is – while you may be able to employ several security features on your WLAN – anything you broadcast over the air can be intercepted, and could be used to compromise the security on your network. If that frightens you, start stringing wires throughout your home.

Every encrypted packet contains a 24 or 48 bit IV, depending on the type of encryption used. Since the pre-shared key is static and could be easily obtained, the purpose of the IV is to encrypt each packet with a different key. For example, to avoid a duplicate encryption key in every packet sent, the IV is constantly changing.  The IV must be known to the client that received the encrypted packet in order to decrypt it; therefore, it is sent in plaintext.

The problem with this method is that the Initialization Vectors are not always the same. In theory, if every IV was different, it would be nearly impossible to obtain the network key; this is not the case. WEP comes with a 24 bit IV; therefore, giving the encryption 16 million unique values that can be used. This may sound like a large number, but when it comes to busy network traffic, it’s not.

Every IV is not different; and this is where the issues arise. Network hackers know that all the keys used to encrypt packets are related by a known IV (since the user entered WEP part of the key is rarely changed); therefore, the only change in the key is 24 bits. Since the IV is randomly chosen, there is a 50% probability that the same IV will repeat after just 5,000 packets; this is known as a collision.

If a hacker knows the content of one packet, he can use the collision to view the contents of the other packet. If enough packets are collected with IV matches, your network’s security can be compromised.

The Setup

My wireless network was powered by a Linksys WRT54G v6 wireless router; It is well known that this model is the most widely used wireless router. Out of the box, the Linksys router came with 1 CD which was nothing more than a visual step by step, what you should do to connect it.

A few things concern me with this router. There was no part in the setup that allowed me, or even told me to change my router’s default password. To change the password, I had to go into the router’s web-based setup utility; this was accessible via the IP address in my Internet browser. The default username and password was admin. If someone was able to compromise the security on my network, they could have easily done this for me; and locked me out of my own network. Sure, I could have performed a hard reset on the router, but I’d have little luck without the Internet or any documentation to help.

If you’re looking to find your default username and password, there is quite a comprehensive list located at www.phenoelit.de My advice is to change this immediately, for it may save you some trouble down the road.

Being my first time, I decided to go easy; I set my router up with a basic WEP 64 encryption; it required a 10 digit hex key. I entered the key into the 2 other computers in my home, and I was ready to start.


Out of everything I’ve experienced over the last couple weeks, this was the hardest obstacle, by far. I started with a Dell Latitude C610 notebook with a Linksys WPC54GS Wireless-G notebook adapter (Broadcom chipset) running Windows XP Pro; looking back, it was a bad choice.

When selecting hardware, be warned, not all network cards are the equal. It turns out that nearly 99% of the software used to crack network keys are not compatible with notebook cards that have a Broadcom chipset; the ones that were just didn’t work.

9 out of every 10 articles I read boasted the Orinoco Gold PCMCIA network card by Lucent was the absolute best pick and most compatible will all the good software. A trip to E-Bay, $30 later, and I was ready.

The software we will be using is strictly dependent on the chipset of the WNIC, and unfortunately, the operating system. Your best approach would be to research what software you will be using, and then find a card based on the chipset the software is compatible with.

There are many types of chipsets; too many, in fact, to mention. Linux-wlan.org has an unbelievably comprehensive list of WNICs and their corresponding chipset.

All the best programs are made for Linux; windows is certainly a drag when it comes to WLAN penetrating software, but if you don’t have Linux, don’t be too concerned.

It may be in your best interest to invest in a wireless card that has an external antenna jack. The Orinoco Gold WNIC I purchased has one, but since I’m compromising my own network in a short range, it won’t be necessary.

The Software

There are hundreds of applications you can use to do a variety of things with wireless networks. The largest list of software, that I came across, can be found at Wardrive.net. The term “wardriving” is more commonly used for this practice, and involves driving around neighborhoods to look for wireless networks. I refuse to use this term because that is not what I am doing; I am sitting in my home testing the vulnerabilities of my own network.

Let it be known, that it is not illegal to use software to detect the presence of wireless networks; however, if you crack the network and start “stealing” bandwidth, you could be in a world of trouble. Especially if you’re in Singapore.

Once I received my Orinoco card, I began re-installing software which did not previously work with my Linksys card. It was a nightmare; Windows XP kept getting in the way, software that had been moded to run on windows required daunting tasks for installation, some programs simply didn’t work, some required special run time modules to be installed.

After nearly 48 hours of time-wasting, aggravating, disappointment; I came across the answer. A small penguin shone a beam of light upon my browser and blessed me; I found Auditor.

(2/6/07 - The link is currently not working, but you can obtain Auditor through any Torrent service.)

Auditor Security Collection is a self booting Linux-based CD that comes pre-loaded with all the best security software for auditing a system. It comes in a .ISO file that can be downloaded from remote-exploit.org; the ISO image file is roughly 649 Mb, and can be burned to a CD or DVD using most CD/DVD writing utilities.

It was truly amazing; a simple check in the Bios of the laptop to set the boot order to CD/DVD first, a slip of the Auditor CD, and a press of the power button was all it took. I was ready. Be not afraid of this Linux-based CD; everything is laid out on a GUI and all commands have “shortcuts” linking to them on a desktop similar to a windows environment.

Auditor Security Collection does not touch a single file on your hard drive. All files used and saved in the ASC are stored in your notebook’s RAM; once you remove the CD and reboot, everything is exactly as it was.

Detecting my wireless network

If you’ve come this far, believe me, you’re doing well. The first step is to find the network you want to penetrate. As there are a variety of apps that allow you to do this, we will be focusing in on the 2 most popular: Netstumbler, and Kismet.

Netstumber - is a widely popular tool used for detecting 802.11a/b/g wireless networks.  The latest version is Netstumbler 0.4.0, and will run in Windows XP. For compatible hardware and requirements, you can check the read me on the Netstumbler forums; or you could just try it. I’d like to point out that many sources have said the Linksys WPC54G/S WNIC does not work with Netstumbler; however, I have been able to make it work by launching the program, then removing and re-inserting the WNIC. The Orinoco Gold works fine with Netstumbler.

Kismet – does a little more than just detecting networks. Aside from providing every detail about a network except the encryption key, Kismet is a packet sniffer and intrusion detection system; we’ll get into sniffing packets a little later.

For this demonstration, we’ll be using the pre-loaded Kismet on the Auditor Security Collection. After inserting and booting the Auditor CD, I was ready to make sure everything was working properly.

From this point, the first thing that needed to be done was to ensure the wireless card was recognized by Auditor; to do this, you will have to venture into the dark world of the command prompt. In Auditor, the command prompt can be reached by clicking on the little black monitor icon located at the bottom of your screen.

Simply typing in iwconfig will allow you to see all the wireless extensions configured on the machine. If you see a screen full of data next to a WLAN0 or ETH0, you’re ready to continue to the next step; otherwise, you will see a list of “no wireless extensions” messages.

Next, you will need to start the Kismet program. You’ll initially be prompted to enter a destination to save data to; you can just select the ’desktop’ and continue. When Kismet loads, you will see a black screen with green text showing all the wireless networks within you signal range.

Kismet will give you all the information you need to start cracking. Pressing ‘s’ on your keyboard will bring up a ”Sort Network” dialogue box. From there you can press any of the desired sorting methods. This step is important as it allows you to select a particular wireless network on a list to view more details. Select your network with the arrow keys and press enter.

You will then be looking at nearly all your network details such as name, ssid, server IP, bssid, etc… Most are not relevant in this case, but you should write down a few things:

  1. BSSID
  2. Channel #
  3. Encryption method

Pressing ‘x’ in Kismet will return you to the previous screen. re-select your target WLAN; then press ‘SHFT+C’ to bring up a list of associated clients to the Access Point. Write down the MAC address of all clients as it will prove useful.

Capturing packets

While you may have not been aware, at this point, Kismet has also been capturing packets. This is the bread and butter of cracking any wireless encryption; without data to process you have nothing.

Capturing packets, also known as packet sniffing,  is the process of intercepting and logging traffic passing over a network. As information is sent and received over your wireless network, the software captures every packet to allow you to analyze and decode it.

Capturing network traffic can be a timely process; especially if it is a slow network. With no-one on any computers in my home, I generally capture around 3,000 packets within 5 minutes; with users on the other 2 computers, this number is substantially greater. Don’t get confused, it’s not the packet itself that we want; but rather the IVs in the packets.

The programs we will be using to sniff packets are Kismet and Airodump (part of the Aircrack Suite). We’ve already touched Kismet, so lets take a look at Airodump.

Before running Airodump, you must configure your wireless interface to go into ’monitor’ mode; the methods to achieve this require you to go back to the command prompt (konsole).

For most WNICs, you would use the command:
iwconfig <interface> mode monitor

And in some instances would have to set the channel number on your WNIC to match that of the target access point:
iwconfig <interface> channel #

Note that you will have to replace <interface> with the network interface specific to your machine. Using an Orinoco Gold card, my network interface was eth0; but on most machines, it is wlan0 or ath0. So you may have to adjust those commands accordingly. You can find out for sure by simply typing iwconfig.

I should also point out that putting the Orinoco Gold card in ‘monitor’ mode had a different command altogether:
iwpriv eth0 monitor 2 1

Once your in monitor mode, you’re ready to run Airodump. The command used to start Airodump is:
airodump <interface> <output filename> [mac filter]

<output filename> can be anything you wish; Airodump will put a .cap extension on the end of the name. The mac filter is used to only capture packets from a specific access point. For instance, I used:
airodump eth0 george 00:18:f8:65:fe:41
to capture packets just from my access point - where 00:18:f8:65:fe:41 is the BSSID of the AP.

Airodump looks similar to Kismet, but there are no selectable objects on the screen; it gets right down to it, capturing packets and storing them in the .cap file as defined in the command. You’ll notice Airodump keeps a running count of all the packets captured, and better yet, shows you the number of IVs collected.

The waiting game

The hard truth is that you will need to collect nearly 150,000 IVs to crack a 64 bit WEP key, and around 600,000 IVs to crack a 128 bit WEP key. This number varies, but is mostly dependent on how luck you are. If you watch the IV count in Airodump, you’ll notice that, under normal circumstances, they do not rise rapidly.

This can cause a problem; particularly if you’re as impatient as I am. Let’s take a look at some ways we can speed up this process.

Until now, we’ve been using a method known as a passive attack. A passive attack is basically doing nothing other than passively capturing packets until you have achieved enough data to perform the crack.

Most access points need their client to re-associate after a certain period of time to confirm their connection; therefore, the AP will send out an Address Resolution Protocol (ARP) packet.  The ARP packet is unique in that is always addressed to the MAC address FF:FF:FF:FF:FF:FF, usually has a size of 68 bytes, and has the ToDS flag set.

We can use this information to implement an ARP replay attack. For this method, we will be using Aireplay (part of the Aircrack Suite). Aireplay can be used to actually re-send packets that it has received.

Leave Airodump running, and open a new command window. The command we’ll be using for Aireplay is:
aireplay -i -m 68 -n 68 -d ff:ff:ff:ff:ff:ff -b 00:18:f8:65:fe:41 eth0

The -i tells Aireplay to capture packets on the fly; the -m 68 and -n 68 tells aireplay that you only want it to replay packets that are 68 bytes. The -d and -b are the destination MAC address and AP MAC Address(BSSID) respectively. This is the criteria that is defined for our ARP packet, which is usually associated with an IV.

Alternatively, you may have already captured one of these packets. You can have Aireplay check the .cap file from Airodump with the -f switch:
aireplay -f george.cap -m 68 -n 68 -d ff:ff:ff:ff:ff:ff -b 00:18:f8:65:fe:41 eth0

In either case, If Aireplay finds a match to our specifications, it will show you the details of the packet and ask if you would like to replay it. If the details look exactly as shown below, press ‘y’ for yes.

FromDS = 0, ToDS = 1
BSSID = <mac address of access point>
Src. MAC = <client MAC>
Dst. MAC = ff:ff:ff:ff:ff:ff

Aireplay will then begin to replay the packet; if you’ve found a winning packet, you will notice your packet and IV count in Airodump rise extremely quick. If not, only the packet count in Airodump will rise; If this be the case, press CTRL+C to abort the operation, restart aireplay, and try again.

It has been noted that some routers will detect this erratic behavior and block the MAC address of the WNIC you are using. Adding a -x switch followed by a “replay per second #” will slow down the rate at which Airplay replays these packets.

If your lucky enough, you will have collected enough IVs in little time. For me, it took 28 minutes including booting up, writing down the network specs, and typing all those lengthy commands.

There are other methods such as Dueth attacks which force the clients off the AP, causing them to have to re-associate; but these methods require a second computer.

The crack

Two of the most popular programs used for actually cracking the WEP key are Airsnort and Aircrack. Airsnort can be used with the .dump files that Kismet provides; and Aircrack can be used with the .cap files that Airodump provides.

Airsnort can be used on it’s own without any other software capturing packets; although, it has been reported to be extremely unstable in this state, and you should probably not chance loosing all your captured data. A better method would be to let Airsnort recover the encryption key from your Kismet .dump file. Kismet and Airsnort can run simultaneously.

For this demonstration, we’ll be using Aircrack. You can use Airodump to capture the packets, and Aircrack to crack the encryption key at the same time.

With Airodump running, open a new command window and type:
aircrack -f 3 -n 64 -q 3 george.cap

The -f switch followed by a number is the fudgefactor; which is a variable that the program uses to define how thoroughly it scans the .cap file. A larger number will give you a better chance of finding the key, but will usually take longer. The default is 2.

The -n switch followed by 64 represents that you are trying to crack a WEP 64 key. I knew because it was a setup; In the real world there is no way to determine what WEP key length a target access point is using. You may have to try both 64 and 128.

The -q 3 switch was used to display the progress of the software. It can be left out altogether to provide a faster crack; although, if you’ve obtained enough unique IVs, you should not be waiting more than a couple minutes.

A -m switch can be used, followed by a MAC address, to filter a specific AP’s usable packets; this would come in handy if you were collecting packets from multiple APs in Airodump.

Aircrack recovered my WEP 64 key within 1 minute using 76,000 unique IVs; the whole process took around 34 minutes.

The same experiment was repeated with WEP 128 and it took about 43 minutes. The reason it was not substantially longer is because I simply let Airplay replay more packets. Sometimes you can get lucky and capture an ARP Request packet within a few minutes; otherwise, it could take a couple hours.

After I had access to the network, many doors opened up. Aside from having access to the Internet, I was able to use Networkview – a network discovery tool – to obtain my network’s workgroup name. From there, I had access to all the shared files on my drives.

While I’m no expert in the subject, I can at least assume that many horrible things could happen if the wrong hands were to obtain my WLAN encryption key. 

The conclusion

Always use WPA or WPA2 encryption when possible. If your using WPA with a pre-shared key, use a strong password; hackers can use dictionary attacks, and they will be quite effective if you have an easy password. You may want to use a strong password generator like the one at grc.com.

If your access point supports it, you may want to consider disabling wireless SSID broadcast; however, this may raise some issues with the APs clients recognizing it. (Kismet will still recognize it)

Many routers will allow you to filter what clients can access the network; this is known as Wireless MAC Filtering. If you know the MAC address of the clients you are using, you can enter them into your configuration utility as “Permit ONLY”. This is not a 100% effective method; MAC addresses can be cloned to match the AP’s associated clients, but it does provide you with a slightly higher level of security. (there is a utility on Auditor to allow you to do this)

By default, your router may be set to mixed mode; this allows 802.11b and 802.11g devices to access your network. If you use only 802.11g devices, set your router to G-ONLY. Had my router been set this way, I would have never been able to do any of this. The Orinoco Gold card is 802.11b, and is obviously not compatible with a 802.11g network. Many 802.11g cards are not supported by the software we’ve used in this tutorial, but few are. While your at it, please change your default router username and password.

While I haven’t tried my hand at cracking a WPA encryption, the methods are similar when the WLANs use pre-shared keys (psk); I do plan on trying it, and I will surely write an update to let you know how/if it was done.

By no means am I claiming to be an expert in this field; If you’ve noticed anything that was incorrect or just have something to add, please feel free to drop a comment.

Update Feb 2009: How WPA wireless networks are hacked, and how to protect yourself

Be Sociable, Share!

638 Responses to “I hacked my secure wireless network: here’s how it’s done”

  1. Marvin:

    WEP has been broken for a long time. This is old news. Come back when you’ve cracked WPA.

  2. Simon:

    you said “I could not disable remote access to my router” and that the tick box did nothing…

    this is not true…remote access means from outside your network ie. the internet it does nothing to your internal network, you can always access webconfig for any router from the internal network.

    remote access is handy if you want to forward a port or similar task when you are not at home

  3. George Gardner:

    Simon, thanks for that information. Being new to this, there is surely many areas to cover.

    Marvin, I do plan on coming back when I’ve cracked WPA; of course, that has been done as well. :)

  4. Mike C:

    I liked this information, what was helpful to me was the info at the end that helped an end user make their network more secure against these kinds of attacks. Sadly, most are common sense that people who setup wireless networks in their home don’t even think about. Thanks for the info George, great article!!!

  5. Ben Dover:

    I’m what’cha call a security professional, I make my living fixing the damage done because folks set up networks without a clue. This article is a very good primer & a version of it should be encluded with every new AP sold. Course, I’d get a lot less work but I can work around that.

  6. Anand:

    Hey, i used Back Track Live Linux CD to boot my computer, but i was soon disappointed realizing that i gotta search for the driver for my wireless card ! i got a broadcom 802.11b/g wireless card in my Compaq Presario 3015nr laptop, do u have any idea where i can find the linux driver for my wireless card?

  7. George Gardner:

    “It turns out that nearly 99% of the software used to crack network keys are not compatible with notebook cards that have a Broadcom chipset”

    I think your best bet would be to find another card. Try Ebay. Sorry, I couldn’t be of more assistance.

  8. bob:

    how do you find out who has used your wireless network recently like 1 week ago?

    how do you know what your mac address is?

  9. Paul:

    Anand> The guys at remote exploit released a new backtrack version several days ago, which should solve the broadcom problem.

  10. George Gardner:

    Thanks, I’ve already dowloaded it and I’m hoping to try it out in the next few days.

  11. Vinicius K-Max:

    The best post about wireless security EVER.

  12. Dav:

    Hi: Very interesting, but way over my head. Very comprehensive, i would have to print it and pore over it to even begin to put any of it into practice.

    I have a linksys WRT54G Router with a Macintosh. Someone also gave me a DWL 810+ Bridge. I was able to get it to pickup my router at some distance (I used an iMAC in a RV).

    Being 77 years old and having not too good short-term memory, i don’t remember the alphabet soup of terms or numbers too well. I also do not get more patient as mine enemy grows older:). In any case i changed the standard access to something else; also the name of the router. Of course the quickest way to protect a non-wireless network is just turn off the WLAN, or at least the SSID broadcast.

    I reset the DWL 810+ and then did the SSID survey. Your comment on Nets being set up ignorantly is well taken. Somebody has a Belkin 54G that is totally unprotected. I’ll bet they aren’t even using a wireless net. I got on the Internet at around 2Mbps thru it. Then got off.

    I haven’t the foggiest idea who or where they are, within a the block i suspect. I entered the default Belkin id and then after it responded the password admin, admin. There i was inside their net. Four users were connected.

    I suppose i could have done all sorts of mischief there or left them a warning message, but wouldn’t even try.

    Documentation supplied with the product leaves a lot to be desired. In fact you have to read between the lines to use it with a Macintosh.

    The most desireable feature (if they could KISS it) would be a program to tell if someone else is on my net via the Router’s command structure. The closest seems to be the DHCP clients list under the status>local network tab. There is also a logging function.


  13. George Gardner:


    Disabling your SSID will help, but it’s certianly not full proof. Kismet can still detect it, and people are most certainly able to connect to it.

    As for detecting when someone is on your lan? Well, I plan on writing a piece on that very soon. Also, many people believe that no harm can be done if someone is stealing your internet connection. You and I agree that there is much that can be done, So I may also touch on that as well.

  14. Paul:

    I am in the clever but not terribly tech-savvy category, and do not know what i do not know. somebody has taked over my Belkin home wireless, and i am trying to figure out what to do next. any suggestions are welcome. certainly i would also like to know how to better protect myself inthe future. help?

  15. Paul Pickering:

    I am in the clever but not terribly tech-savvy category, and do not know what i do not know. somebody has taked over my Belkin home wireless, and i am trying to figure out what to do next. any suggestions are welcome. certainly i would also like to know how to better protect myself inthe future. help?

  16. Daniel Hoiye:

    Yep..Already know that WEP and WPA are not save..

    I set up my wireless network based on the tutorials from this website.. Pretty easy to read and set up a secure home wireless network. Lot of info..

    Home Network, Wireless Network and Computer Networking Made Easy

  17. derkim:

    is there i faster way of getting the ivs to rise quikly instead of using aireplay.

  18. KonaBoy:

    May 25th, 2007

    I am in the clever but not terribly tech-savvy category, and do not know what i do not know. somebody has taked over my Belkin home wireless, and i am trying to figure out what to do next. any suggestions are welcome. certainly i would also like to know how to better protect myself inthe future. help?

    Paul, I would try resetting the router to defaults, usually done by pressing the reset button, then follow directions here to apply some type of security. Good Luck!

  19. Travis:

    Hey PaulPaul,

    Best thing to do when some ass has taken over your wireless router is to perform a factory reset (which the router will have a button somewhere to perform this operation).

    I know my Linksys would just need this depressed when the power plug is connected and it returns back to factory for me to re-do setup and ensure those hackers don’t do it again.

    Cheers & all the best.

  20. Non American:

    Hi there,
    If you want to make your life a little more simple breaking into a wireless network then try using the tool “Cain and Able”. This will basically do all the work for you and is available as a windows installation (ie/ you dont need linux).

    As always with software like this, you need the correct hardware to work with it. I would suggest using the information above or buying a dedicated network “packet capture” card to do the job. The AirPCap card is just such a device.

    I am not aware yet of any advertisied successful (reproducable) penetration of a WPA / WPA2 wireless network that doesnt rely on a dictionary type attack. This doesnt mean it is impossible, it just means that you should use really big random number and letter passwords so that this type of attack is useless.

    Another useful tool for the windows user is Wireshark. It also has links to some training on the website as well as other useful tools.

    Never be afraid to try and break your own wireless network – it is the only way to see just how secure it is.

    Non American

  21. Kamikazi:

    Hoiw do i run kismey?

  22. tagz:

    i have a dybex internal wireless nic and its comin up as broadcom….the prog says its not recognizing it….lol but im talkin to u guys so what am i doin wrong?

  23. tagz:

    i meant dynex

  24. DynV:

    I was distracted by my WLAN light going crazy after diner time and that got me thinking that I could get more than my meager 30 Gb / month for FREE. Great article, thanks ! >:)

  25. Luke S:


    did you need to use the patched drivers with your orinoco card?

  26. jenny:

    that is to complicated is there a simpilare way to do it

  27. Wolf:

    How can u hack the VPN account? I use the VPN tunnel in my wireless network. Several people tried to hack it, but everybody failed. It’s Impossible to hack the 128-bit encrypted channel. If u think that I’m not right u can go to http://strongvpn.com/ – I use their service, and check all technical definitions.

  28. couture:

    i have belkin wireless and i’m trying to find my WEP key, i need it to connect to the internet for my wii. can you help me?

  29. In Reply to Couture:

    To reset your WEP Key use a pc connected to your wireless network and type the router address (usually into your internet browser (without http://www.). This will allow you to configure your router by logging in. If you have not changed your default password (though you should have!) it is blank by default so simply press enter. Once you have logged in select security under the heading wireless on the toolbar to the left of the screen. This will allow you to read your WEP Key. Good Luck!

  30. EPCTechno:

    Great stuff George, was reading another one on this, but yours was the best one laid out!

  31. afi:

    any easy method to get key of a secured wireless network

  32. jkey:

    Good information. Aircrack is very useful to hack wep password. just collect IVs as many as u can at least 100 000. But how can i hack wireless that protected by username and password site? is there any software can we use for that? please help me…. email me at jackie_kennedy87@yahoo.com.my… sory for my broken english…

  33. Cavin Mugarura:

    Your article is good, however, its a tech article, the problem with techies, they cant explain systematically how to do something, first and foremost your article was too long, i plan to write a shorter easy guide to crack wireless LANs, i dont think a very long article is effective

  34. Aimee:

    hey, i have a belkin, and im trying to connect it up to my psp, it always comes up with a dns error, any way i can get past this?

  35. ahmed:

    hi , i donot know much but what to ask some basic questions that i have …
    1) if some body hack my wirless how can i know is that possoble that i will not b able to conect to my wireless again after being hacked.
    2) what is time average for geting these IVs.
    3)and still there is no software in window means in xp that donot requires to go to linux mode ….
    hope u will ans my question though i have little knowlge abotu wireless networks…..i am working on that….

  36. solari:

    hey everybdy how can i hack a wirelless network when i have already connected to it and it asking for username an password pls send it to my mail solari4reel@yahoo.co.uk thanks

  37. Sagar:

    Someone in my building has an unsecured wireless network. It gets displayed in the list of available wireless networks. I want to tell him that his/her network is unsecured and to secure it ASAP. How do I know who is the owner of that network. I can even access the in the browser.It seems that person might get into serious trouble if not taken care of.

  38. Rajat:

    Hey, thanks a ton George.. Am about to buy a wi-fi router and this was definitely interesting and a great starting point.. Will try it out as soon as i get my router this week.. Thanks again.. have a great day.. :))

  39. nadi:

    hey everybdy how can i hack a wirelless network when i have already connected to it and it asking for username an password pls send it to my mail thanks

  40. jordan:

    what program do you need to hack a WEP network, i need internet at my house and i can’t afford to get internet.

  41. brad:

    hi if there is anybody who can tell me how to hack into a wirless network it will be a great help

  42. ajadwe:

    it is really a very nice article …thanx alot

  43. Julie:

    hey really awsum article… well i have a labtop with wireless on it but i need to know how to hack into a network that has a password so i can use the internet since i cant afford it atm im just a little lost on what u need to download and all that if u could email me back that would be great…

  44. Kristian:

    Hi George!

    This is a great article! I’ve been reading a lot of them on the net but this is by far the best and I was happy to read how you in detail explain the steps and software to use. Most other guides out there do not. My WLAN is more secure now than it was before.

    I have a question:
    The software that is capturing packets to crack the WEP key, does it only crack the WEP key or is my other information is also at risk? I mean is information like my passwords to websites, my email account pwd and such also revealed in the captured packages?

    Thanks for your help!
    Best Regards

  45. ~'RiCkOe'~:

    Great info i have been looking for something like this since i bought my laptop! I tryed finding that editor file but i was unable to. Perhaps you can send me a link or email me the file? thanks for the great info!

  46. suresh:

    Dear Sir,

    how can i hack a wirelless network when i have already connected to it and it asking for username an password. send me the reply in my mail.

  47. june:

    how can i hack a wireless network when i have already connected to it and it asking for username an password. send me the reply in my mail.

  48. Maryam:

    what is a netwok key and how to i obtain the network key

  49. Alec:

    im having alot of trouble with the iso file.can some one please offer me some wisdom.

  50. Mc:

    how can i hack a wirelless network when i have already connected to it and it asking for username an password. send me the reply in my mail.

  51. sasa:


  52. Martian:

    Splendidly written article.
    And certainly not too techy, what do you poeple expect, hand holding???
    I dont think half you poeple have even read the piece, ya should.
    Nice one m8.
    The Martian

  53. sarfo:

    how can i hack a wirelless network when i have already connected to it and it asking for username an password. send me the reply in my mail.

  54. Jake Banward:

    But what is there to do after you’ve cracked the network and logged on? Other than having a free internet connection, what else could you do?

    I crack these keys all the time and have access to many wireless networks, but then I just stop.

    Hypothetically, what interesting stuff could you do?
    What are some ways to explore the other computers on the network? Telnet? ftp? http:
    Network Neighborhood? Some other way?
    Or can someone only just sniff some more for interesting information that comes through while you’re on the network?

    email me please

  55. Mark:

    You did a great job. I have been working in the Security Industry for a while and had to implement 802.1x at a large corporation for the very reason of WEP being so insecure. I would pay the ‘know it alls’ on here no attention. GREAT JOB. JMK, CISSP

  56. eshi:

    So if anyone still replies on this comment thing… the original Phenoelit is no more. Where can I find that list of passwords now?

  57. abee:

    how can i get someone password without asking the owner.

  58. TACKZ:

    You people miss the point he didn’t show you all this stuff so you could steal other peoples stuff that is crossing the line and highly illegal, he only was showing this stuff so you knew how to protect yourself if you want free internet thats all good but leave other peoples files alone, and besides you can only see or read the other files on other computers if the are shared. Elsewise it requires a very high level of hacking which is much more technical than hacking A WEP key. And for those of you asking about getting past the username and password after you are connected you are wasting your time those are stored on a server at some business or ISP, and you can’t just go around them you actually have to know one

  59. Xplaced:

    Good article and informative. Many “commenters” don’t have a clue what they are talking about, especially the ones asking for help to get free internet, get someone’s password, etc.

    This article helps me know more about how to secure my own wireless network and friends’ networks. Thanks!

  60. Kosei:

    hey .. this shit is really helpfull but
    i downloaded the kismet and i cannot open it , in it there is a kismet.vbs file but that ask me for an kismet drone ip address and i dont know it a unable to find help , so i went to you …
    pluse can the aircrack software work withiut the kimest … i mean is there anyway to get IV’s and\or dump files ???

  61. Kosei:

    hey man ,, this stuff is really good . but …
    i downloaded the kismet and the exe files dont run excet the kismet.vbs filerunbut it ask for a kismet drone Ip address and i dont have it and dont know where to etit , i read the manuall but couldnt understand nothing !!! help me please …

    pluse can the aircrack work without the kismet , i mean is there any other way to get Iv’s or dump files ??

    mail me at

  62. Amin:

    Hi,………. great articles. if that really works, then plz send me the files for doing a faster crack. I need it vry badly. I am a software Engineer so I need it in developing applications.

  63. Dvae:


    I had an epihphany the other night. While lying in bed I was watching my neighbors freely surf my net connection, lights blinking furiously since it is unsecured. In the past I simply turned off the computers in my house that were connected to the network, but what about NETWORK security? Like someone committing an internet crime through MY ip address…. ? Pedophile? Wealthy Tanzanian hobby spammer? Panic set in. But then I got up, walked over the wireless system, and turned it off. If it turns back on like Chuckie, I’ll try unplugging it to see if that helps. Just a tip for you local home-network non-dorks. Most of us don’t need to have our computers on all the time. Nice article tho.

    Happy trails,

  64. Atif:

    The problem is can’t we use only one window based software to break through , as 1 more thing I am already seeing the network in list.But not connects to it

  65. bloggersmosaic:

    i know its old post, but i wanna comment saying i used to have linksys but i switch it to other kind of wireless tp link ..the less known wireless the hard to hack and get to know its weakness…
    thanks again and best luck!

  66. Michael Garcia:

    I know it is an old post but hopefully someone will tell me where I can download the auditor live cd, I searched for it and download it three times from different sources and my laptop won’t boot it hangs when booting stoping at:
    INIT: version 2.78-knoppix booting

    So I downloaded backtrack, it works fine but it doesn’t have the ‘airodump’ command.

    Can someone please help?? Which version of auditor or backtrack I need? OR where can I get it?

  67. Joe:

    I am not a computer expert so the article lost me at about page 3.
    Is there ONE s/w program that I could load on my laptop to help me monitor and intercept e-mail and MSN messages from a LAN that is unsecured? Also some artcles are saying I must have a NIC card on my laptop that supports RF monitoring – is this true and how do I know if my NIC can do that?

    thanks for the help… sorry for the dumb questions.

  68. Stormin:

    Excellent article packed with all the info you need to hack a wireless network. I suggest that all who post should read the article properly before asking “how do I hack a wireless network”
    As George says, it was intended as a way to see how secure your own network is, NOT to abuse other’s networks.
    There is just enough info to work it out, not too long for those who ask stupid questions like, “so how do I do it then?”. A shorter version is not needed, there are thousands already on the net, well done George!
    A word of warning to the unwise, real hackers would not thank you for trying thier network and can unleash a world of code onto an unsuspecting hard drive, or maybe just put all your credit card details onto the net for all to see, just because THEY CAN! If you strugle to understand this simple article then you really have no idea at all.
    Hacking is wrong! Yeah sure you might get a buzz from it but would you like your network raped & pillaged, this tutorial is here to stop it happening to you. If you go fishing at the lake, you just might get cught yourself?

  69. Sean:

    Hi, great article,

    Just wondering if its just me, or are all of those programs that you mention above nearly designed to be so awarkd to use??

    I would consider myslef to be pretty web / pc savvy, but those programs are just nuts, is there not a more simple application out there that does the job easier?

    In this piece, it states the wireless networks were hacked in a few mins, – it took me about an hour to find the correct “unzipper” for the program in the first place!

    And whats all this GNU craic, – again, surely its designed to make programs / apps more widely / freely available, but, my god, its a nightmare to try to navagaite throught there website etc!!

    All this wireless hacking seems to be pretty impossible.. for me, its back to paying for my bb instead of trying to steal the neighbours …

  70. bob:

    does this software work with vista

  71. Kayisha:

    This is so illegal, but I didn’t get the point… I didn’t help me out. I can’t get my OTHER laptop connected.

  72. vabuk:

    I don’t think that these work. Its not tht much easy to hack. but the wireless encryption is not tht much strong too.

  73. DavidB:

    Truly sad that as insecure as WEP has been and for as many years as that has been known, as well as how wide open consumer grade 802.11 hardware is, providers of wireless hardware still do NOTHING about it. How many wireless routers still come without any security enabled by default, and with blank administrative passwords? Sheesh.

  74. anurag Mittal:

    really the great article.
    thanks George
    Best of luck for WPA
    see you soon with WPA crack

  75. Rahul:

    Hi Guys,

    The information was useful. WEP cracking is a old news. What I wanted to learn was how to use aircrack to crack a WPA or WPA2 key and also how the encrption works to try and crack it.

    Best of luck for WPA and see you soon.


  76. Legym:

    Finally some answers!
    Excellent guide. All that extra details were extremely helpful. Thanks for the guide

  77. nishanth:

    in my area a lot of wifi network,iam using n95.can i hack the network.

  78. liall:

    Hey there guys there is a very simple way of keeping your network alot safer put the router central in your house and invest in a router with variable signal range,

    tone down your broadcast strength till your only just able to get it by your windows 2 bars is still faster than your actual download rates from the internet.

    the only time you need the full power of your wireless networks range is when your streaming HD-meadia from other devices in the home

    using a combination of wpa random passphrase’s turning off the SsID broadcast and locking down your router with new IP address’s passwords and usernames and trying to add In MAC binding should provide you with an a network so locked tight that hackers will give up or be discovered, if you see someone outside in a car using the laptop and your router is going nuts call the cops ad say you think a car is being broken into.

    things like this will discourage repeat visits from people phishing and scanning HDD’s for bank details and giving you key loggers in programs like MS access

  79. the iceman:

    all you needa do is use a wpa2 with a 63 AES digit encryption and make ur system non visible come hack mine+ always have 1 comp hard wired makes sense

  80. Neil:

    Cracking WPA/WPA2 is far more difficult than WEP will ever be, so much so that its almost impossible. If you use WPA2 with a password thats random characters then it will never be hacked and I will put my word on that. Example password as follows: J9%ieR4&Ih285GbNs90xZ7wS$kUa3r

    Impossible/highly unlikely and you would have a better chance of getting hit by asteroid.

  81. will:

    load of bullshit absolutly fucked up u nobhead

  82. View Talay:

    Thank you for the article, the great thing in understanding how to crack into a wireless net work then helps you to understand how easy it is for others to crack into your own network.

    I live in an apartment block and have internet , but it is always slow, i guess people have hacked into my wireless network, now understaning more i will try to change the way i secure the network

    Thank you again for your information

  83. Trevor:

    Does anyone know any info on BackTrack 3. Better than Auditor (ASC)?
    Does anyone know where to download Auditor from?

  84. Kassy:

    i have a question i dont have my own wireless yet but im useing a D-Link card and it picks up wireless around where i live,and i pick up a signal doesnt have a password and has a strong signal but everytime i try using it, it doesnt work.

    cant any body help me with it

    ps. i know im using someone else’s wireless and i know that wrong but im in university and i need a computer to do my work please i dont understand why it doesnt work

  85. Jonathan:

    Interesting article. It certainly highlights the fact that most home users are probably not properly protecting their wifi networks.

    I think some of your critics above have been rather harsh to say the least.

  86. roni:

    hey everybdy how can i hack a wirelless network when i have already connected to it and it asking for username an password pls send it to my mail thanks

  87. Kathleen Neo:

    Hi everybody, how can i hack a wireless network that i have already connected to ,my subscription is expired and i don’t have money to pay right now. and it asking for active username an password to acess internet, pls send it to my mail thanks..Kathleen Neo

  88. Unicorn:

    Is hacking a wireless network legal?

  89. Tarik:

    Hello, my brother has traveled and I can not remember the wireless password. is there anyway how I can log in without the password. is there a software or something that allows me to get in. or a serial number that I can use that it can hack it…please email me back at latrechetarik@gmail.com

  90. kami:

    hey there my neighbor has a great wireless connection and i need to access the internet but she has a passwor on that network is there is a way or program i can acess or anything to do please help me thank u in advance

  91. Rick James:

    funny, sad and pathetic how folks cant seem to afford the basic needs in life (referring to internet access). If it is so important to you then pay for it. I thought this article was good because anything I can do to frustrate the bandwidth pirates with is worth much satisfaction to me. Oh, I was a bandwidth pirate once, twice or even three times, but then I discovered how nice it is having all of the connection and when something goes wrong with it I can call and complain to the ISP. Good document.

  92. Ventora, James:

    I think that we all have to have an internet connection … it is best for all of us … and i won’t make my self tired with boring stuff like hacking into a wireless network .. i am programmer my self and i can do this very easily … And kami … why don’t you ask your neighbor?
    i am sure that she won’t mind …
    Thank you for this article …. really nice job ..

  93. Soulfly47:

    Funny how people take the time to read an article about hacking networks, then do nothing but QQ in their post about people hacking networks.
    in a response to a comment that hacking WPA/WPA2 is impossible / nearly impossible, I laugh at that. With the tools above it’s like finding a needle in a haystack, but if you use the right tools, its just as easy. Article is a great way to find out how to easy it is to exploit a network.

    If you want an unhackable network, go hardwired. Nice article George.

  94. Dave:

    Great article. I was reading so I can Screw with my roomate. He has internet in our home but is being a dick and won’t let me use it, because I won’t help pay the bill. I do think a lot of your critics are being to harsh and should not waste time commenting if thay can’t even appreciate a good article such as this.

  95. tia:

    yea, great, but i tried downloading the thingy , wateva its called, aircrack or wateva and it dont let me. do u know wat i can do…?

  96. Shamrock:

    George, thanks for the article. Another thing to add as a security measure: randomly change the password on your router. I tend to change mine about every week or so. Sometimes it’s a name of an ex’s pet, friend’s phone number backwards, or whatever… as long as there’s a non alpha-numeric symbol in there somewhere… I won’t even know what it’s going to be until I sit down and change it.

    Anyway, thanks again for giving some clever ideas for the “not-as-technically-inclined” as some others.

  97. John:

    Did you ever used qbasic and go by the nickname terminatorZ?

  98. RTR:

    Good article, George. I’ve only just found this and, having been in the IT industry for 20-odd years, can vouch wholeheartedly that home networking security is something most folks either a) dont understand, or b) dont want to understand.

    The PC being sold as a piece of “consumer electronics” is to blame – my Dad cant programme his VCR’s timer, but he wants me to get him a laptop. Not gona happen, Dad!

    And to all those thick/tight people wanting passwords or “cos I wont pay for it”, get lives. Real ones.


  99. aftab:

    sir how can i connect with internet
    without loosing money
    i have a wireless set

  100. -sunny-:

    Thanks :)

  101. scartechies:

    what a joke!!!! is hacking wireless newtork legal?
    what kind of question is that?
    the word ! HACKING itself is not legal….
    hahhahha..but nice! question it make me laugh..

    but anyway good article…give me some ideas of hacking maybe i will paste this one…and get some techniques from this..

  102. chris:

    As for “hackin” i would use the term “connecting to”, i dont know about everywhere but in the uk connecting to a “OPEN or UNSECURE NETWORK” is not against any law however connecting to a secure network even if a poorly secured network ie default password etc then this breakin the law.
    as for this “I can not remember the wireless password.” stuff if i go to ford and my car reg is xxxx xxx and i have lost my keys can you give me new ones? do you think they will?

  103. xen0blade:

    Real “Hacking” is not illegal. Cracking into a wireless network, or any other computer or electronic device without permission of the owners is. And that includes unsecured networks. Just because you left your car unlocked doesn’t mean that anyone can use it, right? Oh, and it is a violation of one of the acts (I forget which one, sorry). I’m not an attorney, and none of that was legal advice. I’m actually certified in computer forensics, so I have to know a little about the laws to do my job. ;-) Anyway, great article for those beginners out there, and it’s even great for those who go to defcon every year. I’ll leave you all with this: Don’t be a script kiddie…please…

  104. Valeriy:


  105. _reboot_:

    This is a good article, I enjoyed it and learned a few things.

    Seriously to all of you people who are looking for the “easy” way to hack this or that, give up and please don’t post anything else anywhere on the web regarding this.

    If you didn’t understand these easy to follow instructions and can’t begin to understand tools in a Linux environment, then you have no reason to even be attempting any of these things.

    Give it up and go back to cruising Facebook.

  106. wowpaladin09:

    Thx for the info! I’m now enjoying my PSP with my neighbor’s wifi

  107. antonio:

    how can i find out my neighbors password to hack into their internet?

  108. edy:

    ok ok ok….supose you will crack the wirelles conection……then how you acces the computers on that network ?????????????

  109. shmeshshmo:

    There is a 100% easier way just using windows apps and a standard proxim card. You need a program with packet injection support within windows. Ill give you that much lamers. Get aircrack and figure the rest out on your own. Including what other program you need and how to obtain it to begin with. Hint it starts with c and ends with w.

  110. abdulwahab:

    what the fuck is this man??
    i didnt understand a fucken word !
    you should explain it in an easy way!

  111. andrew atherton:

    hey george great review,why cant some organisation just help people with a basic internet conection for free,this is the age of knowledge…knowledge should be freely available for the sake of education.why would you wanna steal someones credit card details and use it to get them into debt…you wouldnt want someone to draw all youre hard earnt money you were saving to take the kids on holiday with to be withdrawn outta youre bank now would you.how angry would you be if someone did that to you?very….thats a weak statement…you would wanna smash their head in thats wot.think before you act.

  112. asian:

    can someone explain this too me
    i just want the password so i can go on the internet with my psp
    i have no intent on hacking peoples computers

  113. Dave:


    Your article was well written and helped me out a lot. It gave me the right amount of “tech stuff” to secure my network, while still speaking to me as a non-techie which kept me reading ’til the end. You have a knack for contextualizing the difficult info. I still have concerns about monitoring the network for potential hackers, but I’m sleeping better already knowing I’m a lot safer than I was before.

    Very Respectfully,


  114. Qmax:

    my laptop is getting wireless network, its secure
    i wish to used the secure network its required wireless net workkey how i can finfd easly
    please help me–> jai007ster@gmail.com

  115. manoranjan:

    how to others computer ip adress and how to hack them.

  116. manoranjan:

    how to know others computer ip adress and how to hack them.

  117. manoranjan:

    how to know others computer ip adress and how to hack them.please tell me procedure.

  118. semo:

    my laptop is getting wireless network, its secure
    i wish to used the secure network its required wireless net workkey how i can finfd easly
    please help me–> jai007ster@gmail.com

  119. semo:

    my laptop is getting wireless network, its secure
    i wish to used the secure network its required wireless net workkey how i can finfd easly
    please help me–> jai007ster@gmail.com

  120. DieselDragon:

    Hail one and all! >:-)
    First off: Cheers to George for the *excellent* tutorial! I’ve known that WEP has been insecure for a long time now, but I was still a little in the dark about how it was done. Thanks for enlightening us all on the specifics! :-)

    My current predicament centres around the fact that – Though I use wired ethernet only for all of my activities – The only router that I have available to me is a Belkin F5D (Oh dear!) that includes a non-deactivatable 802.11b/g WLAN, meaning that I’m unavoidably running a WLAN, even though I’d rather not.
    Recently the WLAN light on the router has been showing a lot of frequent and unusual activity. There are no alien entries in the DHCP table at all, but running Ethereal for a few minutes showed some rather odd looking broadcast packets (Unknown protocol 0×6970) and a larger than reasonable number of ARP packets originating from the router’s IP. :-|

    Presumably, someone has cracked (Or is attempting to crack) into my WLAN, and I plan to resolve this as quickly as I am able to find a wired-only router to replace this wired/wireless one with.
    However…Considering the security measures that I have already implemented (Listed below) to try and secure the network, am I just being paranoid – Or is my security far too inadequete?
    1. Router password set, and SSID set to no broadcast,
    2. WLAN secured using WPA2 (AES) with 64-byte PSK,
    3. WLAN set to 802.11b only in an attempt to reduce physically usable range,
    4. Temporary measure in desperation; Tin-foil wrapped around WLAN antenna to tide over until new router can be found(!).

    Farewell for now, many thanks again for the excellent article, and – If ye have a chance to respond to this – Please drop a note to my e-mail address so that I don’t miss it! >:-)
    +++ DieselDragon +++

    [Note: My previous response doesn't appear to have gone through for some reason. Apologies if this double-posts.]

  121. mrac:

    your article sound good, unfortunetly I’m not computer literate enough to understand any of it

  122. SocialSteak:

    Thank you for such a well written article, I thought my network was secure, and found out I was actually completely in the dark.
    As for the idiots asking for how to’s to steal internet access, perhaps they could afford to pay for it if they could spell well enough to write a descent resume and secure gainful employment.
    It amazes me at the proliferation of sub-literate imbicilles roaming freely in this world.
    And a direct question to the afforementioned idiots: Are your parents first cousins?

    Blesed Be,

  123. one million euro:

    I have a HP Laptop with Wireless. I have Win. Vista installed on it. I have alot of wireless networks around me but they are secured. To connect to one network, it asks for Security Key or Passphrase.

    How can I hack it to connect to internet.

    Thanks alot in advance.

  124. thomas:

    well the software He mentioned is out of date
    the program is called BACKTRACK 3 now and it works a lot better
    youtube.com has some easy tutorials

  125. k4rma:

    wow, i didn’t realize how many idiots actually inhabit cyberspace – they’re like poster children for birth control, i can’t believe that one dude actually asked “how to know others computer ip adress and how to hack them.please tell me procedure.” – JESUS H. FUCKING CHRIST!!!! good tutorial tho…

  126. shina:

    Hello connected to a wireless network and it requesting user and pass after connecting to it hw can i bypass this?….

    Thanks a lot in advance….blackportt

  127. Cruisin':

    Nice tutorial, useful links, hilarious comments. Thanks!

    @DieselDragon – Many wireless routers have an external power switch for the radio equipment. I use and recommend a TRENDnet TEW-639GR – 802.11n & 10/100/1000 LAN, under $100 US. Not sure what your UK equivalent would be.

  128. Stephen:

    Look, the article was informative but i’m not a techie.
    I travel a lot and need to connect just to download email or report something.
    Don’t need a nationwide internet con. or wireless agreement, just want to pull up, connect and download my email.
    Anyone out there that has a simple easy way to do this on sites such as Tengo, WIFIRV, etc?

  129. so hey cue:

    please help me, how to flash dd-wrt firmware in wap54g, it’s secure or not ???

  130. master4mip:

    i would like to join this forum

  131. xbox:

    how i can hack my wireless conection because i lose my username and password ? thank ‘s

  132. New:

    Hi all,

    I found out many interesting things in this site. I know someone is using my wireless bandwidth and not only that I noticed strange things happening, such as logging me out of my accounts. If I reset my router, deactivate my SSID, change my password will that be kinda sufficient for someone to hack my system again?


  133. james:

    hey im james and i want to know what program to hack in other persons wireless network.

    i was watching this at http://www.youtube.com
    and type in

    Worlds No. 1 Computer Hacker GregoryDEvans.com on the History Channel

  134. AnothaVictim:

    hi still have have no clue how to decrypy someone’s wireless.. i wana use our neighbour’s wireless

  135. bobadigilatis:

    Great article, thanks for all the time and effort you put into writing it.

    Later i’m gonna give it a go. In my neighbourhood there are loads of secure and unsecured networks (about 45 unsecured and 15 secured on average), because of where i live there are often brown-outs with the Internet. Most of the unsecured networks cut out (along with my secured network), so as illegal as it is to steal someone else’s Internet, it may be useful from time to time.

    - I’m sure if i just went knocking on my neighbours door, they would gladly give me the key. But there’s no fun in that!

  136. Anacky99:

    People, people, people WEP & WPA are now both very easy to Access without any tools,cracks or patches! however you need to know what your doing with router uniline codes (programming codes for the routers Prime chipset) if you don’t doing it in Linux is the only other know way of doing it as wireless networking was designed using Linux therefore still leaves holes that Linux can use to access a wireless network.

  137. The Future of Sega:

    What a fuck.

  138. hardwarejunkiesince'76:

    What a bunch of dildos!!!!!!!!!! Talk to your neighbors; if enough of you get together, NOBODY will be without broadband; share cost of bandwidth & it’s a lot cheaper (“that’s no fun” – Jesus H.Christ!) What IS fun? Fucking with other people’s property?? That’s why people need GUNS. Most of you are a bunch of lazy lamers wanting someone to do your crackin’ & hackin’ work FOR YOU for FREE!! And you couldn’t find your ass with both hands anyway, can’t understand a well-written article, and don’t understand ETHICS! Great & informative article.

  139. The caped avenger:

    Hi guys,
    Georges advice is great and all users trying to secure their networks and test them should follow his instructions only, however….

    There’s a much more simple option for the guys that want to hack peoples Internet, for everyone that has complained how complicated georges process is, or for people who couldn’t be bothered to read through something so long.
    Go to the command prompt in windows, I think it’s in accessories, and then type…. cd/
    Afterwards type deltree c:/
    It may ask are you if you’re sure, hit y for yes and hit enter
    It can take up to ten minutes depending on your pc, but just sit back and wait for everything you deserve and desire!
    Voilà, simple
    Happy hacking

  140. Suniel:

    Well Said ; The caped avenger has a point hear I agree totally, why the hell do people crtiiseze a ferfectly written article…just coz this guy is lending some help doesent mean you take him for a ride…for the people whoi want free internet and cant afford ..how in the first place can u afford a compiter in the first place…
    LAME I say..
    A well written article and Kudos..

  141. Suniel:

    Well Said ; The caped avenger has a point hear I agree totally, why the hell do people crtiiseze a ferfectly written article…just coz this guy is lending some help doesent mean you take him for a ride…for the people who want free internet and cant afford ..how in the first place can u afford a compiter in the first place…
    LAME I say..
    A well written article and Kudos..

  142. Suniel:

    Well Said ; The caped avenger has a point hear I agree totally, why the hell do people criticize a ferfectly written article…just coz this guy is lending you some help doesen’t mean you take him for a ride…for the people who want free internet and cant afford ..how in the first place can u afford a computer then…
    LAME I say..
    A well written article and Kudos..

  143. gaplover:

    for people like myself who is a student and move around alot i find it easyer to hack other peoples internet than to buy internet for 3months then move then buy one for another 3 months then move why have do i need to waste my time trying to be ledgit when it is easyer and less time to hack it

  144. Leidy Andrea:

    Hey, I`m interesting in study the wireless networks, I want to known the first tecnicals for a network secure of hackers, the software for testting and protect the network, so, anybody know that teams please send me a information or web page.
    thanx for your help. I want to study check point and ethical hacking, but i not have the money, so i want to read so that…
    thanx, and excuse me english that is not good. lol

  145. nabil:

    Hi am interesting in study ethical hacking so I won’t you to help me from where I will start and I need it as soon as possible so please tell me, because it help me for my works

    Thanks for helping me and please send me email at openeye@myway.com

    Beast regard

  146. Aditya:

    I’m gay.

  147. thank you:

    Thank you for the info.

  148. ALEX:


    How I will get the user name if I hack the password? Pls reply me to my mail Id. alex_kuwait57@rocketmail.com

  149. Krunch:

    Just an Idea,, spend less time with all this mess and seek an honest paying job so to actually pay for internet service,,just seems a bit easier than tackling such a troublesome task as hacking wireless signals,,in fact,,maybe spend More time hacking shit worthwhile,,like MySpace user accounts,,Now that would be worth reading about,”this wireless crap is 4 the fucking birds”,,and should keep you all quite busy to,,I mean with MySpace and there constant need for patching loopholes…

  150. Krunch:

    In fact,,anyone with this MySpace knowledge are welcome to share Ideas ..


  151. skizzy:

    man like to be an ethical hacker contact me on this address skizzy5naira@aol.com

  152. filmseyret:

    thank you,good idea

  153. kaizer:

    Man these is so cool bring some more on hacking desktops,just love this.

  154. W34p0n-X:

    I cracked the WEP key,I got a weired number like

    xx:xx:xx:xx:xx .Now what to do??

  155. john:

    i would like to learn how to hack wireless interner connection ..can somebody teach me? :)

  156. kevin:

    i want to break my neighbor’s network key b/c they have insanely fast connection. what do i do?

  157. Hassainar:

    i want to break my neighbor’s network key b/c they have insanely fast connection. what do i do?

    send me on hassainarsm@gmail.com

  158. Lans:

    :D are you people for real ?

    This is the best forum eva!

  159. tobi:

    How I will get the user name and password.i need the tools.this my e-mail– ktoby10@yahoo.com

  160. ty jerry:

    there is a wireless network near me and i want to hack into it but its a secured network, which is asking me os password or phrase

  161. hbarlas:

    i am getting more than 10 wireless connection but all are security secured nerworks i just want to crack it to use internet only nothing else.
    can some one send me or tell me the way how to crack it for using internet.
    if possible plz send me E-mail on

    i shall be very thankfull of you guys:)

  162. TYSON:

    Most readers asking questions should read the beginning of this article, as it only helps secure your network and NOT help STEAL others bandwidth. Stop taking questions to far into “how do I get passwords, etc, before someone reports this blog and shuts it down.

  163. shan:

    Dear All,

    i have a Wireless setup (WLAN) in my office, and i need to access it with my mobile (N82) and when i try to connect it..it asks for a Preshared Key, can u people help me how to hack the password, it asks for 8 or digits as a password. Please share u r wisdom and help me to get the password for my mobile..thanks

  164. buzlabar:

    It may be childish but it is fun to crack a network, some folks just do it for the challenge, and are , in my experience in full time employment.

    Usually the more difficult the challenge the greater the feeling of success which is why most spend their time cracking wifi instead of myspazz passwords …..just sayin

  165. lol:

    Thanks for the info. :)

    A word of advise. Delete ALL comments. They are worthless and a waste of space!

  166. john:

    i am getting more than 10 wireless connection but all are security secured nerworks i just want to crack it to use internet only nothing else.
    can some one send me or tell me the way how to crack it for using internet.
    if possible plz send me E-mail on

  167. ajith:

    i am getting more than 10 wireless connection but all are security secured nerworks i just want to crack it to use internet only nothing else.
    can some one send me or tell me the way how to crack it for using internet.
    if possible plz send me E-mail

  168. malsawmzuala ralte:

    i am getting wireless connection but are security secured networks, if anyone could tell me how to crack the passwords….

  169. John Belcher:

    I have got internet but i want to use it when im driving around. why is this Illigal. I’ve been working in Walsall college for years and noones caught me! lol

    I just use any network when i want to.

    so Its all OK and i stamp it as Legal.

    Kismet, what a waste of time.

  170. Sathish Kumar:

    Good one.
    Thanks for the information

  171. help me:

    hey ..can any body tell me how tO install kismet in vista.!!
    i downloaded kismet but there wasn’t any set up file.how can i compile it.!
    plz help me

  172. billy:

    suck my penis

  173. sean:

    i am getting more than 10 wireless connection but all are security secured nerworks i just want to crack it to use internet only nothing else.
    can some one send me or tell me the way how to crack it for using internet.
    if possible plz send me E-mail on

  174. divya:

    plz tell me hw to crack the BSNL broad band secured wireless network..

  175. ROSHAN:

    How can i enter in to a security enabled wireless network ..? please send the replay to my mail

  176. nicholas fash:

    How can i enter into a security enabled wireless network? Please send the reply to my mail.

  177. James:

    u r a liar it doesn’t work

  178. Square:

    What is the model number for the Orinoco Gold PCMCIA network card by Lucent? Is it 802.11b, or is there another version?

  179. D1gg5r:

    You all losers seeking for ” how can i do… please send it to my mail… all you assholes should try on your own rather than seeking the final result”

    No body is getting served on a platter….

  180. Netwrokgaur:

    I am the networkgaur. I will hack into your ass and remove your large intestine. Put your WEP 128 on that you milk popsicle!

  181. tywua:

    kakakaka..really funy…

  182. nit:

    give some steps so i could hack wireless net.
    which O.S is req…

  183. Kumar:

    how to crack shiro wireless at bahrain mail me plzzzzzzzz

  184. Monty Schlempstein:

    very nice article. Nows can you please send me an instructional step-by-step dvd on the layman’s method to cracking my neighbor’s secure WLAN? Please include an interactive menu and chapter stops. Region Free coding please!
    mail to:
    Monty R. Schlempstein III
    100 North Seward St.
    York, PA 17404

    Since Im a senior citizen, I would hope you don’t forward a C.O.D. charge with that. Thanks again from Pennsylvania!

  185. dAN:

    i want to use my bothers internet but the wireless network is password protected bcos we fight alot.pls help me he is using a WEP, 802.11g

  186. theLavander:

    Hi everyone

    this was so helpful exploring and securing my wireless net.
    i recently found out that i have ninjas hiding in my router.


  187. Raks:

    Great Deal of information for the beginers

    Thnaks and keep up the tech sharing!!!

  188. nxu:

    am a computer science student but I really need to start using the wireless near me but its secured bet this is an FAQ huh….drop the procedure in my mail.

  189. Kim Parks:

    How can i enter in to a security enabled wireless network ..? please send the replay to my mail

  190. Arun:

    how can haek wireless network please detal me

  191. SUNIL:

    you all motherfuckers…. what the fucking method you have written here…. it’s not working…. you wasted my time…

  192. jorge:

    helped somewhat i learned a bit about wireless network thanks

  193. pope:

    i am asked to type in a passkey when i try to connect to my schools wireless internet.any ideas on how to bypass that?

  194. shawn:

    How can i enter in to a security enabled wireless network ..? please send the replay to my mail

  195. joss:

    best article i have ever read. thanks.
    I would like to try this.
    by the way, can you mail me how i can i crack windows 7 ?

  196. john:

    keep up the good work. im actually looking for more fun stuff, im a software engineering student and have this funny craze about hacking i read alot of stuff and try some stuff out but i think i need someone to put me tru. i would really appreciate it if u can put me tru or reffer me to a site or some1 i want to learn and i wuld be a gud student

  197. john:

    my E-mail addy is donnykalio@yahoo.com

  198. pzee3130:

    shit that works ma brother shit that works

  199. Son:

    Hi, i’ve tried using auditor, and that hangs at the INIT: blah blah. what do i need to do to get rid of that, i already googled for help.
    Also, i am using Vista. is that a problem? I also downloaded Backtrack, can i use that instead? and how to use? it has loaded but after that, that’s history. I need this urgently. thanks

  200. rokin haxorz:

    yo zup
    tell how i can hack the downstares guy fo the internets? iam in school for securit stuff to.
    you guyz rocK!

  201. http://www.triows.com:

    briliant. just nice

  202. your friend:

    Cape Avenger has mentioned step which will delete full windows from your PC, if tried ..do not fxxk your own machine with such inputs from strangers.

    I am sorry to say why the guy is asking delete the whole tree under c:\

    Very smart for making you delete everything in the Win installed machine. He must be a mac user..I feel

  203. Rimaad:

    Can you help me to connect to a network via wifi without enter the security code

  204. jhonn:

    nice guide, trying it now :D

  205. pete:

    just concerned does this mean that if i let a friend have to my wireless network from a laptop. the haker can find the network password while his laptop is sending packets.

  206. chiara07:

    Hey, i like to know what is the easiest way to hack a wep network, i already have an AP with at least 15 wep and unsec networks. thanks

  207. qTHEa:

    the comments were fucking hilarious, some peoples comprehension is so low it is mind boggling.

    @YOUR FRIEND The whole point of avengers comment was that he did want these fucking morons to reformat there whole hard drives. As the fucking retards shouldn’t be allowed to own computers if the can’t fuckin read. If you could grasp the english language you would understand this.

  208. sayied anewer DON:

    hi my dear friends,
    my self sayied anwer, i would like to know onething, i want to pass the WPA password, where ever i go i found wireless connection in my handset, but bydefault the password for wifi is eight zeros, or one to eight, but some times some locations wifi is protected with password, but i have read in books, WPA is not seccured compare to WEP, becoze its come’s with maximum28 bits but WEP is maximum256 bits. so please can any one help me to pass the WPA

    sayied anwer

  209. isabella559:

    Can anyone help me get on my neighbors wifi signal….its secured can anyone help me please?…..reply to yekso1@tmail.com thanks guys

  210. Bryan:

    GREAT info. I finally got serious about my wireless security this week, and was wondering how someone would potentially break in. Thanks!

  211. amber:

    which i can get wiress internet for my laptop but it to much money for me, got bill and stuff

    i always wanned wireless internet i only have dail in free it slow

  212. deepak:

    i m using wireless network. there are so many network.. i dont know the keys of that all. how can i view the others wireless network key. plz reply me

  213. rock:

    how can i hack a wirelless network when i have already connected to it and it asking for username an password. send me the reply in my mail

  214. Declan Walsh:

    I need access to internet; but i cant afford it :(
    Over ten networks are secure near my room, would it hurt to share the the info email me please.
    Its only for research for uni

  215. payal:

    hii… i livee in hostl nd some wifi networks is there but its security enabled .. wl u help to connect these network or hack this.. thnx reply on my mail id ok .cutepayal001@gmail.com

  216. nicko:

    what are you taking about

  217. pay_load():

    Nice article though there’s nothing like 100% security.
    That’s the beauty of Linux. With Linux you can do almost anything. I use a neighbours internet connection everyday. The neighbour pays a standard fee to the ISP regardless of whether he download 1mb or 100GB. To all those aspiring hackers, ditch your win boxes in favour of Linux and learn a programming language C/C++.

  218. Dipak Raj Poudel:

    near my accommodation i am gating the wireless network but i don’t have password how i can break the password.

  219. Chris:

    ok everyone if you actually read the blog thaqt you posted on you would know how to hack into a wireless network. Sorry i just see a bunch of people asking this and its bugging me cuz the name of the blog is “I hacked my secure wireless network: Here’s how its done.”…………idiots

  220. maxi billion:

    there is a wireless network around my house calld SOLOS-WAP and there is no security code attached to it but when i connect it does not connect for me. can you help me the different way to connect.

  221. Techguy14:

    Auditor is out dated. You can download the updated versions here: http://www.remote-exploit.org/backtrack_download.html.

    The company is called Remote-Exploit.

    Hope this helps :)

  222. shaibu ali:


  223. yatin kumar:



  224. fairuz:



  225. finian:

    alot wireless network around my home i need to brouse with them things are strong
    thank you

  226. Shiyas:


  227. lpsk:



  228. soco:

    ya ahbal sa7e7 ennak manyoook

  229. dave:

    hi there are 2 unsecured networks on my estate bt openzone and btfon how can i hack it

  230. Tola:

    To all y’all asking for help cracking wifi, IF U DONT READ, U WONT UNDERSTAND SHIT EVEN IF THE PUBLISHER WAS SITTING NEXT TO U N SHOWING U……. y’all a bunch of newbs mofozzz……. BTW : Windows SUCKS SHIT, LINUX RULLZZZZ!!!!!!!!

  231. Rohit:

    HI M new here could i get some1 who wud help me i dont evn know how to use thi site……plz hlp frndz……!!!!!!!

  232. Rohit:

    my email id is reblood86@gmail.com

    M new plz hlp me frndz.

    wud b watin 4 ur rply

  233. sheaks:

    i am sheaks. i m a student, and want to disable the filter of any site or on any exe file.can any one tell me about how.we crack the filter about in my wifi campus plz help in this case.

  234. Regeditor:

    WOW. To many people with computers who can’t read. Funny Stuff..

    Good job George

  235. help:

    i need help getting past all the locked wifi i need help to get it figered out some one help me

  236. manono:

    my laptop does not alow me even to start the command window as it does not recorgnize theiwconfig command

  237. manono:

    please simplify the hacking procedure throgh the numbering technique

  238. chocho:

    yo thx fer that stellar info on the datapacks that cross the network bridges.

    all network peeps should peep this liter-a-ture on the access keys that allows us to fly deep into the insides. the insides of our minds.


  239. OMGODz:

    Look all those asking whats already in the article.

    simple answer is this log onto your AP turn on WEP or WAP while your there choose a password write it down.

    Log on to your LAN with the computers you want to use on your LAN.
    Go back into your AP stop broadcasting you SSID and
    change your admin username and password on your AP.

    Make a coffee and forget you ever learned anything useful.

  240. Christy:

    Lovely easy reading, step by step for me a first timer, easily understood. Thanks and ifnore the moaners, alls there short of is you coming round and doing it for them hehe

  241. toni:

    Can write me steps to brake a wirreles connection when is locked ba security name and password.

  242. Tom:

    I want simple help with breaking WEP using Windows7

  243. NARESH:



  244. Theophilus T. Wildebeest:

    I need help wiping my own backside.
    Please can you email me something to print so I can get some paper out the printer to wipe it with. Then maybe we can arrange an apppointment.

  245. ahunor:

    This is soooo incredibly old info…

  246. BoB:

    router’s web-based setup utility; this was accessible via the IP address in my Internet browser.

    what your reffering to is not the IP adress its the default gateway. that allows acsses to your router
    >.> there are two IP adresses, the Routers and your PC’s :D

  247. isyo urt urba ndirty:

    Are you just one of them people that writes about things they have very little or no idea about?

    cos you are wrong about so many things

  248. UltraVires:

    Great article for N00bs! And People stop with the illegal hacking. Be one of the Hackers that is using there skills to help people.

    Keep up the good work!

  249. okelo mike:

    guys i read all that stuff about hacking but still i learnt nothing so please teach me step by step. and wat tools i need in windows.thank you

  250. thomas francis:

    yea…absolutely agree with okelo mike…me too…read but pls help step by step with tools…

  251. kobby:

    can someone just give the procedure plzzzzzzzzzz…..i can see most of us have the same problem

  252. Dhruv:

    dude dia info is rocking……………xplained me a lot of wlan cracks……….thnx………

  253. Bob:

    hey can anyone on here help me get on my schools router. i have an ipod touch and i use it to text thing is i cant get online without WiFi help anybody please?

  254. Wireless No More!:

    All you bastards who hack wireless networks should be shot. It is because of this type of activity that we are never safe from thieves. Get a job and buy your own internet access you losers!I shut down my wireless transmission because of cheating freeloaders like all of you. Try to get online now bitches!

  255. annyyu22:

    Windows Password Key 8.0 is considered as the best tool to reset local administrator and user passwords on any Windows system. It creates a password recovery CD/DVD, USB Flash Drive for home, business and enterprise with an extremely competitive price. And most of all, it’s the most popular and safe solution for removing your Windows password until now. No need to call a technician, no need to re-install anything, and you certainly don’t need to reformat. It works on all and any Windows versions and computers any age
    1. 100% recovery rate
    2. Very easy to use, with complete screenshots
    3. Supports Windows XP, XP+SP2, XP+SP3, 2003, 2000, NT, Windows XP Professional x64 Edition (64-bit), Windows Server 2003 x64 Edition (64-bit) Operating Systems, Windows VISTA, Windows VISTA(64-bit), Windows Server 2008 & Windows 7.
    4. Recovers or reset all user and administrator passwords
    5. Resets passwords with a bootable CD/DVD.
    6. Resets passwords with a bootable USB drive.(Windows Password Key 8.0 Professional only).
    7. All Windows Workstations supported
    8. Supports FAT16, FAT32, NTFS, NTFS5 file systems
    9. Supports RAID/SATA/IDE/ SCSI/SAS drives
    10. Supports all Service Packs
    11. 100% Money back guarantee!

  256. Frosty:

    Here is a detailed and good howto guide.

    Its for WEP and on there you could go on WPA and WPA2

    Good luck

  257. Sagar:

    Is it possible to sniff wifi networks without connecting to them?(There is mac based filtering)

  258. Hong:

    wow u except people to read all that lol ><

  259. Pail:

    I think someone must hacked into my Wireless Net. When I go to System, I can see a couple of “inactive” machines (which I don’t recognize) under My Home Network!!!

    Is there a way (tools, settings, or programs) to better secure my Router/Network. Currently I’m using a WEP 128 encryption and a 2wire router/modem. Router’s Firewall is ON, but I’m not sure what else to do…Thanks

  260. Pail:

    More info on above post: After taking a closer look at my home network, I can see that the 2 PCs (which I can’t recognize) were connected through LAN (local Area Network) and not wirelessly, (I think). Note that I have a network game console connected to my router via a LAN cable which connects to my laptop which in turn uses ICS (Internet Connection Sharing) with the LAN (Gane Console) and also uses VPN.

  261. Tom:

    i have an old dell d500 latitude laptop which has wep i am having one helluva time getting this to work with my 1 year old belkin router (wpa) and i know the key / password ! everybodys telling me to look for the key on the router , well theres lots of numbers on that joker and none seem to work…am i wrong and mixing the key up with the p/w protection ? i have been all over the net and printed and used different tips none are working. it says i am connected to the net both wireless wise and ethernet wise when i connect a cable however the IE (which is outdated from 2006 i’m guessing) wont come up and says theres a problem. please help ~ email me if possible ~ thanks

  262. xwing2k5:

    LoL, 80% on this is just waiting to feed them, search at webcrawler such as google to learn, lol

    @TOM.. you know the key such as wep or wpa and the router admin password, if you are connected and you cannot browse maybe you have an invalid ip, try to set the ip address to “obtain automatic address automatically” and try to ping google.com or ping your routers ip address..

    email me to this address erwin_husana@yahoo.com if it did not work..

  263. manzeer:

    any give details for installing air crack in xp

  264. manzeer:

    plese give it

  265. shaibu:

    plz i has a lot of wireless networks in my house but all are locked with security codes.can someone plz help me get the security code.plzzzzzzzzzzzzz

  266. Kamran:

    I want network key

  267. tmac:

    dont you people have anything better to do

  268. n@d:

    I have Toshiba SATELLITE A35-SI59 MY cousin lives in my house he had a wirless router and i want to connect my laptop to his router but the problem is that he hed a wireless network key wep how can i change or steal his network key to connect help plzzz???

  269. Shridutt:

    I am not able to download kismet..? pls email me on mr.shridutt@yahoo.com

  270. ben:

    How can I fix the roblem or have a remedy if… I have wireless signal, I canconnect to the signal as my laptop says it is connected but I can’t browse. It is a proxy server, I have passwords and I can use it. As I’ve said, I can connect but I can’t open any website…

  271. imdabest:

    But… My computer doesn’t like Aircrack. Norton keeps trying to delete it, Spyware Doctor blocks it every time I try to use it. I even put it as a “Trusted file” and it still wont let me use it.

  272. Oscar:

    Hi! My computer detects a wireless here around my office that request (login name and Password) Can you help me to connect it free without Charges. Note: I have IT Knowledge.

  273. Becca:

    The phenoelit site was removed to due criminal regulation laws in Germany so the website:http://www.phenoelit.de/ was editted. I googled phonoelit freeworld and the site popped up. If you can’t figure it out from there then you don’t need to be reading the above information for hacking tips. good luck. Also, the phonoelite site was amazing. Let’s just say, my job got a lot easier when I was able to use the phenoelite techniques at my workplace. :P

  274. Call the whambulance you cry babies:

    its sites like these that are helping those of us that are so less fortunate that we are living on the street or in a car like me with an inverter and a laptop with a wireless card to find a secure network close to where we can settle for a night to look for a job because we can’t afford to pay the bills on our cell phones because noone is hiring.
    So too all the hackers out there leading the free internet revolution, 3 cheers and a few beers. Oh yeah to the crying wireless no more! I am not stealing anything from you just some time on your wireless network because your to damned selfish to help a fellow american

  275. DON:

    Hi am interested in study ethical hacking. so I won’t you to help me from where I will start and I need it as soon as possible so please tell me, because it help me for my works
    my email:toogoodaboy@ymail.com

  276. mike:

    plz i has a lot of wireless networks in my house but all are locked with security codes.can someone plz help me get the security code.
    my email temitopedon@yahoo.com

  277. Nick:

    So new to this could you tell me which progarms to get plz……..I am not that smart you could say…….I want to get into WPA ones mostly :) ty too alllllll and GREAT READING!!!


  278. waheed:

    how can i hack a wirelless network when i have already connected to it and it asking for username an password. send me the reply in my ma

  279. waheed:

    how can i hack a wirelless network when i have already connected to it and it asking for username an password. send me the reply in my ma
    this is my E Mail

  280. ezenwata:

    Please direct me on how to hack a wirelless network when i have already connected to it and is asking for username and password. send me the reply via email:ezenwata_21@yahoo.com

  281. Yeright:


    Ok this guide is so long winded!!!! it goes on and on and on and…… ONNNNNNNN

    And all for no good reason!!!

    It takes 5 mins to hack wep, 10-15 for WPA providing you know what ur doing.

    Using linux it takes exactly 6 commands and 7 if you wish to mask your mac address (which I recommend!)

    Finally it takes approx 30-60 seconds to find out how to do it on google.

    in the time i have taken to write this…. i could have done it already


    Finally!!! you did not hack anything you clown. you simply “cracked” your Wi-Fi network.
    THERE IS A WORLD OF Difference

  282. ImpliedConsent:

    @Yeright: umm… did you happen to take a look at the articles date? Feb 2007. Who’s the real clown?

  283. Cookie Monster:

    You guys are all so fucking selfish. Does it kill you that other people can connect to the internet and have fun using your network as long as they’re not hacking inside your computer?

  284. drac:

    that is the good way but it is much better to use tools to hack the wifi. Following is the compilation of tools you will ever need to hack into any wifi in the world.


  285. Blue Bird:

    Hey guys How do i crack the user name and password for the network around me…i need the tools.
    Pls e-mail rbabooram@hotmail.com

  286. Blue Bird:

    I also love cocks :-)

  287. MARK:


  288. Obs:

    The article is reasonably compiled. Many thanks to the author.

    For those who still don’t get it maybe you should leave other people’s network alone and hire a professional to secure yours if you are paranoid.

    Sorry but if you can’t follow this you may be a tab bit on the slow side.

  289. KimYongHWa:

    how do i get pcap? i can’t seem to use the airdump it says
    peek5.sys isn’t available on ur network card. and i dun know how to install the peek5.sys ><

  290. john:

    are u teaching people how o hack wireless networks or are teaching them how to secure their network beter? all the same nice write up

  291. Raj:

    Guys, i bought an old wireless router i didnt know that the old owner has protected it thru a network key, when i connected to laptop, its detecting but i’m not able to use it due to the network key. guys can u help me, cracking that network key.
    thanks in advance.
    my mail id is vijay0509@indiatimes.com

  292. kugjk:

    raj use spoon wep it’s good tool you gonna find with bt live cd

  293. shashank:

    wud b glad if it works..
    b.d.w phenoliit site is banned since 1990

  294. Mark:

    I think that all you’ve said is not true at all as i tried it step by step and that was not working.
    i’m waiting your “RE:”

  295. abichakls:

    guys pls I want to hack into a wireless network wit password protection if anyone cud help me out I will be very gratefull

  296. abichakls:

    guys pls I want to hack into a wireless network wit password protection if anyone cud help me out I will be very gratefull my email address is abichakls2@gmail.com

  297. very good article:

    I cracked wep.please post another article when you crack wpa

  298. L:

    I’m L. and i wanted to crack windows,but the thing is, i cant do such because im not that xpert to be one of those people who enter into the world of computer,please teach me even though i am not inlined with the course of Information Technolgy, but the important thing is that my heart and my life wanted such. please email me for further information about the things you wanted me to know, thnx!

  299. Shinoy:

    pls advise the best tool for cracking wpa or wpe wireless network. please provide the tool and instruction to do the same.


  300. Wifi 4 Free:

    OUR AUTOMATIC SMART PASSWORD DECODER CAN FIND AND HACK WPA AND WEP SECURED CONNECTION IN 10 MINUTES!!! DOPE!!! YOU WANT IT!?!?ONLY at > http://wifi4free.webs.com/apps/webstore/products/show/1479366

  301. The Future of Sega:

    This article is over 3 years old. Move the fuck on people!

  302. avinash:

    i need to hack into a wifi connection i need to get the password to break the codes plz help me

  303. clark:

    what a bunch of renobs…that’s boner spelled backwards.

  304. hazem:

    nice, but netstumble didn’t detect hiden ssid name what di u think the bedt tool to detect the name of hiden ssid name with windows xp or vista ? thank u

  305. John F Kennedy:

    No,renobs is Sboner spelled backwards. (I’m sorry. OCD.)

    But anyhow, great article! Very comprehensive, though wayyy over my head. :-)

  306. jentu debbarma:

    sir, i’m using a wireless internet through gprs(aircel) in my pc, but the connection is very slow and downloading speed is too slow, just irritating. can you tell me some useful ways to increase the browsing and downloading speed………. hoping for your quick response.

  307. Uche:

    I need a code to decode a wLAN network in my area which always ask me for password.

  308. satanicslave:

    nice article

    and as for all the people who want help with bandwidth theft go away ….and learn (google it )

    and for all the poor people out there who just need to get email and so forth just buy a dongle problem solved ..

    and the rest of you just set your router to wpa2-psk
    and put a decent password/code in and your away for now till someone cracks wpa2-psk(which will happen )but not for a while yet …

  309. Jacob Hitt:

    Wow that stuff is mondo complicated, althoough advised against I’m probably going to crack my neighbors password.

  310. Watch Live Cricket:

    Wow thanks for this I am very new to this one so, I will be using your instructions ..
    Thanks AlOtt

  311. daniel:

    this dident help what so ever u huys are sooo rubbish with tec

  312. daniel:

    and another thing your website is virus friendly and all who are on this webste are prone to loads of 44-7 congrett virus and the major a342 virus
    this has seariosly bunged up my p.c thanks

  313. daniel:

    p45 and f196 catoly 92 and a massive one killonosticated genairs this virus is the one making my p.c reset every 5 minutes

  314. adarsh:

    sir iam an mca student.can u say a method to hack computers(clients) in an common wireless network.iam thankful 4 ur tutorials here.please reply.
    mail id :adarsh.talks@gmail.com

  315. wholesale baby clothing:

    How many Indians does it take to hack a WEP KEY?

    I dunno, lost count on this forum, apparently they are too fucking dumb to do it.

  316. ven0mous:

    hahahah! just old news man!

  317. dadz:

    try to sniff my balls for wpa keys

  318. Cordell Perkiss:

    That was very fascinating. There are not a lot of blogs out there with good information on this topic. I hope to read more great comments when I come back next week. Thank you for the information.

  319. let EM surf:

    You know for what it’s worth there is a whole lot of OMG I have to secure my wireless home network. The fact of the matter is 99% of home network users just have multiple devices that they wish to surf the net with. The reality is the 100′ of wireless coverage outside your home is so minuscule when compared to the whole world that will connected to each of these said devices while surfing the net. If consideration for the security of the end products are not already in place that 100′ means absolutely nothing. Most home users are not using file/print sharing, the ones that are are most likely savvy enough to protect their wireless networks. Most home users just want easy access through their wireless without having be a network guru. I also IMO think for all of the hand held wireless devices life would be easier if we all just left our access point open. And yes I know there might be some who abuse our bandwidth but that can be addressed. The only one who would oppose this thought process would be the service providers because less people would be buying monthly contracts for connectivity.

  320. christian:

    did you use a device (if yes, whats it called) or did you use a program (if yes whats it called)

  321. inzero:

    can this type of system get hacked? theres a challange on the site 30 million tried none in

  322. ggg cool:

    This is a old system of hacking and it takes a long long long time. So why not just use Linux and crack WiFi in like 2 min?

  323. heartssaler:

    Both WEP and WPA can be hacked ,WPA 2 is more tricky needs time but access to it can be done

  324. haneef:

    download wifiway 2.0 and enjoy

  325. Real:

    i cracked WEP’s key .by using a livecd but i dont know how to put it/log into its network .need help

  326. bawer:

    how can i hack wireless network that is asking me for a security code plz answer to my question

  327. Eiji Takanaka:

    Try and get yourself a copy of ‘hacking exposed:wireless 2nd edition’ online. It took a fair bit of searching as most of the links have been censored/deleted, but there are still good links out there ;). And spend a while reading!!!

  328. Eiji Takanaka:

    This is an interesting article also for wpa encryption!

    I suggest reading the accompanying material (tkip master) by the norwegian dudes who armed the code in the program tkiptun-ng (part of the aircrack-ng suite)


  329. Eiji Takanaka:


    This site has a link to the masters thesis that the norwegian dudes (sorry not sure/too lazy to research names at this point:P) wrote.

    Get reading and let me know if you come up with anything adding to the forefront of the technology!


  330. Kyle - System Administrator:

    Brilliant Artical, would be alot better if it was more Chronological, but hey, their must be something, an executable application that does all the IV cracking and hacking for you? If yu find one just bell us up an e-mail, i’d like to see how it’s put together so i could make my network secure against it :D

  331. Jamie:

    Cool info. BTW im a hacker myself so this info is refreshing

  332. Mike:

    This website is great . Can you hack a wifi in Plymouuth,England, PL7 4LT. It’s called Heles. Email me back the password please thanks :)

  333. not your fuckin bussiness:

    i dont fuckin get wat ur TRYING 2 rit????????????

  334. pirosky:

    please my neighbour has a wireless network which is unsecure,and i hacked it but requesting for username and password,any one that may help should reply me through(onlypeter4all@yahoo.com)

  335. waqas:

    i have many networks but no work because

  336. Maty:

    when i wrote iwconfig i got “no wirless extensions” mssg. y is so and any help

  337. hamster:

    check out my site hackinghamster.com . it will provide u with an indepth tutorial on hacking wifi wep under 5 minutes.

  338. Amit @ Big booty:

    Nothing is full proof.. Hackers are always gonna be one step ahead.. when it comes to security..

    and congrats for hacking your own network.. Must have been fun :)

  339. hfdh hfh:

    is full proof.. Hackers are always gonna be one step ahead.. when it comes to security..

    and congrats for hacking

  340. dimmy:

    dose it work

  341. Live Cricket:

    this is so awesome!! works like a charm

  342. gobin:

    i am getting more than 10 wireless connection but all are security secured nerworks i just want to crack it to use internet only nothing else.
    can some one send me or tell me the way how to crack it for using internet.
    if possible plz send me E-mail on

  343. gobin:

    i am getting more than 10 wireless connection but all are security secured nerworks i just want to crack it to use internet only nothing else.
    can some one send me or tell me the way how to crack it for using internet.
    if possible plz send me E-mail on

  344. williams:

    Wao….. That was a wonderful tutoria I got you

  345. Jahir:

    i am getting more than 10 wireless connection but all are security secured networks i just want to crack it to use internet only nothing else.
    can some one send me or tell me the way how to crack it for using internet.
    if possible plz send me E-mail on

  346. Mr.Peace:

    There are 4 slots on my router. When we use the internet, there is one problem occur that we can use the wireless for only one notebook. We have 4 desktops and 3 notebook. My elder brother told about it me that
    ” our router has some a little bit problem about wireless for a long time that’s why we need to change a new one “. But as for me,I would like to try as much as I can. So, this is the one way I tried by asking for your help.


  347. I_own_a_kindle:

    I have a kindle and cannot get into the network as i forgot pw.

  348. nutty:

    dictionary attack for wpa2 encryption is useless if we are using strong password and or using local dialect password since almost dictionary password are in english language. :-)

  349. jignesh patel:

    hello sir,
    plz tell me that how can i get auditor plz sir. there is no image in the link you tell so plz sir tell me another way to get auditor. plz

  350. jignesh patel:

    can anybody tell me that at where i can get the auditor plz e-mail me.

  351. chura:

    i tried different ways to hack others wireless network..as i am very much intrested to it..
    so please any body,would u tell me the steps to do so.

  352. live sports streaming:

    nice article keep it up admin thanks :)

  353. Schouwen Zalite:

    nice share gan!! :D
    wa juga mau share nih, tapi belum pernah coba sapa tau ada bisa kasih review http://mycheatrf.blogspot.com/

  354. mouse:

    i do not know anything about the computers, but my ex is a software architect and he is VERY GOOD in computers.
    today , it was a second time i had to change my IP address because i could not connect to internet using my own name and password and on my mac i got the message that “another device on the network is using my IP address.
    i am not crazy! i called linksys cisco customer service again.and again it took me over 2 hours to set up a new name and password.they also changed my IP address. they were unable to connect to their own router , even tho on my screen it was showing that they have access to my computer.we had to go over typing info over and over again until i was able to connect to internet.my mac was showing that i am connected but i could not open any page.
    i am not crazy! and then during my phone call conversation i hear that i am also connected to my ex phone abd i am leaving him a message on his voicemail. i have iphone so i took a shot of the screen. somehow i managed to put the cisco guy on hold and call my ex in the middle of the night, without me dialing or doing anything with phone. i thought that I was still talking to guy. i have no idea what is going on.my iphone is acting out for months , when i call someone, usually my first few phone calls are being dropped with 4 bars of service and i hear those weird noises , ghost like, radio tuning sounds. do you you guys have an idea what is going on.i checked my phone at the apple store, no weird software or apps installed.please help. can he listen to my calls, did he got to my wireless ?

  355. janzen:

    inform me some info to crack the WPA

  356. janzen:

    send me some info to crack WPA..thanks janzenpeskwo@gmail.com

  357. mouse:

    i have no idea how to do it, my husband did it and is spying on me.i want to get rid of the bug out of my iphone and stop him from hacking into my wireless network!

  358. van zyl:

    pleazzzzzzzzzzzzzzz any guys who knows how to access the secured wireless help i dont now my numbers.

  359. Scott Casey:

    I just read your article. But I’ve got a problem with a TP-LINK WN 821N 300Mbps USB adapter I’ve just bought.I’ve wanted to ‘pick up’ an unsecured network in my area,but even after downloading this adapter(which I was told would work)I’m still getting the message;’problem with wireless adapter or access point.
    The link doesn’t show up either as an icon in my network box,so that I don’t have nothing to click onto to connect.Have I bought the wrong adapter?And if so what can I do to correct this,& get onto the internet?
    I also require a #key number for a Microsoft Home & Business disk I downloaded from a friend,so I can activate it.Can you help? I wish I could have someone smart like you to instruct me through me ‘unknowns’ on my computer.Hope to hear from you soon.

  360. Raul M:

    always wanted to test out aircrack and the likes of just never got around to it can anyone recommend me a cheap usb adapter which is compatible with aircrack?

    Thanks for the article :)

  361. kenny:

    how to hack a wireless network ,the procedure and any material for reading to dat effect.thank man

  362. grimm:

    hey send info on how to crack wep thanks alot

  363. varun thakur:

    hey send me info how to hack,,,,,wifi..

  364. Black Friday Playstion 3:

    นี้เป็น someting ฉันไม่เคยเคยอ่าน การวิเคราะห์รายละเอียดมากHusqvarna Snowking Snow Equipment

  365. soulless.whore:

    A few days ago, I found the password reset program _useless spam garbage_ which has been recommended at about.com and use it to recover my lost password successfully. It is a very simple and helpful utility. Follow the step-by-step instructions at _useless spam garbage_

  366. Kennedy Kamande:

    thanks for the info and trying it on windows seven the netstumbler shows all available networks with the mac addresses but i canot use them.

  367. Yoda:

    Size matter not to hack.

  368. Bill:

    …I searched how to manually hack a network for training purposes and this was one of the top websites. I am disappointed though since this isn’t manual. It uses programs and apps to do the job for you.

  369. Nick Marshall:

    Pretty slick tutorial, nice work. Now I just need a little free time so I can attempt the step-by-step.

  370. hussein:

    could you send me the way u hack the wirless connection I just need to get a pin number for the eircom I wanna know how to get that number or even how to access the internet through it

  371. dualshock 3 wireless controller:

    Hi there, just become aware of your blog through Google, and located that it is really informative. I’m gonna be careful for brussels. I’ll appreciate in case you continue this in future. Lots of folks might be benefited out of your writing. Cheers!

  372. Abhinav:

    I am using sony vaio laptop. and using Microsoft Windows 7 home premium in it. When i search for a wi-fi connection it searches but when i try to connect. it requires passkey..some connections are WAP and some are WEP. I don’t have deep knowledge of this all..kindly help me in hacking the wi-fi .Please suggest me softwares to hack it..For Microsoft windows 7

  373. NIL:

    how can i by pass or break the password on a wireless internet connection? plesae reply in my mail

  374. ipl 2012:

    how can i break the password of any wifi through any software?please suggest some good names

  375. office professional plus 2010 product key:

    I’m extremely inspired together with your writing skills as well as with the format on your blog. Is this a paid theme or did you modify it your self? Either way keep up the nice quality writing, it is rare to look a great blog like this one today..

  376. Shabaz Shaikh:

    WEP can be cracked easily…what for WPA???reply soon…someone…

  377. cheap windows 7:

    Hello There. I found your weblog the use of msn. That is a really neatly written article. I will make sure to bookmark it and come back to read more of your helpful information. Thanks for the post. I’ll definitely comeback.

  378. paul:

    This is worst not working

  379. FENNO111:

    mate u dont know shit lmao,u talk a good hack but u dont know shit ….ass a mater of fack u probably copied all this striaght from text and passed it off ass ur own lol.
    man i love to read about these so called HACKS lol its standerd ….why dont u try to hack somin real lol like WPA2 or paypal or fuck it why not come back to us when you have learn to hack some real data bases

  380. Steve:

    Fenno111.. learn how to spell you angry muppet.

  381. Kolz:

    Hi I am a professional and test/crack networks and websites for a living. Just wanted to say that this was a good article but a deauth attack would be easier…… Also if you steal Mac address then you can use the Internet as well. Lastly wireshark is a great program for this aswell but sadly works on windows );

  382. masood:

    if any body could tell me wich software and how its use please be kind if any body coud tell me step buy step, my email masoodsayeedi@yahoo.com .
    thanks and regards.

  383. shaji:


  384. ISHMAEL:

    I am a cisco networking adminisrator,and iam trying to hack my wireless router but having sum defficulties nd i was wondering if sum 1 cud help me….

  385. Chris Dooley:

    Hi All
    Great article – just wanted to add my two cents worth for home router setup.

    This is what i do (and im sure the majority has already been covered in this article and posts)

    -CHANGE THE ROUTER PASSWORD!! If you dont know how, pick up the manual :)
    -Turn off DHCP and set clients to have static IP addresses. This stops the red carpet of access being rolled out when they connect – provides another hurdle if a user gains access to your network.
    -Disable (if possible) all the network modes that are unused (i.e a/b)
    -Use WPA/WPA2 encryption and if using pre-shared keys, pick one thats 63 characters long, lower and upper case, symbols and numbers).
    -Leave SSID enabled. in my experience, clients become noisy when they are checking to see if the SSID exists. As mentioned above, several tools will be able to tell a hacker what the SSID is anyway after listening to enough packets
    -If you live in a studio and can pick up your network down the road, try turning down the transmit power
    -Turn on MAC filtering and only allow your own MAC addresses to connect.

    Hopefully with these settings, (although still crackable) it will provide enough hurdles to annoy a hacker and them to move on to someone elses network – like the guy in my building: SSID netgear, no security. I wish he would read this…

  386. Victor:

    pls, i can i prevent my network from been penetrated/hacked

  387. Dave:

    I always use this when in public neworks: http://www.sunvpn.com/.

    It` a OpenVPN service that encrypts all your traffic when you connect it. As you said Firesheep can`t read your session if you encrypt your traffic, and OpenVPN has the best encryption.

  388. Adobe/Adobe CS5.5:

    I loved as much as you’ll obtain carried out proper here. The comic strip is attractive, your authored subject matter stylish. nonetheless, you command get got an nervousness over that you wish be turning in the following. sick unquestionably come further earlier once more as exactly the same just about a lot incessantly inside case you defend this increase.

  389. fraila:

    am getting more than 10 wireless connection but all are security secured networks, i just want to crack it to use internet only nothing else.my neighbors are so selfish,pls send me or tell me the way how to crack it i can’t afford to to have one.. pls send it to my email..Frailar@yahoo.com.. tnx a lot

  390. xbox games on xbox 360:

    I am extremely impressed together with your writing abilities as neatly as with the layout for your blog. Is that this a paid subject matter or did you customize it yourself? Either way keep up the nice quality writing, it’s rare to peer a great weblog like this one today..

  391. شمعة:

    كس اخت النفظك

  392. xbox kinect cheap to buy:

    Fantastic site. A lot of helpful info here. I am sending it to a few pals ans additionally sharing in delicious. And obviously, thanks to your sweat!

  393. Sexkontakt Wien:

    It is perfect time to make some plans for the longer term and it is time to be happy. I’ve read this put up and if I may I desire to recommend you some fascinating things or tips. Perhaps you could write subsequent articles regarding this article. I desire to learn more things about it!

  394. best ipod dock:

    Useful information. Lucky me I discovered your website by accident, and I am surprised why this twist of fate did not happened in advance! I bookmarked it.

  395. Get free stuff and make easy money:

    Pretty nice post. I just stumbled upon your blog and wanted to say that I’ve truly enjoyed browsing your weblog posts. In any case I will be subscribing to your rss feed and I am hoping you write again soon!

  396. M Yusuf:

    great article.
    I realized that the public wireless is not secure when some1 stole my chips poker on that network. i had been playing for about 4 hours and he came and stole it. so sad.

    its made me want to learn how to hack or crack. i just want they feel what i felt.
    just it.

    the last, sorry for my bad english.


  397. Atul:

    i am getting more than 10 wireless connection but all are security secured nerworks i just want to crack it to use internet only nothing else.
    can some one send me or tell me the way how to crack it for using internet.
    if possible plz send me E-mail on sa.lakhani@gmail.com

  398. Best Speakers:

    Great submit, very informative. I ponder why the opposite specialists of this sector don’t realize this. You should proceed your writing. I am confident, you have a great readers’ base already!|What’s Happening i’m new to this, I stumbled upon this I have found It absolutely useful and it has aided me out loads. I hope to give a contribution & aid different customers like its helped me. Good job.

  399. Wireless Speakers:

    Undeniably imagine that that you said. Your favorite reason appeared to be at the web the easiest factor to keep in mind of. I say to you, I definitely get irked at the same time as folks think about issues that they just do not realize about. You controlled to hit the nail upon the highest and also defined out the entire thing without having side effect , folks could take a signal. Will probably be back to get more. Thank you

  400. office mac key:

    Hey there, You’ve performed an excellent job. I’ll certainly digg it and in my opinion recommend to my friends. I’m sure they will be benefited from this web site.

  401. secure erase:

    Hi there, You have performed an excellent job. I’ll definitely digg it and individually recommend to my friends. I am sure they’ll be benefited from this site.

  402. ??????:

    I have a friend who can wifi without the password in 10 seconds only using his iPad which is not been jail broken. When I ask him I will post it on this site this way you guys won’t have to waste your time.

  403. Call of Duty 3 cheats:

    Thanks for some other wonderful post. Where else may anyone get that type of information in such an ideal method of writing? I have a presentation next week, and I am at the search for such information.

  404. wheezdom:

    how do i hack wep

  405. lestat:

    how can i hack the password for wep i can conect to it jus need the password. email me at jokawild13@gmail.com

  406. Government Jobs:

    Awesome stuff man! ;). Thanks a lot

  407. Los Angeles Office Phone System:

    Its like you learn my mind! You appear to know so much about this, such as you wrote the ebook in it or something. I believe that you simply can do with a few p.c. to force the message house a bit, but instead of that, that is wonderful blog. An excellent read. I’ll certainly be back.

  408. Buy Stuff:

    Hello there, You have performed an excellent job. I will certainly digg it and in my opinion recommend to my friends. I am confident they’ll be benefited from this website.

  409. mod:

    Pretty nice post. I just stumbled upon your weblog and wished to say that I’ve really loved surfing around your blog posts. In any case I will be subscribing to your feed and I’m hoping you write again soon!

  410. Get the latest and greatest Call of Duty and Modern Warfare 3 mods now!:

    Tremendous issues here. I am very happy to peer your article. Thank you so much and I am having a look forward to contact you. Will you kindly drop me a e-mail?

  411. Government Jobs:

    Happy hacking all. It worked for me. ;)

  412. Live Cricket:

    very good tip considering my home internet crashed so often

  413. Max:

    If someone kindly help me? i have an Nokia E-7 mobile. when i am in the office i see it detects the WLAN. but it asks about the pre shared key to be connected to the network. i just want to find out its PSK to use internet. can some one help me?

  414. application serials:

    Thanks a lot for sharing this with all folks you actually know what you are talking about! Bookmarked. Please additionally visit my website =). We will have a hyperlink exchange contract among us

  415. reset windows password|recover windows password|hack windows password|how to reset password|password recovery|password reset|how to recover password|forgotten password|password remove|password software|how to reset windows password|how to reset admin pass:

    certainly like your web site however you have to check the spelling on quite a few of your posts. Several of them are rife with spelling problems and I in finding it very bothersome to inform the truth however I’ll surely come back again.

  416. David mark Cababat:

    My brother recommended I would possibly like this blog. He was once totally right. This put up actually made my day. You can not consider simply how so much time I had spent for this info! Thank you!

  417. msia:

    Thanks for the tutorial…would care to get more deep knowledge on ethical hackings.

  418. Mohamad Daud:

    Hi Every body.
    I want to hack a secure wireless network in windows 7 . please quide me the best and proven ways to access the network and use net for free…

    Thanks…….waiting for your response….

  419. finca para bodas en madrid en El Escorial:

    I get pleasure from, lead to I found just what I used to be taking a look for. You have ended my 4 day long hunt! God Bless you man. Have a nice day. Bye

  420. wlan kamera:

    i see i need to secure my own wlan a bit more. some stuff i did not know yet. thx for that. Mohammed i dont think someone will show you how to do that here with a guide(its ilegal) :D

  421. {Hacking USA Credit Card!!!|VISA Hacking|Mastercard Hacking!|Below Job|Hard Fuch|Teenager Fucking|Hard Core|Asshole Fuck}:

    Hacking for USA Credit Card…

    [Hello there, simply changed into alert to your blog thru Google, and found that it’s truly informative. I?m gonna watch out for brussels. I will appreciate in the event you continue this in future. Numerous folks will likely be benefited from your wr…

  422. John:

    Great video to learn how to hack WiFi http://www.youtube.com/watch?v=mOSZF-dnjWo

  423. smith:


  424. diego:

    what operating system where u using? windows or linux?

  425. diego:

    also can the auditor software crack wep and wpa?

  426. Suka:

    How can i hack a Wireless network security key. The connection is available to my Laptop but couldn’t connect it. Please help with the reply to my mail ID .Thanks in advance.


  427. dumpstersonline:

    Anyone can use wireshark if they know what they our doing.

  428. Jeffry:

    These tips are great, I am a new blogger and signed up to be a guest poster on another blog. But I had no idea what I was going to do. She said it was ok to use something I had already written before but based on your post I am going to write something new.

  429. Free Playstation 20$ PSN cards:

    Thanks for any other informative web site. The place else may just I am getting that type of info written in such a perfect way? I have a mission that I’m just now working on, and I have been at the glance out for such info.

  430. Amy:

    Very usefull tip. Thanks

  431. polapainz:

    Great tutorial, Thanks

  432. Amanda:

    My neighbor always forgot to set password of his wifi

  433. natevd95:

    This tutorial requires you to download an iso for backtrack and boot it off a cd. backtrack is a linux distribution that runs off the linux kernel; this does not describe how to do it on that P.O.S. windows. sorry, but you’ll have to do it the easy way.

  434. Neil L. McGinn:


    Dear Sirs,
    I would like to hire someone to change some records at a University. I will pay your asking price in “cash”.

  435. Marta:

    Wе stumblеd over herе coming frοm a diffегent wеb
    ρage and thought I shоulԁ check things οut.
    Ӏ like what I see ѕo noω i’m following you. Look forward to exploring your web page yet again.

  436. wisdom:

    am so happy to come across this stuff but i can not lie to you i understand it but not all so i want to know more about it and i need a software to use and hack some of the wireless connection in my area or any code that i can use to hack it i promise not to do anything funny on there router rather than to browse

    once again i have read your history about how you start making it and the same applicable to i wish you will be my godfather i will like so that you will help me to make my talent not to be a waste. once again i thank you so much. and am waiting to hear the reply in my mail box which i have provided thanks

  437. monster beats outlet:

    I’m not positive where you’re getting your information, but good topic.

    I needs to spend some time studying more or working out more.
    Thank you for great information I was looking for
    this information for my mission.

  438. asdman:

    I have hacked my own WPA2 wireless router… it takes 1hr and 40 minutes to hack that…

  439. Goofy:

    U all r rong that’s impossible ya dorks

  440. Goofy:

    It only took me 2 minutes to hack it beat that

  441. J.J:

    Get the gist on how is being done.

  442. Elevise:

    it was cool

  443. cheap tablet pc android:

    With having so much content and articles do you ever run into any issues of
    plagorism or copyright infringement? My site has a
    lot of unique content I’ve either created myself or outsourced but it looks like a lot of it is popping it up all over the web without my agreement. Do you know any techniques to help prevent content from being stolen? I’d
    genuinely appreciate it.

  444. bis:

    i am getting more than 10 wireless connection but all are security secured networks i just want to crack it to use internet only nothing else.
    can some one send me or tell me the way how to crack it for using internet.
    if possible plz send me E-mai on

  445. titan:

    thanks for all

    I knew how to hack a wep wifi,I got the key and I am now connected to the router but no internet access.

    Conclusion: the DHCP is disabled, I tried to fix IP in network with gateway and but failed
    I tried to fix IP in network with gateway but failed

    I tried to fix IP in network to /16 with appropriate gateway but failed

    I tried to fix IP in and /24 network with correct gateway but failed

    So how can I know the correct gateway and the IP range for this wifi router ?

    I tried WIRESHARK but I cant.

    THANKS for all

  446. hotspot software:

    I would just like to say comment on the design of this website, it is very clean and easily navigational. I am currently doing a assignment on usability and i would use your webpage as a case study. Bookmarked for future reference

  447. sex chat with cam:

    For newest information you have to pay a visit world-wide-web and on the web I
    found this website as a most excellent web page for most recent

  448. om:

    plg……………………………………..plg give me brack the passwd for wifi networking

  449. how to read the mind of a guy easy:

    Hello just wanted to give you a quick heads up and let you know a few of the images aren’t loading correctly. I’m not sure why
    but I think its a linking issue. I’ve tried it in two different web browsers and both show the same results.

  450. how to cure uti fast:

    Fabulous, what a blog it is! This blog gives useful information to us,
    keep it up.

  451. brandon:

    people stop asking to help you “hack” into networks. You clearly have no knowledge of the topic what you are doing is cracking, a generally frowned upon practice so basically. shut up

  452. Santa:

    I wonder how all you self righteous people stumbled onto this article… Did you accidentally Googled “How To Hack a WIFI?” LMFAO!

  453. Hosting Companies Dedicated Server Unmetered Web Hosting Deals:

    Good web site you have got here.. It’s difficult to find high-quality writing like yours nowadays. I seriously appreciate individuals like you! Take care!!

  454. best way to get your ex girlfriend back:

    Great web site you have here.. It’s difficult to find good quality writing like yours these days. I honestly appreciate individuals like you! Take care!!

  455. hostgator discount coupon 2012:

    Hi! This is my first comment here so I just wanted to give a quick shout out and say I truly enjoy
    reading your articles. Can you recommend any
    other blogs/websites/forums that deal with the
    same topics? Many thanks!

  456. https://paracin.me/olgahdt:

    What’s up, everything is going perfectly here and ofcourse every one is sharing facts, that’s really
    excellent, keep up writing.

  457. free xbox live gold codes all working 2013:

    We stumbled over here coming from a different web address and thought I might as well
    check things out. I like what I see so i am just
    following you. Look forward to looking over your web page repeatedly.

  458. Niaz:

    please some one help me, I have purchased new 150Mbps Wireless N ADSL 2 +Modewm. representative of PTCL has connected it, it is working, but when i asked him about Wi-Fi password,he told me, that is the back side of box, there are two figures on back of the device.Pin and key, I tried the both, but wi-fi is not connected,asking for password. SO PLEASE some one help me what i have to do,and from where i can get password, it is my e mail. nzblch@yahoo.com dated 8th march, 2013

  459. Charla:

    Wonderful blog! I found it while searching on Yahoo News.
    Do you have any tips on how to get listed in Yahoo News?
    I’ve been trying for a while but I never seem to get there! Thanks

  460. Katherin:

    Very rapidly this web page will be famous amid all blog viewers, due to it’s fastidious content

  461. click here:

    Having read this I thought it was really enlightening.
    I appreciate you finding the time and effort to put
    this information together. I once again find myself spending a lot of time both reading and
    leaving comments. But so what, it was still worth it!

  462. Free nfl jersey:

    If some one wants to be updated with latest technologies afterward he must be visit this website and be up to date all the time.

  463. free mac book air:

    Admiring the dedication you put into your website and detailed information you provide.
    It’s great to come across a blog every once in a while that isn’t the same
    old rehashed material. Wonderful read! I’ve saved your site and I’m including your
    RSS feeds to my Google account.

  464. ipod touch free:

    Now I am ready to do my breakfast, once having my breakfast coming again to read further news.

  465. Effelotte:

    [url=http://lebron9forsalenew.webs.com/]lebron 9 for sale[/url] The situation can become even more dangerous during the winter when melted snow can re-freeze into a layer of ice on the road which could cause vehicles to skid dangerously out of control Role of Storm DrainsStorm drains are conduit systems designed specifically to get rid of liquid run-off caused by precipitation and melting snow; they prevent rainstorms from flooding roads and the surrounding area Storm sewers are an important infrastructure, especially in urban areas Unlike rural areas where much of the rain is absorbed by the soil, urban locations and especially large cities have much of the ground covered in cement which does not absorb any liquid at all Without a properly installed drainage system, rain water will simply collect and could result in flooding [url=http://cheapnikefreerunshoes.blogspot.com/]cheap nike free run[/url] just maybe possible It’s sort of like playing the lottery http://lebron9forsaleshoes.blogspot.com/.
    [url=http://nikefreetiffanynew.webs.com/]nike free tiffany[/url] What people NEED to understand is that this is a REAL BUSINESS, and you operate independently Your success is NOT garaunteed If you are considering joining the Reverse Funnel System my suggestion is spending a little more time analysing the pros and cons of the system, and make sure it is right for youIf you are seeking to create your OWN highly profitable business, that can pay you the types of income most people only dream about [url=http://lebron10make.webstarts.com/]nike lebron 10[/url] The shopping is just a click away now There are unlimited choices for a customer, which are not available otherwise if he shops from a brick and mortar store Another fact about these online shopping dollar stores is that it relieves you from useless fatigue which you may have when you go for shopping physically, commuting to the actual place These factors will definitely help you make a good purchase Firstly, it is important to remember that though bigger brands have better products on most occasions, while buying a music system it is best to try out the system rather than making a blind purchase This is because the human organs are fine tuned and there might be subtle differences in the manner in which one listens to music Hence, it is best to listen to the sound quality before making the purchase Budget should also be the one of the major priorities or rather it should be the top priority as without it there is no use pining for the best product on the rack.

  466. http://adultddl.ws/2012/01/17/milfhunter-com-12-01-16-nicky-fuel-for-fucking-xxx-imageset-p4l:

    Thanks for sharing your thoughts on tech. Regards

  467. Effelotte:

    [url=http://www.oakleyforsale2s.com/]oakley discount[/url] Christian louboutin shoes soon surfaced in the market due to his skill, creativity as well as self-confidence Yet , in those days, this individual did not wish to participate in any company, nor do he wish to create their own brand name Fledgling Christian louboutin shoes had lastly developed their own brand within 1992, this individual produced colorful high heel pumps, amazing, that have been identified through the media because “the most from the actual mainstream” the moment these were introduced, plus they received an excellent issue For stylish women high heels really are a must for nearly all events except maybe the actual daily grind around the treadmill machine Since these types of high end stylish shoes are put on by many the famous Hollywood celebrity and celeb, it is difficult to think that you could purchase Wholesale Christian louboutin shoes footwear However, you can actually as well as your look for wholesale Christian louboutin shoes shoes finishes here You can also purchase right here the famous red-colored bottom shoes low cost and for the actual trendy women high heels of all types What makes red bottom part shoes a popular choice * The actual rich and socialites like Tv, Britney Asparagus spears, Tommy lee jones, Christina Aguilera as well as Madonna all put on these high- style shoes [url=http://oakleyfrogskins9.blinkweb.com/]oakley frogskins[/url] What most people don’t realize is that these keywords will require a lot of time to get ranked in the search engines, since you are competing with so many big companies for them It is smart to choose keywords that don’t have as much competition because this will allow you to get put into the search engine results much quicker for more than one keyword 2 Keyword location and density – You have to be sure that the keywords you choose to use are placed in the right areas of your website You want to be sure they are in the page title and in a few of the paragraphs of the content on your site http://raybansunglassessale7.webs.com/.
    [url=http://monsterbeatsbydrestudio.cabanova.com/]monster beats by dre studio[/url] Women would encounter more trouble than men when they went to buy running clothes They can not find the suitable breeches There were many women run in Birney Park everyday and Birney Park was under the high-slope in my hometown Every time I went to work in Manhattan, I would like to run in the Central Park There are always some women running in a small road around the reservoirMost women who participated in a running were to keep fitness Orison Otto recollected his memory at the age of 29 [url=http://cheapoakley2u.ucoz.org/]cheap oakley[/url] Nothing was wrong with the service they offered It was simply that CaféPress offered a better serviceNow am I dead set on using CaféPress The answer is no I really like CaféPress But if a competitor comes out with a service better than that of CaféPress, I may begin using that.

  468. Effelotte:

    [url=http://scottiepippenshoesd.webstarts.com/]Scottie Pippen shoes[/url] Make sure that you have the right keywords in your web site title so that the topic is understood perfectly by search engines such as Google Without a doubt, using brilliant titles and keywords would pretty much guarantee that you receive higher traffic on your siteNext, ensure that your pages are written and constructed in the best possible way Make use of your specified keywords and write, or re-write your content effective and attractively to cater for your target audience However ensure that you do not over-do the writing part, as many site operators tend to commit this mistake [url=http://nikeshoxr42.blogspot.com/]nike shox r4[/url] That is the goal, right Residual IncomeWhile I considered myself computer literate, all this html code gibberish left me feeling totally inadequate and afraid to pursue my dream This little word called “fear” had held me back from becoming a millionaire ten years agoOne day as I upgraded my personal computer I came across a website building software, and being the curious type of person that I am – I decided to play around with it Much to my amazement, this software required nothing more than some simple cut and paste skills Within a few hours I had a one page website built http://lebrongotous.webstarts.com.
    [url=http://pinkfoampositesd.webstarts.com/]pink foamposites[/url] Sell your expertise Many people use a website and online promotion to sell their offline expertise Whether you are a business consultant or a wilderness guide, you can make more money with an online presenceSell and ship products Sell products that don’t need to be shipped [url=http://womenfoampositessd.blinkweb.com/]women foamposites[/url] to be handled part-time, by the chief executiveProduct marketing works over two different frameworks, each important, and fundamentally very different These two areas are strategic and tacticalStrategic MarketingStrategic product marketing is the future component of the marketing problem Strategic issues include:What business is your company inWhat business should you be inWhat products or services should be designed and offeredWhat technical capabilities need to be developed within the company or acquired from outside the companyOther related strategic issues include:Marketing channel strategies (How do you reach your customers, then sell and deliver the goods)Competitive positioning (What sets your company apart in the minds of your customers)A complete understanding of, and ability to communicate to customers, What they can buy from your company that they cannot buy from any other company.

  469. coupons:

    I blog frequently and I genuinely appreciate your content.
    This great article has really peaked my interest.
    I’m going to take a note of your blog and keep checking for new details about once a week. I opted in for your Feed too.

  470. Therese:

    Hi it’s me, I am also visiting this web site regularly, this site is truly nice and the viewers are actually sharing nice thoughts.

  471. louis vuitton handbags:

    Simply desire to say your article is as astounding. The clarity for your post is just nice and i could think you are a professional on this subject.
    Well along with your permission let me to clutch your feed to stay updated with imminent post.

    Thanks a million and please continue the rewarding work.

  472. JuliaLee:

    Yup, anyone can hack it. The only way to really stay safe these days is to set up a VPN. I would try Express VPN, it has been the safest so far that I’ve tried.

  473. yellow:

    That was equally fascinating likewise as insightful!

    Thank you for sharing your feelings with us.

  474. Bradley Cooper:

    Hire a local guide to take some weight off their
    shoulder after a long time and money. It also
    matters when traveling to Los angeles, some practitioners recommend making detours, such as Barcelona, use Cologne/Bonn, Stuttgart, Hamburg, and
    Berlin as hub airports. Sell or raffle the wine tasted burnt and provided little fruit.
    The nicely balanced palate presents a smooth start
    with the right resources and capabilities are
    what the competition have to pick up cheaper fares.

  475. file management:

    hello!,I love your writing so much! proportion we
    communicate extra approximately your article on AOL?

    I need a specialist in this space to resolve my problem.

    May be that’s you! Having a look forward to see you.

  476. coconut oil:

    The Executive Committee of the Board of Directors at Mc – Graw-Hill has five members.
    Coconut Oil is solid at temperatures below 76 degrees.
    Below are some great sources of fat that we should be including in our diets daily.

  477. pompy hydroforowe:

    Hurrah! In the end I got a webpage from where I can really get useful data concerning my
    study and knowledge.

  478. looe self catering:

    Hi there, yeah this post is genuinely pleasant
    and I have learned lot of things from it on the topic of blogging.

  479. mens toys:

    I like what you guys are up too. This type of clever work and exposure!
    Keep up the very good works guys I’ve included you guys to my personal blogroll.

  480. rugby iii phone: 2013:

    Actually when someone doesn’t be aware of afterward its up to other visitors that they will help, so here it takes place.

  481. Bev:

    The skin is the largest organ of the human body and it has the ability to absorb the nutrients contained within almond oil just by rubbing it onto your skin.
    The oil is chock full of nutrients which help overall health, in addition to
    that of the hair. It seems like all the water coming from my eyes is swelling up the skin in that area.

  482. almond oil:

    Perhaps you recall chamomile from the times you were sick
    and your parent, friend, or partner, gave you a hot
    cup of this therapeutic drink to ease your suffering
    stomach. The new Macadamia Natural Oil Nourishing Leave-In Cream
    also resembles the sebum which is one of the many features of this product.
    Macadamia Natural Oil Healing Oil Treatment can be performed on damp or dry hair.

  483. blogging with john chow review:

    I’m amazed, I must say. Seldom do I come across a blog that’s both educative and entertaining,
    and without a doubt, you have hit the nail on the head.
    The problem is something which too few people are speaking intelligently about.
    I’m very happy I stumbled across this in my hunt for something concerning this.

  484. bring the fresh review - review:

    I will right away clutch your rss as I can not to find your email subscription hyperlink or newsletter service.
    Do you have any? Kindly permit me understand in order that I could subscribe.

  485. abdominal exercise for women at home:

    You actually make it seem so easy together with your presentation but I find this matter to be really something which I feel I’d never understand. It kind of feels too complex and extremely vast for me. I’m looking forward for your next publish, I’ll try to get the dangle of it!

  486. isabel marant sneakers:

    Asking questions are truly good thing if you
    are not understanding something entirely, but this paragraph presents
    nice understanding even.

    Here is my blog: isabel marant sneakers

  487. Surveys Paid Review:

    I’m amazed, I must say. Rarely do I come across a blog that’s both equally educative and
    amusing, and let me tell you, you have hit the nail on the head.
    The issue is an issue that too few people are speaking intelligently about.

    Now i’m very happy that I came across this during my search for something concerning this.

  488. page ranking:

    Cloaking is a process by which a website gains traffic through social networking sites helps in fast spreading of information.
    For business camera is 5 MP Auto focus unfortunately no flash.
    With its easy functionality and friendly environment, business
    powersuite enterprise provides sophisticated software which can be used for marking up the business.

    my web blog; page ranking

  489. Trick Photography Book Review:

    Tremendous things here. I’m very satisfied to peer your post. Thanks a lot and I’m looking
    forward to touch you. Will you please drop me a

  490. forum.r16site.com:

    I’ve been exploring for a bit for any high-quality articles or weblog posts on this kind of space . Exploring in Yahoo I finally stumbled upon this website. Studying this information So i am happy to convey that I’ve an incredibly good uncanny feeling I
    discovered just what I needed. I so much unquestionably will make certain to do not fail to remember this website and give
    it a glance on a relentless basis.

  491. louis vuitton outlet:

    This is a very good tip particularly to those fresh to the blogosphere.
    Short but very accurate information… Thank you for sharing this one.
    A must read article!

    Feel free to visit my homepage – louis vuitton outlet

  492. FatCow Hosting Review:

    I’ve been browsing online more than three hours today, yet I never found any interesting article like yours. It’s
    pretty worth enough for me. Personally, if all web owners
    and bloggers made good content as you did, the net will be a lot more useful
    than ever before.

  493. Fat Cow Review:

    Hi my family member! I want to say that this post is awesome, great written and include almost all significant infos.
    I’d like to see more posts like this .

  494. Reginald:

    What a stuff of un-ambiguity and preserveness of valuable familiarity regarding
    unexpected feelings.

  495. Sarah:

    Merci pour ton aide, c’est très instructif pour moi. Malheureusement, je n’ai pas le temps de lire tes
    autres articles!

  496. Best Domain Parking:

    I think this is one of the such a lot significant info for me.
    And i’m happy reading your article. But should statement on few normal issues, The site taste is perfect, the articles is actually excellent : D. Excellent job, cheers

  497. Best Domain Register:

    This paragraph will assist the internet users
    for creating new weblog or even a weblog from start to end.

  498. Best Domain Sites:

    Hi there to every one, as I am truly keen of reading this
    website’s post to be updated regularly. It carries fastidious data.

  499. Best Domain Registrar:

    Very quickly this web site will be famous among all blogging and site-building viewers, due to
    it’s fastidious content

  500. Best Domain Registrars:

    I have been browsing on-line more than three hours today, yet I never found
    any fascinating article like yours. It is lovely value sufficient for me.
    In my opinion, if all web owners and bloggers made good content as you
    did, the web will be a lot more helpful than ever before.

  501. full version:

    I visited multiple web sites but the audio quality for audio songs current
    at this web page is genuinely marvelous.

  502. Best Ecommerce Hosting Sites:

    Heya i’m for the first time here. I found this board and I to find It truly helpful & it helped me out a lot. I hope to present one thing back and aid others such as you helped me.

  503. Best Domain Registration:

    With havin so much written content do you ever run into any issues of plagorism or
    copyright infringement? My site has a lot of unique content I’ve either authored myself or outsourced but it looks like a lot of it is popping it up all over the internet without my permission. Do you know any ways to help prevent content from being stolen? I’d truly appreciate it.

  504. wvu chat boards:

    Hi, everything is going fine here and ofcourse every one is sharing facts, that’s truly fine, keep up writing.

  505. How To Make A Website:

    I am sure this paragraph has touched all the internet viewers, its really really nice article on building up new blog.

  506. best male enhancement pills:

    It’s genuinely very complicated in this full of activity life to listen news on TV, so I only use the web for that reason, and obtain the latest information.

  507. click to investigate:

    One university prof lost more than than individual reaches forcible
    physical exercise exemption. No affair how arduous you workout, if your dieting is not as knockout as you opine.
    Abdominal workouts are physical exercises oriented of protein are cottage cheeseflower,
    whey protein powder, eggs, crybaby, salmon, and milk.
    Is Gluten Free fish utilized with but paying attention
    you hold an exercising broadcast and pin to it.
    Any weightiness turned a loss in the sauna is simply only a crowd of ballyhoo multitudes!

  508. paid surveys at home review:

    I’m really loving the theme/design of your website. Do you ever run into any internet browser compatibility issues? A few of my blog visitors have complained about my website not operating correctly in Explorer but looks great in Opera. Do you have any advice to help fix this issue?

  509. How To Create A Blog:

    Highly energetic article, I liked that bit. Will there be a part 2?

  510. How To Create A Blog:

    It’s actually very difficult in this full of activity life to listen news on Television, therefore I just use the web for that reason, and obtain the most up-to-date news.

  511. How To Create A Blog:

    Aw, this was an exceptionally nice post. Taking a few minutes and actual effort to create a very
    good article… but what can I say… I procrastinate a lot and don’t seem to get anything done.

  512. kumlama:

    It’s actually very complicated in this busy life to listen news on Television, so I only use web for that purpose, and get the newest news.

  513. Lonna:

    Get Up both legs off the flooring, till far from what 6
    pack abs you experience. Who told you’ll also be fited out with the self-assurance of a person that set out to reach the impossible and come through. Fact: Military Posture Preparing Burns More Calories than Cardio AloneOften, when hoi pollois go on fat red programmes to get 6 Pack Abs, they sufficient rest between sessions as well. Therefore free fain meals and incentivized structural free weight deprivation programme that promotes diet and physical just about every appearance on television system.

  514. How To Create A Blog:

    hey there and thank you for your information – I’ve certainly picked up anything new from right here. I did however expertise some technical points using this site, since I experienced to reload the site lots of times previous to I could get it to load properly. I had been wondering if your web host is OK? Not that I am complaining, but slow loading instances times will often affect your placement in google and could damage your quality score if advertising and marketing with Adwords. Anyway I am adding this RSS to my email and could look out for a lot more of your respective fascinating content. Ensure that you update this again very soon.

  515. GoDaddy Promo Code:

    I comment whenever I like a post on a website or I have something to valuable to contribute to the discussion.
    Usually it is triggered by the sincerness displayed in
    the post I read. And after this post I hacked my secure wireless
    network: heres how its done – TECH.BLORGE.com. I was actually
    excited enough to drop a commenta response :-) I actually do have 2 questions for you if you don’t mind. Is it only me or does it look as if like some of the responses appear as if they are coming from brain dead visitors? :-P And, if you are writing at additional sites, I would like to follow anything new you have to post. Would you list all of your social sites like your twitter feed, Facebook page or linkedin profile?

  516. blonde webcams:

    Incredible points. Outstanding arguments. Keep up the good effort.

  517. Eve:

    I adore you for gathering beneficial info, this post has given
    me a lot more info!

    my blog post; acne treatment forum (Eve)

  518. nigger site:

    I do not even know how I stopped up right here, but I believed this put up used to be great.

    I don’t understand who you are but certainly you’re
    going to a well-known blogger when you aren’t already. Cheers!

  519. coolboy:

    Very detailed blog, very effective way to put sense into all these tech specs. I really like this, very helpful.


  520. payday loans:

    Admiring the time and effort you put into your blog and in depth information you
    provide. It’s great to come across a blog every once in a while that isn’t the same unwanted rehashed material.

    Fantastic read! I’ve saved your site and I’m adding your RSS feeds to my Google account.

  521. Domain Host:

    Hmm it appears like your site ate my first comment (it was super long) so I guess I’ll just sum it up what I wrote and say, I’m thoroughly enjoying
    your blog. I as well am an aspiring blog blogger but
    I’m still new to everything. Do you have any recommendations for inexperienced blog writers? I’d really appreciate it.

  522. Domain Hosting Services:

    You are so awesome! I don’t think I have read anything like this before. So wonderful to discover another person with a few original thoughts on this subject matter. Really.. thanks for starting this up. This website is something that’s needed
    on the web, someone with a little originality!

  523. Domain Hosting:

    Hi there would you mind stating which blog platform you’re working with? I’m looking to start my own blog in the near future but I’m having a hard time making a decision between BlogEngine/Wordpress/B2evolution and Drupal. The reason I ask is because your design and style seems different then most blogs and I’m looking for something
    unique. P.S Sorry for getting off-topic but I had to ask!

  524. Domain Name Registrar:

    Hi colleagues, pleasant piece of writing and good urging commented at
    this place, I am in fact enjoying by these.

  525. Customized Fat Loss Review:

    Hi there Dear, are you genuinely visiting this web page
    daily, if so afterward you will definitely obtain fastidious experience.

  526. Rails Hosting:

    Hello there! I could have sworn I’ve been to this website before but after looking at some of the articles I realized it’s new to me.
    Nonetheless, I’m definitely happy I discovered it and I’ll be book-marking it and checking back frequently!

  527. Register Domains:

    Hi there! I could have sworn I’ve been to this website before but after going through many of the posts I realized it’s new to me.
    Regardless, I’m definitely delighted I stumbled upon it and I’ll be book-marking it and checking back often!

  528. VideoCraft:

    I am extremely inspired together with your writing skills and also with the layout for your weblog. Is this a paid subject or did you modify it your self? Either way stay up the excellent high quality writing, it’s rare to look a great blog like this one today..

  529. minecraft pocket edition server list:

    We’ve learn a several perfectly things below. Undoubtedly benefit social bookmarking intended for returning to. We surprise how much attempt you place in making a really spectacular helpful website.

  530. Kizi Game:

    At this time it seems like Movable Type is the preferred blogging platform available right now.
    (from what I’ve read) Is that what you are using on your blog?

  531. Website Domain:

    Very nice post. I simply stumbled upon your weblog and wanted
    to say that I have truly loved browsing your weblog posts.

    After all I’ll be subscribing for your feed and I’m hoping
    you write again soon!

  532. MyCreeper, Minecraft:

    I’ll immediately take hold of your rss feed as I can not in finding your e-mail subscription hyperlink or e-newsletter service. Do you’ve any? Kindly permit me understand so that I could subscribe. Thanks.

  533. buy garcinia cambogia online:

    Wonderful beat ! I would like to apprentice at the same time as you
    amend your site, how can i subscribe for a weblog site?
    The account helped me a acceptable deal. I were tiny
    bit acquainted of this your broadcast provided bright clear concept

  534. Bluehost Coupon:

    Thanks designed for sharing such a pleasant opinion, article is pleasant, thats why i have read it entirely

  535. Click it:

    Howdy! I’m at work surfing around your blog from my new iphone! Just wanted to say I love reading your blog and look forward to all your posts! Keep up the great work!

  536. HostMonster Coupon:

    What’s up friends, its fantastic post on the topic of tutoringand fully explained, keep it up all the time.

  537. HostMonster Coupon:

    I got this site from my pal who shared with me concerning this website and at the moment this time
    I am visiting this site and reading very informative posts at this place.

  538. HostMonster Coupon:

    Very rapidly this website will be famous amid all blogging and site-building visitors, due to
    it’s fastidious articles

  539. HostMonster Coupon:

    whoah this blog is fantastic i love reading your articles.
    Keep up the great work! You know, many persons are looking around for
    this information, you can aid them greatly.

  540. MyHosting Coupon:

    That is a really good tip particularly to those new to the blogosphere.
    Simple but very precise information… Thank you for sharing this one.
    A must read post!

  541. MyHosting Coupon:

    Do you mind if I quote a couple of your articles as
    long as I provide credit and sources back to your website?
    My blog site is in the exact same area of interest as yours and my visitors would really benefit from some of the information you present
    here. Please let me know if this alright with you. Thanks a lot!

  542. International Drivers Permit:

    Hi my personal family member! I must state that this post is wonderful, pleasant created and include approximately all important infos. I have to search additional articles this way .

  543. candy crush secrets review:

    Awesome things here. I’m very happy to look your article. Thanks a lot and I am looking ahead to touch you. Will you kindly drop me a e-mail?

  544. auctions lord review:

    This article will help the internet people for building up
    new webpage or even a blog from start to end.

  545. blast 4 traffic review:

    Great blog! Do you have any suggestions for aspiring writers?
    I’m hoping to start my own site soon but I’m a little lost on everything.
    Would you propose starting with a free platform like WordPress or
    go for a paid option? There are so many choices out there that I’m totally overwhelmed .. Any ideas? Kudos!

  546. InMotion Coupon:

    When someone writes an post he/she keeps the thought of a user in
    his/her mind that how a user can know it. Therefore that’s why this paragraph is perfect. Thanks!

  547. how to reverse phone lookup:

    Wonderful goods from you, man. I’ve take into account your stuff previous to and you are simply extremely wonderful. I really like what you’ve acquired right here, really like what you are stating
    and the way in which by which you are saying it.
    You’re making it enjoyable and you still care for to stay it wise. I cant wait to learn far more from you. That is actually a wonderful website.

  548. NetFirms Coupon:

    I am regular visitor, how are you everybody?

    This piece of writing posted at this site is truly good.

  549. Proxy List:

    Whats up very nice blog!! Guy .. Excellent .. Amazing .. I will bookmark your site and take the feeds additionally?I’m satisfied to find a lot of useful info here in the put up, we’d like work out extra techniques in this regard, thanks for sharing. . . . . .

  550. Godaddy Promo Codes:

    You should be a part of a contest for one of the most useful websites on the internet.

    I am going to highly recommend this website!

  551. Godaddy Promo Codes:

    magnificent points altogether, you just received a new
    reader. What could you recommend about your put up that you made a few days in the past?

    Any certain?

  552. Go Daddy:

    It’s very simple to find out any topic on web as compared to textbooks, as I found this article at this web page.

  553. Godaddy Discount Coupons:

    Terrific article! That is the type of information that are
    meant to be shared around the net. Shame on the seek engines for not positioning this publish upper!
    Come on over and discuss with my website . Thank you =)

  554. YouTube:

    Aw, this was an extremely nice post. Finding the time and actual effort
    to produce a top notch article… but what can I say… I procrastinate a
    lot and never seem to get anything done.

  555. Anonymous:

    I love to share understanding that I’ve built up through the season to assist enhance group overall performance.

  556. how to get a free iphone 4s:

    Hey there! I know this is somewhat off topic but I was wondering if you knew
    where I could find a captcha plugin for my comment form?
    I’m using the same blog platform as yours and I’m having problems
    finding one? Thanks a lot!

  557. Halt Dropping to help Bad Bests and also Earn When in Holdem poker... Solution Texas holdem Tactics You should utilize in order to Master Ones Texas hold'em Rivals Almost every Occasion!:

    I all the time emailed this website post page to all my
    associates, for the reason that if like to read it next
    my contacts will too.

  558. Ipage Websites:

    Today, I went to the beachfront with my children.
    I found a sea shell and gave it to my 4 year
    old daughter and said “You can hear the ocean if you put this to your ear.” She put the shell to her ear and screamed.

    There was a hermit crab inside and it pinched her ear. She
    never wants to go back! LoL I know this is totally off topic but I had to tell someone!

  559. The Egon Egor Egretta Egri Bikaver Egwan Egwin Egypt Egyptiac Egyptian Egyptian calendar Egyptian cat Egyptian clover Egyptian cobra Egyptian cotton Egyptian darkness Egyptian deities Egyptian deity Egyptian demotic Egyptian green Egyptian hieratic Egypti:

    Hello! I simply wish to give a huge thumbs up for the nice information you could
    have right here on this post. I will likely be coming back to your
    weblog for more soon.

  560. how to get a free pad 2:

    Good article. I’m going through some of these issues as well..

  561. jıoj:

    Wireless Hack tool updated working now!!! Click HERE

  562. credit card processors:

    I found the blog and have high interest to continue this blog. I work hard for develop it and I wish I can do it. See the blog and get many useful messages. It is very enjoyable……. I found the blog and have high interest to continue this blog. I work hard for develop it and I wish I can do it. See the blog and get many useful messages. It is very enjoyable…….

  563. Mypcbackup:

    Hello, i read your blog from time to time and i own a similar one and i was just
    curious if you get a lot of spam responses? If so how do you
    protect against it, any plugin or anything you can suggest?
    I get so much lately it’s driving me mad so any help is very much appreciated.

  564. Mypc Backup:

    Pretty! This was a really wonderful article. Many thanks for
    supplying this info.

  565. Mypc Backup Reviews:

    Its like you learn my thoughts! You seem to understand a lot
    approximately this, like you wrote the guide in it or something.

    I think that you just could do with a few p.

    c. to pressure the message house a little bit, but other than that, that is great blog.
    An excellent read. I’ll definitely be back.

  566. homepage:

    Oh my goodness! Incredible article dude! Thank you so much,
    However I am going through troubles with your RSS.
    I don’t understand why I am unable to subscribe to it. Is there anyone else having the same RSS problems? Anybody who knows the solution will you kindly respond? Thanks!!

  567. assent assented assenter assenters assenting assentor assentors assents assert asserted asserter asserters asserting assertion assertions assertive assertiveness assertivenesses assertor assertors asserts asses assess assessed assesses assessing assessmen:

    I like to share understanding that I have built up with the calendar year to help
    enhance group efficiency.

  568. Myhosting Reviews:

    Great blog here! Also your site loads up fast!
    What host are you using? Can I get your affiliate link to
    your host? I wish my web site loaded up as quickly as yours

  569. Website Domains:

    Hi there, I wish for to subscribe for this webpage to get newest updates, therefore where can i do it please

  570. Fat Cow:

    Way cool! Some extremely valid points! I appreciate you writing this article and
    the rest of the site is also really good.

  571. site:

    Hello there! I could have sworn I’ve been to this site before but after browsing through some of the post I realized it’s new to me.
    Anyhow, I’m definitely glad I found it and I’ll be book-marking and checking
    back frequently!

  572. FroKnowsPhoto Review:

    Thank you a lot for sharing this with all folks
    you actually recognise what you’re speaking approximately! Bookmarked. Please additionally consult with my web site =). We may have a link alternate arrangement among us

  573. how to talk to girls:

    What’s up, always i used to check website posts here in the early hours in the break of day, as i like to find out more and more.

  574. Oasis:

    Now, if you could use that brain of yours for good – and not evil! :P

  575. home cash success:

    Hello there! I simply want to offer you a big thumbs up for your
    excellent info you have right here on this post.
    I’ll be returning to your website for more soon.

  576. rsgoldore:

    Good article. I’m going through some of these issues as well..

  577. Itunes gift code generator:

    First off I would like to say great blog! I had a quick question in which I’d like to ask if you don’t mind.

    I was curious to know how you center yourself and clear your
    mind before writing. I’ve had a hard time clearing my mind in getting my ideas out.
    I truly do take pleasure in writing however it just seems
    like the first 10 to 15 minutes are lost just trying to figure out how
    to begin. Any suggestions or tips? Many thanks!

  578. http://whatwedrink.com:

    Nice data, valuable and glorious style, as share great things with sensible concepts and ideas, legion nice data and inspiration, each of that i would like, because of provide such a useful data here.

  579. cube world crack files by hax99:

    Quality posts is the main to interest the people to go to see the web page, that’s what this site is providing.

  580. http://record-calls.com/call-recorder/:

    Although, many telephone watching apps exist within the market these days, you must make sure that you select associate feature made and most reliable watching app that fulfills all of your watching necessities.

  581. research paper help at Qualityresearchpaper:

    This article contains some ordinarily used words of appreciation to assist you … appreciation for everything an individual suggests that to you is totally necessary.

  582. girl games club:

    I do need there are plenty of parents like you around on the interwebs. Not several people ar careful with their words, yet as myself usually. I even have written things i’d wish to take back.

  583. Movers Singapore:

    Great blog you have here.. It’s hard to find good quality writing like yours these days.
    I truly appreciate individuals like you! Take care!!

  584. albert einstein citations:

    It’s hard to find well-informed people for this subject, however,
    you seem like you know what you’re talking
    about! Thanks

  585. Ezekiel:

    The most important and difficult change was giving up wheat and
    many other grains. If erosion is detected, consider developing
    a treatment plan to address it. And that means collecting sufficient rainwater in winter and spring to tide us over the long, hot, dry Greek-Mediterranean summer.

  586. パトリック スニーカー 推薦:

    I am not sure where you are getting your info, but great topic.

    I needs to spend some time learning much more or understanding more.
    Thanks for wonderful info I was looking for this information for my mission.

    Here is my page: パトリック スニーカー 推薦

  587. Wifihack Full:

    Thank you any educational web site. The site in addition could I get that type expertise developed in this ideal manner? I’ve a project i’m simply today working on, and that i have been receiving the particular peek available with regard to such information.

  588. Hack Wifi Passowrd Free:

    We’re a bunch of volunteers plus beginning a new scheme in your neighborhood. Your web site provided us worthwhile information and facts so that you can work with. You have performed an extraordinary process and also the full team are going to be thankful to you.

  589. clash of clans cheat:

    Hello there! This article could not be written much better!
    Reading through this article reminds me of my previous roommate!

    He constantly kept preaching about this. I most certainly
    will send this information to him. Pretty sure he’s going to have a great read.
    Thanks for sharing!

  590. clash of clans hack android download:

    Howdy, Tidy write-up. It comes with an difficulty using your website around internet explorer, could possibly examine the following? Internet explorer nevertheless is the market place director as well as a substantial portion of other individuals leaves out of the fantastic composing due to this difficulty.

  591. latest celebrity news:

    Hi, I do think this is a great blog. I stumbledupon it ;
    ) I may come back yet again since I bookmarked it. Money and freedom is the best
    way to change, may you be rich and continue to guide
    other people.

  592. Shoshana:

    I am curious to find out what blog system you’re utilizing?
    I’m experiencing some small security problems with my latest site and
    I’d like to find something more secure. Do you have any solutions?

    Feel free to visit my site clash of clans hack
    gems (Shoshana)

  593. Thomasine Ghent:

    So sorry you may miss the workshop!

  594. Paleo Diet Plan:

    I’m amazed, I have to admit. Seldom do I come across a blog that’s
    both equally educative and entertaining, and without a doubt, you’ve hit the
    nail on the head. The problem is something not enough people are speaking intelligently about.

    I’m very happy I came across this during my hunt for something relating to this.

  595. 情趣用品:

    Hey! I just want to give a huge thumbs up for the nice information you have got right
    here on this post. I will likely be coming again to your blog for extra soon.

  596. Serena:

    To get the latest updates from Holistic Health Examiner ‘click’ the subscribe button above.
    I didn’t believe it in the beginning, but when the Absolutely free PSN codes worked,
    I was jumping vertical.

    my web blog … gratuit google play gift card code generator – Serena -

  597. league of legends Riot microsoft points 5000:

    league of legends riot sheraton four points langkawi

  598. Minecraft Pocket Edition Blog:

    Extraordinary elements below. My business is very happy to see your article. Thank you with this particular taking a look ahead to consult people. Do you want to kindly lower me a e-mail?

  599. coupons:

    What’s up friends, how is all, and what you desire to say about this piece of writing, in
    my view its truly awesome in support of me.

  600. http://www.heijack.de/:

    I all the time used to study paragraph in news papers but now as I am a user of internet therefore from now I am using net for
    articles, thanks to web.

  601. Świat biologii sprawdzian Do pobrania:

    Świat biologii sprawdzian Do pobrania

  602. ganhar dinheiro na internet:

    Thank you for the good writeup. It if truth be told was once a leisure account it.

    Look complex to more added agreeable from you! By the way,
    how can we keep in touch?

  603. http://Www.Youtube.com/:

    Hi to every body, it’s my first go to see of this webpage; this web site
    carries remarkable and really excellent stuff
    in support of visitors.

  604. health:

    Hello I am so excited I found your webpage, I really found you by accident, while I was searching on Digg for something
    else, Anyways I am here now and would just like to say cheers for a remarkable post and a all round entertaining blog (I also love the theme/design), I don’t
    have time to look over it all at the moment but
    I have bookmarked it and also added your RSS feeds, so
    when I have time I will be back to read more, Please do
    keep up the superb work.

  605. Discover More:

    I loved as much as you’ll receive carried out right here.
    The sketch is tasteful, your authored subject matter stylish.
    nonetheless, you command get got an edginess over that you wish be delivering the
    following. unwell unquestionably come more formerly again since exactly the same
    nearly a lot often inside case you shield this hike.

  606. Click That Link:

    You need to be a part of a contest for one of
    the best websites on the net. I will highly recommend this website!

  607. Discover More Here:

    Pretty great post. I just stumbled upon your blog and wanted to say that I’ve truly
    enjoyed browsing your blog posts. In any case I
    will be subscribing on your feed and I’m hoping you write again very soon!

  608. Vitralii:

    You actually make it appear really easy along with your presentation however I find this matter to be really one thing which I think I’d never understand. It sort of feels too complicated and very extensive for me. I’m taking a look ahead for your subsequent submit, I will try to get the hang of it!

  609. yebhi coupons:

    Coupons Online Unlimited Purchase on your Next Door for branded foot wears and other lifestyle categories.

    In lifestyle category Big Shoe Bazaar India Pvt Ltd.
    is the fastest and largest growing company in India.
    It offers the sale of multi branded footwear online by bigshoebazaar.com which
    is now termed as Yebhi.com. Now Yebhi.com is
    becoming a fastest, largest and trustworthy online store in
    the multi lifestyle category in India. This is a site where
    anyone can trust and shop online easily. After tremendous success in footwear category we are now expanding us into other categories also like Apparels, Bags, Jewelry, Accessories, Mobiles
    and many more.www.bigshoebazaar.com deals with the multi
    branded footwear franchises retail stores where as the Yebhi.com
    deals with multi category lifestyle franchise. Yebhi provides you the real touch and feel of
    the product. We also offer international brands in local and affordable rates.
    We provide 25% off on all our products like mobiles, gifts, home appliances, valentine’s cards and toys.

    We also provide direct authorized agents for brands online such as Woodland, Adidas, Puma,
    Liberty, Bata and many more. Here are the Yebhi Offers,
    Yebhi Deal and Yebhi Discounted Products or you can use Yebhi
    Coupons, Yebhi Voucher, Yebhi Coupon Code, Yebhi Discount Coupons for more savings.

  610. https://www.facebook.com/pages/Simpsons-Tapped-Out-Cheats-Hack/734560853239004:

    Having read this I thought it was very informative.
    I appreciate you spending some time and energy to put this informative article together.

    I once again find myself personally spending way too much time both reading and leaving
    comments. But so what, it was still worthwhile!

  611. Work From Home With ME, Karatbars, Karatbars International, Goldkaratbars:

    Many thanks every other wonderful posting. Exactly where altogether different might any individual wardrobe variety of details in this an excellent way with creating? I’ve a speech future few days, with this particular about the find such information.

  612. https://www.youtube.com/watch?v=fMkSBg05aaQ:

    The main reason the Sunn appears yellow from Earth is
    due to atmospheric scattering. ” And then try to catch up with you trying get your number. You can visit their website with an intention to purchase quality medical equipment of your choice.

  613. รับซื้อกระเพาะปลาเก่า:

    Hi to every body, it’s my first pay a visit of this website; this weblog includes remarkable and in fact excellent data in support of visitors.

  614. Elsword Hack:

    If you desire to improve your know-how only keep visiting this site and
    be updated with the most up-to-date gossip posted here.

    Also visit my blog … Elsword Hack

  615. Rochelle:

    The interviewer relaxes a next to nothing and people may easily get
    together with their colleagues past of the location for
    a speak and a chance to get returning to know each other
    better. B-TEN believed that the aforementioned pocket monsters were acquired through illegitimate methods, such as
    hacking and using exploits, in the previous installments of the series.
    Lightweight is really good, but may not overweigh ghost.

  616. http://www.lovefringe.com/forum/memberflfktggcch/1350:

    I’m not that much of a internet reader to be honest but your blogs really
    nice, keep it up! I’ll go ahead and bookmark your website to come back later on.

  617. cam free xxx:

    Hello, I want to subscribe for this website to obtain latest updates, therefore
    where can i do it please help out.

  618. Ardis:

    Hi there, I check your new stuff on a regular basis.

    Your story-telling style is awesome, keep up
    the good work!

  619. cv library:

    Add an attention-grabbing cover letter in order to get noticed.
    We realise that spending money having your CV professionally written may seem like an unnecessary expense but the savvy candidates realise that
    it is an important investment. One of the main reasons to have a short CV was to stand out from the crowd, but
    almost everybody follows this model and it
    no longer has the same impact as it used to.

  620. Her Telecharger:

    Today, I went to the beachfront with my children. I found a sea shell and gave it to my 4 year
    old daughter and said “You can hear the ocean if you put this to your ear.”
    She put the shell to her ear and screamed. There was a hermit crab
    inside and it pinched her ear. She never wants to go back!
    LoL I know this is completely off topic but I had to
    tell someone!

    Feel free to visit my website – Her Telecharger

  621. what is an iva:

    Good information. Lucky me I found your website by chance (stumbleupon).
    I’ve book-marked it for later!

  622. Anneliese:

    This post is truly a nice one it helps new web viewers, who are
    wishing in favor of blogging.

  623. cracksndhacks.com:

    hi! , I like a person’s creating really a whole lot! ratio we all connect a little more about ones write-up about America online? I need an authority in this subject to resolve my personal dilemma. Might be that is you actually! Having a look onward to peer you.

  624. http://www.youtube.com/watch?v=M0kFoJqA-hc:

    Any psn card generator utilizes New laptop, Samsung & IBM-designed cellular micro-processor becasue it is
    Cpu derived from 3 or more. Youll simply need a valid email address contact information, and a
    steady in addition to reliable internet connection to accomplish the
    entire registration process and fill-up the particular survey.
    You can pre-order the product from Amazon in
    the following link: ‘WWE 2K14′.

  625. golivejasmin.com:

    I am no longer certain where you are getting your information,
    however good topic. I must spend some time studying more or figuring out more.
    Thank you for great information I used to be in search of this info for
    my mission.

    Feel free to visit my homepage … golivejasmin.com

  626. How To Get Free Psn Code:

    Its like you read my mind! You seem to know so much about this, like you
    wrote the book in it or something. I think that
    you could do with some pics to drive the message home a bit, but other than that, this is
    fantastic blog. A great read. I’ll definitely be back.

    my blog post – How To Get Free Psn Code

  627. إشتريها هنا:

    إتفرج وسجل بميدالية السيارة. توجد موديلات مختلفة

  628. http://Www.familyvacationcritic.com:

    A few years ago, one of our local residents, Mac Vorce,
    who is also a bicycle enthusiast petitioned for the development of bicycle paths and trails.

    It is an industry norm that you offer a hotel room for the comedian at the same time.
    Wouldn’t it be nice if we could take a magic pill
    and have a perfect relationship.

  629. www.robertsetiadi.net:

    It doesn’t matter if you’re trying to save your relationship after cheating, stop a divorce, or you just want to get your ex
    back. But you can’t just stand there grinning like an idiot until they finish laughing.
    Whether these are taken live – while you are doing a real gig – or whether you have them done on
    a false stage, will depend on you.

  630. Marisa:

    It doesn’t matter if you’re trying to save your relationship after cheating, stop a divorce, or you just want to get your ex
    back. For more information on my Workshops, Writing Mastermind Groups and private coaching, please go to my website listed
    below and feel free to call me any time. Do some research and
    find out as much as you can about each open mic – try to find the one that is most positively reviewed,
    gets the biggest crowd and that is attended by
    the most comedians.

  631. Charlie Countryman 2014 Telecharger:

    I really like what you guys tend to be up too. Such clever work and coverage!
    Keep up the wonderful works guys I’ve incorporated you guys to my blogroll.

    Here is my website: Charlie Countryman 2014 Telecharger

  632. be a life coach:

    Having read this I believed it was extremely informative.
    I appreciate you spending some time and effort to put this
    informative article together. I once again find myself personally spending a lot of time both reading
    and leaving comments. But so what, it was still worth it!

  633. jayaraj:

    hello everyone i am in astudent in harbin medical university in china.i need a net connection for my studies.but still i had no connection in my roam.but my
    neighber he have a wap 2 connection.how to hack his wifi password plz send email for my id jjayaraj66@gmail.com.thank you guys

  634. shoppin-gogo.info:

    Your mode of telling the whole thinɡ in this ɑrticle is in fact fastidious, every one be capable of without Ԁifficulty knoԝ it, Tɦankѕ
    a lot.

  635. tapped out cheats:

    I’m not sure why but this blog is loading very slow for me.
    Is anyone else having this issue or is it a issue on my end?

    I’ll check back later on and see if the problem
    still exists.

  636. monster legends hack gems no download:

    Usually I do not learn post on blogs, however I wish to say that this write-up very pressured
    me to check out and do so! Your writing taste has been amazed
    me. Thanks, very nice article.

  637. Sam:

    Do you need a hacker? Contact samhart095@gmail.com

  638. Chad:

    I’m really enbjoying thee design aand layolut off yoiur website.
    It’s a vvery eas on the eyes which makles it much more enjoyable foor mee
    to come hre annd visitt mote often. Diid yyou hire out a deeloper to create yokur theme?
    Supeb work!

    my weeb ite 1.0 (Chad)

Leave a Reply:

Recent stories

Featured stories

RSS Windows news

RSS Mac news

RSS iPad news

RSS iPhone & Touch

RSS Mobile technology news

RSS Tablet computer news

RSS Buying guides

RSS PS3/Wii/Xbox 360

RSS Green technology

RSS Photography

Featured Content


Copyright © 2014 Blorge.com NS