Applicable Type Search Results

Hack Like a Pro: How to Use Metasploit's Psexec to Hack Without Leaving Evidence

Welcome back, my fledgling hackers! It's been awhile since we did a Metasploit tutorial, and several of you have pleaded with me for more. I couldn't be happier to oblige, as it's my favorite tool. For the next several weeks, I'll intersperse some new guides that'll help expand your Metasploit skills and keep you abreast of new developments in Metasploit, so look for them in the near future.

How to Hack Databases: Hunting for Microsoft's SQL Server

Welcome back, my fledgling hackers! The database is the hacker's "pot-of-gold," as it contains information that is very valuable to both the business and the hacker. In this, the second of my series on hacking databases, we're on the "hunt" for Microsoft's SQL Server. Although far from the most commonly used database (Oracle hold's that title), Microsoft's SQL Server is very often found in small-to-medium sized businesses. Even a few big businesses use it.

How To: What Every HTC One Owner Should Know About the UltraPixel Camera to Never Miss a Shot

Most smartphone manufacturers focus on megapixels when it comes to cameras, but HTC took a different direction with the HTC One. Instead of trying to compete with the 13MP camera on the Samsung Galaxy S4, or the 20MP camera on the Sony Xperia Z1, or even the newer iPhone's 8MP, they decided on a simple 4MP camera. At first, you might think that 4MP is terrible, but not so fast. There are many advantages to your HTC One's camera that other phones just don't have.

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 10 (Manipulating Text)

Welcome back, my aspiring hackers! As mentioned several times in previous Linux tutorials, nearly everything in Linux is a file, and very often they are text files. For instance, all of the configuration files in Linux are text files. To reconfigure an application in Linux, we simply need to open the configuration file, change the text file, re-save, and then restart the application and our reconfiguration is applied.

How to Hack Wi-Fi: Cracking WPA2-PSK Passwords with Cowpatty

Welcome, my hacker novitiates! As part of my series on hacking Wi-Fi, I want to demonstrate another excellent piece of hacking software for cracking WPA2-PSK passwords. In my last post, we cracked WPA2 using aircrack-ng. In this tutorial, we'll use a piece of software developed by wireless security researcher Joshua Wright called cowpatty (often stylized as coWPAtty). This app simplifies and speeds up the dictionary/hybrid attack against WPA2 passwords, so let's get to it!

How To: Trick Websites into Thinking You're on a Different OS or Browser

There are a number of reasons why you might want to trick a web server into thinking you're on a different operating system (OS) or web browser. One might be that you want to test the mobile version of your website from your computer. Or perhaps for some reason a website is restricted to a certain OS or browser and you wish to circumnavigate that barrier. Today's guide shows you how to do just that!

How To: 6 Ways to Access Members-Only Websites and Forums Without Giving Up Your Real Info

One of the most frustrating things on the Internet are sites that make you register just to view content. I'm not talking about paywalls—I mean the sites that make you give them personal information to look at free articles or forum threads. Most people are uncomfortable with this because a lot of these sites either spam you themselves, or sell your information to someone else who will.

How To: Clear All Caches and Free Up Disk Space in Windows 8

Clearing the cache on your computer is (usually) a quick and easy way to help speed it up. Deleting those temporary files frees up space, helping you computer run smoother, especially if you have not cleared the cache for a extended period. However, finding the different caches in Windows 8 is a little trickier than in previous Windows systems.

How To: Send Self-Destructing Spy Messages via Google Docs, Texts, and Private Links

There's really nothing safe about transmitting sensitive information electronically, but even if it gets there safely without being seen by prying eyes, there's no guarantee what happens to it once it reaches its destination. And let's face it, there are some things that you just don't want floating out there forever. So what can you do? Whether you want to send an email, a text, or a link, there are ways to send messages that self-destruct so that once they're read, they immediately vanish. ...

How To: Create a watermark when editing video in Final Cut Pro

Open your video in Final Cut Pro. Go to Effects>Video Generators>Boris. Then drag the option called Title 3D over your video. Then select Title 3D and go to your controls. Then click on "Title 3D Click for options". Now a new box should be open. Type your text into it. Then, highlight your text and pick the font size, then hit enter. Next, select the font. After that, go to the bottom test menu, and select Drop Shadow. Make the shadow distance 2. For the shadow opacity, turn it up all the way...

How To: Speed up a Windows XP PC with TweakUI

Firstly download the TweakUI into your computer, which is free. Fire up TweakUI and click on menu "Explorer", uncheck menus: "Allow help on start menu"; "Allow log off on start menu" and so on play with the settings however you like. And select "Light arrow", next click on "Thumbnails" menu and drag the slider all the way to the right, increase the size of thumbnails to 120 pixels. Next double click menu "Common Dialogs" and uncheck all three menus. Next double click menu "Taskbar and start m...

How To: Disable Windows Genuine Advantage notification

In this how-to video, you will learn how to remove the Windows genuine advantage notification from your operating system. First, open my computer and go to the windows folder. Look for the system32 folder and open it. Search for WGAtray.exe. Select both wgatray.exe and wgalogin and delete. Next, go to the run command and type in regedit. Click okay to open the program. Now, back up the registry. Once this is done, it will be safe to edit the registry. Now, navigate to hkeylocalmachine, softwa...

How To: Get a keynote presentation to play in Windows

It is a great video tutorial about how to create a keynote presentation to run on a windows platform. After opening the keynote presentation, click on file menu and open up the export window. This window shows different file formats and types. By using this we can export a quick time movie, an html, PDF, images, flash or a PowerPoint presentation file.

How To: Partition & resize your hard drive with EASEUS

This is a step by step tutorial how to Partition & resize your hard drive with EASEUS. To resize hard drive Open EASEUS Partition Manager. Click on the drive you want to resize. Then click Resize/Move. Go to the end and left-click with your mouse dragging in the direction you want to go. In the display you can see the size that's being created. When you have the size drives you want, just stop and click OK. If you shrunk one drive you can now create a new drive using the unallocated space. Th...

How To: Make the y-axis lead screw for a CNC router

A CNC router machine is probably the most useful tool a hobbyist can own, but the price for a CNC machine on the market is way more than the average hobbyist is willing to spend. You can build your own CNC with very basic tools, little knowledge of machinery, mechanics, or electronics, but be warned, these machines are inherently dangerous, so wear the proper protection and use common sense. At the very least, read the instructions and precautions on every tool you use.