Command Post Search Results

How To: Set Up Wireless Debugging on Android 11 to Send ADB Commands Without a USB Cable

From booting into Fastboot mode with a single command to installing mods without root access, there's no shortage of reasons to use ADB. The catch, though, you had to be tied to a computer with a USB connection. However, a new feature in Android 11 finally allows you to run ADB commands over Wi-Fi instead of being tethered.

How To: Quickly Gather Target Information with Metasploit Post Modules

Post-exploitation information gathering can be a long and drawn-out process, but it is an essential step when trying to pivot or establish advanced persistence. Every hacker should know how to enumerate a target manually, but sometimes it is worth it to automate the process. Metasploit contains post modules that can quickly gather valuable information about a target, saving both time and effort.

How To: Use Command Injection to Pop a Reverse Shell on a Web Server

Command injection is a technique used by hackers to execute system commands on a server, usually via a web application or some kind of GUI. This can happen when an application provides some sort of functionality to the user involving the use of system commands. When the input is not properly sanitized, commands not originally intended to be run are allowed to be executed.

How To: Get Administrator Privileges on Mac

So yeah. Its AugustFackYou and I felt like posting today and being an active member of the community. After reading this please tell me if you have any comments on what I can do better or if this method is bad. Anyway today I will be showing you how to get root on a mac. I managed to become an administrator at my school with this and one other method.

How To: Take Control of Your Mac's Sleep Functions with These Commands

Macs are generally highly power efficient due to, in part, the optimized sleeping schedule with OS X. Yet in certain scenarios, you might not want your Mac to go to sleep: downloading a huge file, reading a book, reviewing a spreadsheet, analyzing some content on the screen... the list goes on. To resolve this, you can go to System Preferences and mess with the settings, but this can be an annoying process if you need to do it often.

How to Hack Databases: Running CMD Commands from an Online MS SQL Server

Welcome back, my hacker novitiates! There are many ways to hack databases, and most of these techniques require SQL injection (SQLi), which is a way of sending SQL commands back to the database from a web form or other input. In this tutorial, we will use SQL injection to get access to the underlying server. So instead of getting access to the database and its data, we will use the database as an intermediary to gain access to the underlying server.

News: Whitestar PVP Server Build Teaser

Still working on mega project builds. This one is going into my own PVP server which (will) contain 4 theme'd biomes inside of a 155m sphere - inside of a 255 meter containment sphere inside a 1000m+ void. The outer sphere acts as both artificial sunlight and a drop-death height of 50m. 4 more outer panels to go (water and lava) and it's ready for interior work and redstone - including command-block powered proximity traps that don't have any triggers marking them as well as hidden walls that...

How To: Control a T-Mobile G2 smartphone with voice commands

Make calls and send text messages and emails with voice commands on your T-Mobile G2! This clip will teach you how. Whether you're the proud owner of a a T-Mobile G2 Google Android smartphone or are merely toying with the idea of picking one up in the near future, you're sure to be well served by this official video guide from the folks at T-Mobile.

How To: Use voice commands on a Windows Phone 7 smartphone

In this clip, we learn how to use voice commands to make calls, search the web and open apps on a Windows Phone 7. Whether you're the proud owner of a Microsoft Windows Phone 7 smartphone or are merely considering picking one up, you're sure to be well served by this video tutorial. For more information, including detailed instructions, take a look!

How To: Use the command prompt in Windows 7

For all you that are not computer geeks or nerds, this tutorial is going to show you some tips on using the command prompt in Windows 7. Although it's not vital information, this can still be used to fix certain computer problems and is fun to use when opening certain programs or doing other things as well. So sit back, pay attention, and being a geek or nerd is cool so relax!

How To: Modify a Glidecam with a Steadicam arm and vest

The lady shows how to make the steadicam arm to work with glidecam stabilizer. The steadicam arm is made such as only a steadicam can be fitted on that. The video describes how to make the usable for glidecam with three simple tools ,a 10 ounce hammer ,a long nose player and a flathead screwdriver. First take out the circular clip with which the post is secured with the screwdriver unscrew and pull the post out .Using the hammer straighten the post .The post will have a scratch but the straig...

How To: Create a mosaic look in Photoshop

This tutorial teaches you how to create a mosaic photo made up of many smaller photos in Photoshop. It explains the use of the crop tool, image resizing, use of sharpen filters and of fading command. It also handles creation of custom patterns with the use of the define pattern command as well as later use of the said pattern for a custom pattern fill. Finally, it describes the use of the overlay blend mode for achieving the desired effect.

How To: Change your IP address from the Windows command line

Need to change your IP address? In this how-to, you'll find instructions for changing your IP address from the Windows command prompt with the ipconfig console application. For step-by-step instructions, take a look. NB: Changing your IP will not protect your identity; it's merely a simple expedient for getting around certain problems ones might encounter while using the Internet.