Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Goodbye to the security queues. Discover how to register your backpack without touching it using any WiFi network

      Recommended Posts

       

      If you are tired of queuing at security checkpoints at airports, stations or museums you are in luck. A team of researchers has found the definitive method to snoop on your bags without even having to touch you. It is cheap, accurate and works on wifi. 

      The method is so good that it has already been awarded the first prize at the recent IEEE Conference on Telecommunications and Network Security held this year in Beijing. In fact it is so simple that it is hard to believe that it has not occurred to anyone before.

      The signal of WiFi networks bounces off objects of a certain density, but crosses the finest and lightest cleanly. Researchers have discovered that the waves of WiFi networks penetrate perfectly in bags, suitcases and backpacks. Analyzing the way they bounce off the objects inside these containers, the authors of the study have been able to determine if the backpack has metal objects or liquids.

      The tests have been made with 15 different objects in six different types of bags, suitcases and backpacks. In plastic bags, the accuracy with which suspicious objects are detected as electronic or explosive devices is 99%. Metal objects are identified by 98%, and liquids by 95%. This effectiveness is reduced to 90% in suitcases or if the object is wrapped in several layers of materials that hinder the passage of waves. All in all, it remains a more than applicable precision in a real environment.

      The authors of the study explain that their technique does not completely replace safety records, but minimizes them because it allows them to direct people carrying suspicious objects to the safety line and let the rest pass with the assurance that they do not carry anything dangerous . The technique only involves installing three additional WiFi antennas and works on any existing network. It is cheap and can detect explosives, weapons, bulky metal objects and even acids or drugs. The next step is to adjust the system to determine the exact shape of the object and the amount of liquid.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. WoWonder is a PHP Social Network Script, WoWonder is the best way to start your own social network website! WoWonder is fast, secured, and it will be regularly updated.
          Demo:

          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. The Most Complete Visitor Analytics & SEO package including visitor analytics (unique visitor, page view, bounce rate, average stay time, average visit, traffic analysis, top refferer, new & returning visitor, content overview, country & browser report, os & device report etc.) , web analytics (alexa data, whois data, social media data, moz check, search engine index, google page rank, IP analysis, malware check ) , SEO tools (link analysis, keyword position analysis, auto keyword suggestion,page status check etc.)
          Demo:

          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          Using Encryption Via SSL 
          ━━━━━━━━━━━━━
          Most legitimate websites use what is called “secure sockets layer” (SSL), which is a form of encrypting data when it is being sent to and from a website. This keeps attackers from accessing that data while it is in transit.

          Look for the padlock icon in the URL bar, and the “s” in the “https://” to make sure you are conducting secure, encrypted transactions online.

          It’s a good idea to access sites using SSL when:

          You store or send sensitive data online. If you use the internet to carry out tasks such as filing your taxes, making purchases, renewing your driver’s license, or conducting any other personal business, visiting sites using SSL is a good idea.

          Your work requires it. Your workplace may have encryption protocols, or it may be subject to regulations that require encryption. In these cases, encryption is a must.
        • By dEEpEst
          INE - OSCP Security Technology Course

          :m: This course provides a foundation in advanced penetration testing that will prepare students for the Penetration Testing with Kali Linux (PWK) course offered by Offensive Security. The course will also prepare students for the Offensive Security Certified Professional (OSCP) exam, which typically proceeds the PWK course. Students should be familiar with Linux command line, common networking terminology, and basic Bash/Python scripting prior to attempting this course.


          Download:
          Hidden Content
          Give reaction to this post to see the hidden content.