Brain Secret Search Results

Hack Like a Pro: How to Create a Nearly Undetectable Backdoor with Cryptcat

Welcome back, my fledgling hackers! Awhile back, I demonstrated one of my favorite little tools, netcat, which enables us to create a connection between any two machines and transfer files or spawn a command shell for "owning" the system. Despite the beauty and elegance of this little tool, it has one major drawback—the transfers between the computers can be detected by security devices such as firewalls and an intrusion detection system (IDS).

How To: Unlock Any Master Lock Combination Padlock

Let's say you forgot the code to your Master Lock combination padlock. What can you do besides buy another one? Well, there's a surprising abundance of ways to open a combination lock other than with just the combination, some of which will even let you reset the code. Of course, these hacks aren't limited to folks just looking to open their own locks, but let's just assume that's what you're here for.

How To: McDonald's Secret Sauce Revealed: Here's the Official Big Mac Recipe

If you've ever wondered what exactly goes into a McDonald's sandwich (or what the heck that secret sauce stuff is anyways), you might be a little surprised to learn that all of the ingredients are readily available at your local grocery store. In an interesting move, McDonald's has released a video featuring Executive Chef Dan Coudreaut showing, step by step, how to make your own Big Mac sandwich at home. Here is the video, and if you'd like to read along with Coudreaut's instructions, you ca...

How To: Use a secret nail gun

The secret nail gun is used to nail timber floor boards to floor joists or on top of a sub floor construction. It shoots nails on a 45 degree angle through the tongue of the floor which is covered by the next board. No nail holes are required to be filled by the floor polisher. Watch this video tutorial for a demonstration on how to use a secret nail gun.

How To: Steal macOS Files with the USB Rubber Ducky

If you need a tiny, flexible attack platform for raining down human-interface-device (HID) attacks on unattended computers, the USB Rubber Ducky is the most popular tool for the job. By loading the Ducky with custom firmware, you can design new attacks to be effective against even air-gapped computers without internet access. Today, you'll learn to write a payload to make "involuntary backups" through copying a targeted folder to the Ducky's USB mass storage.

How To: Make organic pot roast

The secret to making a good pot roast is to start with a good organic roast. With the meat at room temperature and sprinkle both sides with salt. Next chop a whole clove of garlic, put it in a bowl, and add some oil, black pepper, and cayenne pepper. Cut several slits or holes in the pot roast and poke the pieces of garlic into the holes on the top and bottom and sides. Put some of the vegetables in with the roast at the beginning of the cooking time: a leek, an onion, a carrot and a couple s...

How To: Always win in napkin chess

This week: a rigged game of skill & a simple sucker bet! Check out this video if you want to learn how to beat anyone in a simple game that can be played anywhere with coins and a napkin. Some might call it magic, others call it skill.

How To: Perform the "cigarette through coin" magic trick

Magic Trick: The Cigarette Through Coin Have you ever heard of the Masked Magician? With the television series Magic's Biggest Secrets Finally Revealed, the so-called Masked Magician (Val Valentino) revealed secret after secret of the magicians repertoire. Valentino creates “the magic” then proceeds to reveal the reality of the illusions before a captivated television audience.

How To: Solve a Magic Sand Wand puzzle

Can you solve the mystery of the sands? The Magic Sand Wand puzzle is a clear acrylic wand, partially filled with brightly colored sand, and containing a silver ball. All you have to do is get the ball from one end of the wand to the other.