Find Any prior WiFi connection Password on your Windows computer
This doesn’t let you go driving around with a laptop, breaking into password encrypted WiFi routers. Not that you need to as in most places. Your computer could pick up an unlocked router or 20 without a problem.
This allows you to find ANY password that belongs to a router your PC/Laptop has been connected to in the past. So having (CRS) myself im willing to help others with the affliction.
OK now let’s do it.
This will find out all the WiFi routers such as friends routers and stuff like Chromecast that you have forgotten the password(s) to.
Open your command prompt as administrator otherwise this may not work.
(Accessories folder right click command prompt and run as administrator)
Once you have your command prompt up let’s find out what WiFi spots your
PC has connected to in the past.
Type the following into the command prompt: “netsh wlan show profiles”
This will list all the router connections from the PC you are on.
For this example i listed one connection to make it easy to understand.
Now we have a list, well sort of lol. Find the connection in question on the list.
The only one listed is “TG862G92”.
Now type in “netsh wlan show profile TG862G92 key=clear” in the cmd prompt.
Note: key=clear removes the masking (**********) from the password
This will give you detailed info, whether it connects automatically, authentication mode e.g WPA2 and other details like whether you are over the data limit
set by your provider etc.
Lets find the password for the connection “TG862G92”
As you can see from the above section the password for this router is “TG862GA2A792”.
Voila all done you have your password.
Open the WiFi section on your PC and connect by adding the key. If it doesn’t connect you have a problem. LOL
(most likely the router password was changed since your last logon)
Back in the day I used to be a so called “Hacker” i so take great offense to the word. Hacker’s create and do the so called impossible basically created all your devices at hand!, Where a “Cracker” destroys and steals etc etc.. The “Cracker” is the one that steals grannys social security checks and your identity Online! Not the “Hacker”. Got it? Good. Ok i’m over that now let’s continue.
Most people don’t put a lot of thought into their password. It’s usually easiest just to toss up a short, easy-to-remember one, or even just to use the same password for every account. After all, the average person probably won’t be able to guess your password.
However, Crackers often use password-cracking software that can keep testing different passwords until they find the correct one, and they can easily crack weak passwords. By creating strong passwords, you can greatly reduce the chance that your personal or financial information will be stolen. Notice it’s called password-CRACKER point made huh lol.
Many people make passwords based on their spouse’s names, a hobby, or a simple pattern because these types of passwords are easy to remember. Unfortunately, they are also easy for crackers to guess. To create a strong password, you will need to avoid these types of common mistakes.
No birthdays.pet,wife,hubby,bf.gf,kids etc name. I can spend ten minutes on most FB pages and guess your password quickly. Because you POSTED IT! “Oh dear” Did i scare you? GOOD! Anything that is part of your life in this way should not be part of any password anywhere!. Ok thats clear let’s move on again..
Never use personal information such as your name, birthday, or spouse’s name. Personal information is often publicly available, which makes it easier for someone to guess your password.
Use a longer password. Your password should be at least six characters long, and for extra security it should ideally be at least 12 characters if the site allows it.
If you need to write down your passwords, keep them in a secure place. It’s even better if you encrypt your passwords, or write down hints for them that others won’t be able to understand.
Don’t use the same password for each account. If someone discovers your password for one account, all of your other accounts will be vulnerable.
Try to include numbers, symbols, and both uppercase and lowercase letters if the site allows it.
Avoid using words that can be found in the dictionary. For example, swimming1 would be a weak password.
You can test you current password here for a rough idea.
Or click the link and use the more advanced version below that includes a password generator too!
Random passwords are the strongest. Use Our Password Generator instead of trying to think of your own.
Random passwords are more difficult to remember, so create a mnemonic device. For example, J=jNp2# can be remembered as Jelly = jam NOT preserves 2 #. This may still seem random, but with a bit of practice it becomes relatively easy to memorize. You can also choose a sentence you know you’ll remember and then use the first letter of each word in the sentence, plus a few symbols or numbers, as your password.
Instead of writing your passwords on paper where others can easily see them, you can use a password manager to encrypt and store them online. Some password managers can also generate random passwords, making your information even more secure. Examples of password managers include LastPass, KeePass (My Choice), Firefox’s password manager, and Google Chrome’s password manager.
For example, when using LastPass, you will first need to install the LastPass browser plugin. Whenever you type a password on a website, the browser plugin will ask you whether you want to save it. The next time you go to the website, LastPass can automatically enter the password for you. If someone else wants to use your computer, you can simply log out of LastPass to prevent the other person from accessing your information.
Don’t rush your children into social media. Obey the guideline of keeping children under 13 off social media. Once your children have an online profile, they can be tagged in photos, which magnifies their online presence. If you’re going to upload photos of them, don’t identify them and don’t tag them. This way the photo can’t be traced back to them.
Myth: Parental controls are the best way to monitor my childs online activities.
Truth: Focusing on only one Internet safety method lulls you into a false sense of security. Keep your child safe online and to raise them to be responsible, respectful digital citizens. But it takes more than installing parental controls.
For starters, parental controls can be defeated by determined even PC novice child. Plus they also often catch too much in their filters, rendering any Internet reasonable search useless. To top all this off they often set up a “parent vs. child” dynamic that could and probably will backfire.
But by all means, use parental controls to help prevent exposure to age-inappropriate material and to manage time limits.
But don’t think parental controls get you off the hook and your done any any means. Continue to discuss responsible, respectful online behavior, set rules and consequences for misbehavior, and teach your child to manage his or her own usage without overdoing it.
This will in the long run be best and safest for you and you child.
Other things you can teach you child and do for yourself for safety on your PC are.
Use privacy settings. Make sure your privacy settings are set so only the closest people in your network can view your posts.
Limit your audience. Only share posts with close family and friends. Or use photo-sharing sites such as Picasa and Flickr that require a log-in to see pics.
Avoid installing unnecessary applications for your current desktop tasks, such as: background servers, file sharing software or remote control applications (especially as most users forget they have these applications started in the background). These programs are potential hazards and should not be installed unless absolutely necessary.
Use a reliable firewall solution. Use a firewall that can control the Internet traffic in both directions (what comes and goes from your computer).
Update your applications as often as possible. Operating systems may become vulnerable to threats for which the vendor has already found the solution.
Do not open e-mails coming from unknown senders, many viruses spread via e-mail, so ask for a confirmation from the sender if you are in doubt.
Avoid opening email attachment files with the extension .bat, .pif, .com, .vbs, .vba, .scr, .hlp, .hta, .lnk, .url, .cmd, because these types of files are usually 100% malware.
Do not open attachments of messages with a suspicious or unexpected subject, but if you want to open them, first save them to your hard disk and scan them with an updated antivirus program.Do not forward unknown emails and do not reply to their sender. These types of messages are considered spam, because they are not desired and asked for.
Banks and serious institutions will not require personal information by email. Do not pay attention to such messages, are counterfeit and fraudulent. Any message related to earnings, cash request and donations are 100% phishing attacks.
When you click a link, make a habit to look at the addressbar, see if the domain name has the same name as the institution which you expect or know, eg for Microsoft page you can find the domain microsoft.com or http://www…….microsoft.com/…… but NOT www.microsoft…….com, etc. Any domain name which looks like the example above, it is 100% a pharming attack.
Credit card sites, banking sites and online stores should have a lock on their websites that shows they are encrypted, this is shown in the address bar after the page loads.
Do not post personal email addresses on the Internet, most of email addresses posted on websites are used by spammers to send unsolicited emails.
Do not copy any file unless you know the source.
Protect yourself from logic bombs by creating backup files of important personal documents, like MSOffice or Adobe documents, pictures, correspondence etc. Do this regularly. Store these backups on removable media such as CDs, DVDs because they are Read-Only.
Most times, malware like viruses, trojans, rootkits or hidden remote admin programs, are injected through exploits from websites containing illegal material, such as pirated software which mimics real commercial applications, or websites containing pornographic materials.
Stick with software recommended by legitimate download sites.
Don’t assume that files from people you know are safe!
Total Security Antivirus software is must-have protection. Keep it enabled and updated at all times.
I will post more rantings about the net later on thanks,