Affiliate Networking Search Results

News: Are You on Virgin Mobile? Your Next Phone Will Have to Be an iPhone

Virgin Wireless, perhaps best known for Sir Richard Branson and all of his antics, is an affordable cellular option here in the US. Virgin customers can enjoy — if that's the right word for it — Sprint's cellular service, at a discounted rate, however, there are usually some compromises for that. Now, there will be yet another compromise for Virgin customers who don't like iPhones — Virgin will now only carry Apple's phone on their network.

How To: Buy Used Phones Without Getting Screwed

I've seen my fair share of heartbreaks when it comes to used phones. As a repair tech, I often had to try and help out customers who bought used handsets which turned out to be useless, either because it was stolen or not working on their carrier's network. More often than not, there was very little I could do. To help you from being stuck in the same situation, here are some tips to prevent you from getting scammed out of your hard earned money when buying a used handset.

How To: Learn How Elliot from Mr. Robot Hacked into His Therapist's New Boyfriend's Email & Bank Accounts (Using Metasploit)

Social engineering is a pretty important item in a hacker's toolkit. In Mr robot there was a time, we saw Elliot using social engineering to gain access to his therapist's boyfriend's email and bank accounts by calling him and pretending to be someone from his bank, then Elliot asked him for some info that were really useful to gain access to his account, the target believed to be someone from the bank and gave him the info Elliot was looking for. But How Is It in the Real World?

How To: Do a Simple NMAP Scan on Armatige

How to do an NMAP scan on Armitage to find IPs within a certain range. Armitage is a gui interface of Metasploit, and advanced hacking/exploiting program. It can be downloaded from http://metasploit.com/ and http://fastandeasyhacking.com/ and you will need NMAP. http://www.nmap.org/

How To: Bypass T-Mobile's Tethering Limit for Free

T-Mobile's "Uncarrier" initiative has done wonders for my wallet and my data usage. Before I had to deal with being throttled down to 2G speeds after passing my data limit, but thanks to their unlimited data plans, I'm free to use as much LTE data as I possibly can. The only downside is, when sharing data through a mobile hotspot (tethering), T-Mobile imposes a 5 GB limit (which was recently upped to 7 GB for some).

How To: Crack WPA/WPA2 with Wifite

Hi there again, aspiring hackers (and veterans as well)! I'm going to explain how to perform a dictionary attack on a WPA/WPA2 protected network with Wifite. Please note that this doesn't work with WPA Enterprise For that end, you'd have to use an Evil Twin to get the "Enterprise" auth attempt, and then crack it.

Hack Like a Pro: How to Hack into Your Suspicious, Creepy Neighbor's Computer & Spy on Him

Welcome back, my neophyte hackers! Have you ever had a neighbor that you're certain is up to no good? Maybe you've seen him moving packages in and out at all hours of the night? Maybe you've seen people go into his home and never come out? He seems like a creep and sometimes you hear strange sounds coming from his home? You know he's up to no good, but you aren't sure what it is exactly.

How to Hack Databases: Hunting for Microsoft's SQL Server

Welcome back, my fledgling hackers! The database is the hacker's "pot-of-gold," as it contains information that is very valuable to both the business and the hacker. In this, the second of my series on hacking databases, we're on the "hunt" for Microsoft's SQL Server. Although far from the most commonly used database (Oracle hold's that title), Microsoft's SQL Server is very often found in small-to-medium sized businesses. Even a few big businesses use it.

Hack Like a Pro: How to Perform Stealthy Reconnaissance on a Protected Network

Welcome back, my fledgling hackers! One of the first issues any hacker has to address is reconnaissance. Before we even begin to hack, we need to know quite a bit about the target systems. We should know their IP address, what ports are open, what services are running, and what operating system the target is using. Only after gathering this information can we begin to plan our attack. Most hackers spend far more time doing reconnaissance than exploiting.

How To: See Who Has Viewed Your LinkedIn Profile Without Paying

When LinkedIn first arrived on the scene, I thought it was a great resource for staying connected and getting in touch with those people in your desired career path. Keyword: Thought. Like most businesses, money and shareholders seem to have taken over the driver's seat, pushing the company towards a business-first, users-second approach.

How To: Tether your iPhone to a Playstion 3, Xbox or other Internet-capable device

You will need a jailbroken iPhone to make this work (won't work for iPod Touches, sorry). When you get the MyWi app from Cydia, you can turn your iPhone into a mobile hotspot using the 3G network. You can even set up your new hotspot to have a password and protect it. This connection will be a little slow, and is dependent on your reception as well. But now you can take an Internet connection with you wherever you and your iPhone go!

How To: Use EyeTV to stream live TV on your iPhone

In this video we learn how to use EyeTV to stream live TV on your iPhone. This will allow you to watch TV on your Mac and your iPhone as well as on a 3G network for free. To get started, plug one end of the EyeTV into the USB plug and then into the jack on the hybrid with a cable line. Now, download the most recent version of the software from the update menu. Then, go to preferences and select iPhone. After this, make sure all the buttons are selected, then exit out. Now go to your iPhone an...

How To: Insert images with links into your signature on Gmail

If you're getting bored of the same old same old in your e-mail messages, or if you're looking for an easier way to show off each of your social networking, as well as personal websites, then you will be happy to hear that Gmail has finally introduced rich text signature lines that'll allow you to hyper-link your images in your signature via HTML. All this can be found in the Labs section of your settings in Gmail. In this video you will learn how to set up the signature with the images and h...

How To: Make BBQ chicken pizza with apple with Sandra Lee

According to domestic goddess supreme Martha Stewart, you should always eat fresh, and even grow your own vegetables and herbs in your backyard if you can. But for those of us who are urbanites and don't have as much as a square foot of balcony space, it's not always possible to eat as fresh as we want.

How To: Make a zesty grilled zucchini ribbon salad

Grilled Zucchini Ribbon Salad-Food Network Grilling vegetable is by far one of the healthiest ways to eat them. Grilling certainly beats throwing them in a vat of lard (we're looking at you, Paula Deen) or chucking them in a bread batter to make zucchini tempura (yummy, but not so good for your six pack).

How To: Make frittatas from leftovers with Giada De Laurentiis

Frittatas are a delicious and healthy meal. They include almost all of your food groups and are packed with fiber. The basic concept behind frittatas are that you can throw whatever leftovers you have into a bowl with eggs and create a unique version every day! In this recipe, Giada De Laurentiis from the Food Network shows you how to make a lighter version with egg whites so that you can avoid some of those calories and cholesterol. Enjoy!

How To: Make fresh spicy salsa in less than five minutes

In this clip, learn how to make a perfectly fresh tomato salsa with Ellie Krieger from the Food Network. Ellie walks you through the process of pulling together this spicy sauce in less than five minutes. All you need are your veggies and a blender and you're on your way. So, when you have friends coming over and you've forgotten the dip - no need to worry, whip this up and you'll have snacks on the table before anyone even notices you were gone.

How To: Use noodle-based compositing in Blender

Conceptually, what is node-based compositing and what do nodes do? This clip uses the factory analogy to convey the concept. Blender can process video, images, sequences, and families of images in a directory. Then you'll fire up Blender and talk about threading nodes and how images are duplicated and routed through the compositing network ("noodle"), how threads are created between sockets. Creating threads, cut threads. The clip also points out common threading errors and misrouting threads...