Affiliate Networking Search Results

How To: See Passwords for All the Wi-Fi Networks You've Connected Your iPhone To

Your iPhone goes with you pretty much everywhere you go, and unless you have unlimited data on your cellular plan, you've probably connected to dozens of Wi-Fi hotspots over the years. Wi-Fi passwords are saved to your iPhone so you can auto-connect to the router or personal hotspot again, but finding the plain text password for a network hasn't always been easy.

News: Take Advantage of These Free Movie & TV Deals Before It's Too Late

It's not so difficult to stay at home during the coronavirus lockdown when there's so much free entertainment to take advantage of. That seems to be the M.O. for many studios and streaming services, as they've made so many shows and movies available to the public for free. That said, they aren't running charities here. These deals won't last forever, so make sure to jump on board before it's too late.

How To: Detect & Classify Wi-Fi Jamming Packets with the NodeMCU

The most common Wi-Fi jamming attacks leverage deauthentication and disassociation packets to attack networks. This allows a low-cost ESP8266-based device programmed in Arduino to detect and classify Wi-Fi denial-of-service attacks by lighting a different color LED for each type of packet. The pattern of these colors can also allow us to fingerprint the tool being used to attack the network.

How To: Turn Any Phone into a Hacking Super Weapon with the Sonic

The Watch Dogs video game series came out in 2014, enamoring audiences with the idea of a seemingly magical smartphone that could change traffic signals, hack web cameras, and even remotely control forklifts. This may sound like science fiction, but The Sonic uses a customized flavor of Kali Linux to allow you to unleash the power of Kali from any smartphone — all without the need to create a hotspot to control it.

How To: Turn Your Raspberry Pi into a Wireless Hotspot

When hacking into a network during a penetration test, it can sometimes be useful to create your own wireless AP simply by plugging a Pi into an available Ethernet port. With this setup, you have your own backdoor wireless connection to the network in a matter of seconds. Creating an AP is also helpful while traveling, or needing to share a connection with a group of people.

How To: Fully Anonymize Kali with Tor, Whonix & PIA VPN

Hacking from a host machine without any form of proxying is reckless for a hacker, and in a penetration test, could lead to an important IP address becoming quickly blacklisted by the target. By routing all traffic over Tor and reducing the threat of malicious entrance and exit nodes with a VPN, we can configure Kali to become thoroughly private and anonymous.

How To: Prepare Your Phone for a Trip Abroad with These Tips

So you're finally ready to head out on that big trip you've been planning for months, huh? It's an exciting time, but there are plenty of things you'll need to prepare before you head out. For instance, it's hard to imagine life without a smartphone these days, and with useful traveling apps like Google Translate and maps, you'll almost have to make sure that you have a working smartphone when you arrive at your destination.

Hack Like a Pro: How to Scan for Vulnerabilities with Nessus

Welcome back, my tenderfoot hackers! Generally, you will want to perform a vulnerability scan before doing a penetration test. Vulnerability scanners contain a database of all known vulnerabilities and will scan your machine or network to see whether those vulnerabilities appear to exist. If they do, it is your job to test whether they are real and can be exploited.

Hack Like a Pro: How to Use Maltego to Do Network Reconnaissance

Welcome back, my greenhorn hackers! Before we attempt to exploit any target, it is wise to do proper reconnaissance. Without doing reconnaissance, you will likely be wasting your time and energy as well as risking your freedom. In previous guides, I have demonstrated multiple ways to perform reconnaissance including passive recon with Netcraft, active recon with Nmap or hping3, recon by exploiting DNS or SNMP, and many others.

News: Leaked Image Suggests the Sony Xperia Z2 May Be Headed to Verizon

The international hit Xperia Z2 may be headed to Verizon if a posted, and quickly erased, image is any indication. Take this information with a grain of salt—I certainly am—but this could be Sony's entrance into the non-GSM realm. The image above was posted to Sony's Xperia Google+ page, and very quickly removed. Compared to the Z2 that's currently on the international market (below), we can see that not only has the Sony logo shifted to the bottom, but a Verizon logo rests squarely along the...

How To: Find & Eradicate Android Apps Maliciously Tracking You on Your Samsung Galaxy Note 2

A wave of shock and anger swept across the country after Edward Snowden released private documents recounting the U.S. government's secretive mass surveillance programs. Although some of the fear was unwarranted (they don't read your emails or listen to your calls), many scrambled to find privacy of new heights for protection from the all-watchful eye. While the government may not be tracking you down, there are a myriad of other candidates that fill that Big Brother role—and I'm not talking ...

How To: Make flourless coconut macaroons

In this video, Food Network's Ina Garten shows you how to make flourless coconut macaroons. First, you need one bag of shredded coconut emptied into a large bowl. Next, pour a 14 ounce can of sweetened condensed milk over the shredded coconut. Then add a teaspoon of vanilla extract to the bowl. Fold the ingredients together with a spoon until they are well mixed. The next thing you need is some whipped egg whites. To do this, you will need about 3 egg whites separated from the yolks. Pour the...

How To: Speed up your Internet connection

This video takes us through a process of speeding up our internet connection using OpenDNS.com. Open the webpage and go to solutions and click on the icon open the DNS page and it lists computer or router, she selects computer and list of operating system is listed, she selects vista. She goes to start and selects control panel, click on view network status and connection, in that select view status and then click on properties and on the networking page, go to internet protocol version 4 and...

How To: Make a tutu out of an old petticoat

Running out of costume ideas for your next Halloween? How about a tutu-clad ballerina, french maid, pirate or fairy? Or if you're brave enough, why not wear a tutu to the supermarket? ThreadBanger shows us how to make a tutu out of an old petticoat, some tool, and ribbon... This project takes a while to complete, but once done, you'll be the bell of the Halloween ball! And isn't that worth any amount of sewing?

How To: Make a duffel bag out of old umbrellas

ThreadBanger pays homage to the movie "Fame" by showing us how to make the perfect "80's-tastic" duffel bag out of old umbrellas. With this thrifty idea, you will need a few umbrellas (broken is fine), scissors, a square pattern, a sewing machine, a zipper, and anything handy that will work as a strap. Use your new custom duffel bag to carry all your leotards or dance shoes in, or make a statement on your way to the video store to rent "FAME!"

How To: Make a wine rack from scrap wood & old belts

ThreadBanger's Decor It Yourself show us how to "do it yourself" when making a wine rack using just scrap wood and old belts. At a great size, it's easy to store and great to give as a gift. Looking to fill that wine rack and don't know where to begin? In the later half of this video, the gals from ThreadBanger take us wine tasting and give advice for your next wine shopping excursion.