Companies Greet Search Results

Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 6 (Gaining Access to Tokens)

Welcome back, my tenderfoot hackers! Hacker newbies have an inordinate fixation on password cracking. They believe that cracking the password is the only way to gain access to the target account and its privileges. If what we really want is access to a system or other resources, sometimes we can get it without a password. Good examples of this are replay attacks and MitM attacks. Neither requires us to have passwords to have access to the user's resources.

WANTED: Hackers for Bug Bounties

In previous posts here, I have pointed out that hackers are in high demand around the world and in nearly every industry. Every military and espionage unit of every country is trying to hire high-quality, experienced hackers as fast as they can to hack their adversaries' computer systems in order to gain a strategic advantage and to spy.

How To: Fully Customize Your Samsung Galaxy S3's Dictionary Using Old Tweets, Statuses, Emails, & Texts

My standard text greeting to friends is something along the lines of "Wazzup biznitch?"—but apparently the auto-correct function on my Samsung Galaxy S3 has a problem with that. Time after time I have to retype it or just add all my made-up words to the word list—and I use a lot of made-up words, because that's what bosses do. But texting isn't the only way I communicate. I also use email, chat, and social media on a daily basis—and I don't always use my phone. So, wouldn't it be awesome if m...

How To: Hack Your Nexus 7 into a Hybrid Android Tablet That Looks & Feels Like Both iOS & TouchWiz

Do you like Samsung's TouchWiz and the iPhone's user interface, but wish you could bring the best of both worlds together onto your device? You can! MIUI (pronounced me-you-eye) is a heavily modded custom ROM that brings a different UI experience never before seen on stock Android devices. Over in the Nexus 7 SoftModder forum, Shashou Jian mentioned MIUI as a ROM every user should try out. The interface is a fresh mix of Apple’s iOS and Samsung’s TouchWiz elements—with a large dose of customi...

How To: Burner Protects Your Real Phone Number with Disposable Aliases on Your iPhone

There are tons of situations that require you to give out your phone number, and I think just about everyone has regretted doing so at some point. It can be incredibly convenient to have a secondary or temporary number on hand, so if you don't want to provide your real digits, you can still get the call without revealing your true numbers. And that's where Burner comes in. Burner is a mobile app for iPhone and Android that lets you create alias phone numbers that you can take out of service a...

How To: Create a dramatic Blue Dahlia look by Estee Lauder

Tom Pecheaux, Estee Lauder's new creative director, came to the company with a vision in mind: Bold, more unexpected drops of color for their eyeshadow palettes, lipsticks, and glosses. And bold is the only way to describe his Blue Dahlia palette, which is filled with intense electric blues, blacks, and silvers.

How To: Curl your hair using a flat iron with Kandee Johnson

We all love primping products, but what girl doesn't want to save a few bucks when she can? While lots of beauty companies will advertise that they have the best curling iron for you to achieve those Kate Hudson beachy waves, the truth is that you really don't need a curling iron at all. In fact, to get your hair bouncy and curly, all you really need is a flat iron.

How To: Use Photoshop CS4 to overpaint 3D seams

Maya and Photoshop CS4 may be made by different companies, but that doesn't mean they can't work together. This video will teach you how to take a 3D model from Maya, import it into Photoshop, and then use Photoshop CS4's new 3D editing tools to overpaint the rough texture seams in the model. The end result will be much prettier than the model that you could have created with Maya alone.

How To: Find the Sandcastle Easter Egg in BattleField BC 2

Although not has highly popular as Call of Duty: Modern Warfare 2, Battlefield: Bad Company 2 is one of the few shooter games that is able to seperate itself from the arcade style of COD:MW 2. In B:BC2 you rely on strategy and teamwork in order to win multiplayer matches and the game. But if you're looking for something that will make you smile, check out this tutorial. In the video, you'll find out where the Sandcastle Easter egg is on one of the maps. It's just a small little thing, but is ...

How To: Use letters to dial on your BlackBerry

This helpful video explains how to use letters when dialing on a Blackberry. Many companies have words in their phone numbers so Darci Larocque shows us how to dial those letters. All you have to do is go to the call log, and hold the key in, and type in whatever word you are trying to dial. She also shows us another tip: if you are calling an office and you need to enter in someone's last name, you can do that the same way. Blackberry users should definitely view this video.

How To: Fold an origami angelfish

Ana Maria, an origami artist, shows you how to make an origami angelfish. Her video explains in step-by-step detail how to make one of these cute paper folded creatures. By viewing her high-resolution video you can create an angelfish in less than 5 minutes. The video is by Hawk vs. Pigeon company, which specializes in video production. Their videos are always crisp, so demonstration videos are easy to follow. Make your origami angelfish today.

How To: Make a talking booby trap

Having trouble with people snatching your stuff? Did someone take your lunch from the company fridge? Here is an inexpensive, sneaky gizmo you can make to keep those sticky fingers away. This is a junk drawer hack from Make Magazine's Kipkay. It's activated when an item is moved from it, triggering a clothes pin to close and activate the voice command. See how to make a talking booby track in this video tutorial with KipKay!

How To: Hack with Hacme Shipping

Foundstone Hacme Shipping is a web-based shipping application developed by Foundstone to demonstrate common web application hacking techniques such as SQL Injection, Cross Site Scripting and Escalation of Privileges as well as Authentication and Authorization flaws and how they are manifested in the code. Written in ColdFusion MX 7 using the Model-Glue framework and a MySQL database, the application emulates the on-line services provided by major shipping companies. This video will get you st...