Configuration Search Results

Hack Like a Pro: Snort IDS for the Aspiring Hacker, Part 2 (Setting Up the Basic Configuration)

Welcome back, my tenderfoot hackers! As you should know from before, Snort is the most widely deployed intrusion detection system (IDS) in the world, and every hacker and IT security professional should be familiar with it. Hackers need to understand it for evasion, and IT security professionals to prevent intrusions. So a basic understanding of this ubiquitous IDS is crucial.

Networking Foundations: Dynamic Host Configuration Protocol

Hello ladies and gentlemen, PySec here coming at you with another informative(hopefully) article for you all. In the last tutorial, we finally finished our discussion about IP Addressing and I intentionally didn't mention a really important concept with which IP Addressing wouldn't be feasible without it. What I'm talking about is how our network device gets the IP Address in order to communicate with other devices on the network/Internet. There are many different ways for that to be accompli...

How To: Build an Emergency Rucksack with a Poncho & Rope (The Horseshoe Pack)

There’s a good chance that you’ll be alone in life one day, and no... I’m not talking about a couch-bound, dateless loser with a pocket pussy and a bag of potato chips. I’m talking about alone. In the wilderness. Hungry. Cold. Lost. You can’t stay in one place too long, so it would be nice to have something to carry your belongings in. Maybe it’s post-apocalyptic land where you’re the sole survivor, and all the backpacks and rucksacks in the world are but mere ash. Either way, knowing this si...

How To: Configure the Redrock microShouldermount

Watch this cinematography tutorial on how to use the microShouldermount, which can be attached onto a tripod or used in its typical configuration as a shoulder mount. You can attach a monitor along the grip rod. Learn the essentials of the Redrock mounting systems for professional digital video cameras. Interesting tutorial for professional cameramen & digital filmmakers.

How To: Get started with VoIP using Asterisk

Kevin Rose is joined by John Todd, a well known, leading Asterisk expert, to introduce you to the amazing VoIP (Voice over IP) world of Asterisk, the open source voip telephony toolkit. In this episode, Kevin and John take you through the installation and configuration of this powerful tool, and show how it can be used to give anyone complete control over their phone experiences, such as voice over wifi, eliminating phone costs, choosing from hundreds of VoIP providers, creating your own voic...

How To: Operate Google Chrome without changing your PC

A video that describes how to install Google Chrome OS onto your PC without changing your current PC configuration. What this means that you can use Chrome OS without changing your current OS (Windows Linux etc) and without making any changes to your dis partition or BIOS. The first section of this video explains how to use a simple USB drive to boot into Google Chrome OS. The second section of this video explains how to install Google Chrome OS onto your computer and launch it using your hos...

How To: Unroot a Motorola Droid phone and restore it to stock settings

The Motorola Droid is getting a little long in the tooth, but it is still a remarkably capable phone with full keyboard, which makes it almost unique among it's Android-based competition. If you've rooted your phone (good for you!) and for some reason want to go back to the stock configuration that your phone was in when you took it out of the box, this video will show you how to do it. One good reason is if you want to update your phone's firmware, which will not work if you phone is rooted ...

How To: Synchronize your Blackberry smartphone with MS Outlook

This video shows how to synchronize our blackberry smartphone with MS outlook. First open up the Blackberry Desktop Manager. Let us start by synchronizing the blackberry. Double click the synchronize button to load the synchronization settings. Here we can specify what we want to synch and where we want to synch firm. Click the configuration tab and select configure synch. Our device configuration menu let us pick which application on the black berry to synch and where to synch. Today we are ...

How To: Configure your XBee

The XBee is a wireless radio module that allows you to implement a cheap and easy wirelss interface between two kinds of devices. This video will walk you through each step of configuration for your XBee. Modify it and add it to your next creation, whether it's a robot, machine, or something else from your imagination. The possibilities are endless!

How To: Use vocoders as effect control units in Reason

This music production software tutorial is on the use of the BV512 vocoder as a frequency specific effects gate in Reason. This way, it is quite easy to draw a frequency curve to delay only your treble, distort your midrange, and reverb your bass, or any configuration imaginable. See how to use vocoders as effect control units in this video.

How To: Use a custom config section in an ASP.Net config file

In this video tutorial, Chris Pels will show how to extend the standard set of ASP.NET configuration settings with your own XML configuration elements. First, see how to create a configuration section handler which is required to interpret and process the information in custom XML configuration elements. During this learn how to use declarative model for defining the behavior of a configuration section handler. Next, see how to add a custom section handler and custom elements to an ASP.NET co...

How To: Extend Windows Media Center to an Xbox 360

In this video tutorial from Get Connected TV, hosts AJ Vickery and Mike Agerbo, will show you how to extend Widows Media Center to your XBox 360 using Windows 7. This video assumes that your XBox is already connected to your home network, so you may want to be sure to do that first. With this configuration, you will be able to not only watch movies, but view, pause and record TV on your personal computer, as well. You will learn how to access the Media Center section of your XBox, and get the...

How To: Fix a Windows "blue screen of death" (BSOD)

This video shows you how to fix a Windows "Blue Screen of Death". You should know what to look for when you get the BSOD. You should look for the error code first and then the stock code. You should hit the F8 button upon start up to go to the last known good configuration and it will boot your computer to the last time it booted correctly. You can also start in safe mode. You will need to do a system restore. If that doesn't work do a Google search for the file name that is causing the probl...

How To: Fully Anonymize Kali with Tor, Whonix & PIA VPN

Hacking from a host machine without any form of proxying is reckless for a hacker, and in a penetration test, could lead to an important IP address becoming quickly blacklisted by the target. By routing all traffic over Tor and reducing the threat of malicious entrance and exit nodes with a VPN, we can configure Kali to become thoroughly private and anonymous.

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 22 (Samba)

Welcome back, my aspiring hackers! Those of you who use Windows in a LAN environment understand that Windows machines can share directories, files, printers, etc. using "shares." This protocol dates back to the 1980s when the then dominant computer firm, IBM, developed a way for computers to communicate over the LAN by just using computer names rather than MAC or IP addresses.

How To: Password protect your wireless network

Most of the home wireless networks are not set up by professionals and hence they might lack in security features. People just set up the wireless networks by connecting the devices and powering them up and never care to apply security settings to the network. This may result in your wireless network being compromised by unwanted external entities. How ever you can do a web based configuration settings and secure your wireless network by password protecting it. This settings differ from the m...

How To: Hack a network with Nessus 3

The Nessus vulnerability scanner, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks. In this network security video tutorial, you'll learn how to hack a network using Nessus 3.

How To: Turn Your Raspberry Pi into a Wireless Hotspot

When hacking into a network during a penetration test, it can sometimes be useful to create your own wireless AP simply by plugging a Pi into an available Ethernet port. With this setup, you have your own backdoor wireless connection to the network in a matter of seconds. Creating an AP is also helpful while traveling, or needing to share a connection with a group of people.

How To: Test Adobe Flash, Shockwave, Acrobat & Java

In this video, we learn how to test Adobe Flash, Shockwave, Acrobat & Java. First, see if you have Acrobat Reader installed and working properly by reading this PDF. If you have it installed properly, you will see a PDF with a configuration guide. To see if Shockwave works, go to: Shockwave. If working properly, you will see a "create, see, about" link, not one asking you to install it. Last, to test Java you will go to: Java Test. If you have installed this properly, you will see an animatio...

How To: Make quick, easy prop Wolverine claws

First of all, feel free to disregard the first 2:05 of this video, it is not a how-to but behind-the-scenes footage of this guy's short film. After 2:05, however, you will get a great tutorial on how to make a set of prop Wolverine claw quickly, easily, and cheaply. They are made out of cardboard and spraypaint, and as long as you don't do any closeups on them or require you Wolverine to open his hands with the claws out at any point (impossible in this configuration) they look plenty real. Y...

How To: Set up an automatic @reply to new followers on Twitter

Twitter is the latest popular social networking forum. Twitter is used to keep your friends updated with what you are doing using 140 character messages called tweets. In twitter you can follow your friends and you will be notified when ever your friends posts a new message. Similarly other people can follow you on twitter to know what you are doing. In twitter you can customize to send an automatic private response to your new followers. To do this open your twitter account. Go to the notice...

How To: Configure & check the firewall in Windows 7

In this video, it demonstrate how to check and configure Windows firewall. In order to check to see if firewall is enable or not. You would click on start which locate bottom left corner of the screen. Then you would click on control panel. On this screen you would see an option for firewall, and click on it. When you click on firewall, it will let you view all the description about firewall configuration. There are also many other option which locate on the left hand side. If you are an adva...

How To: Tie the Tea Cup decorative knot

If you're into arts and crafts then you know that there is more that you can do with a long piece of string than just tie your shoes. On this TyingitAllTogether video you have the opportunity to tie the teacup decorative knot using one long piece of string folded in half. The author of the video first shows you what the end product will look like then methodically begins to walk you through setting up the string in Y-configuration to "crossing each bights crook" which involves overlapping and...

How To: Install Puppy Linux on an innotek VirtualBox

The author shows how to install Puppu Linux 4.3.1 in Innotek VirtualBox 1.5.2. He shows steps to create a new virtual machine in Innotek VirtualBox, by showing the various configuration settings like the RAM size, hard disk space etc. He shows how to boot the virtual machine with the Puppy Linux installation ISO file. Next, during boot up, he shows how to set the language and regional settings, resolution settings etc. In the next screen he shows how to access the local drive and partition it...

How To: Race cars on the Buttonwillow track

Instructional video of Buttonwillow Raceway in a stock RSX type S race car. This is on a clockwise track configuration. This Buttonwillow Raceway video shows you how to handle the turns and race the track well. They describe the pit lane as well as the protocol of leaving the pit. Stay on the left hand side when you enter. There are several 90 degree turns.

How To: Use the Microsoft Windows Firewall

In order to keep your PC safe from annoying or potentially dangerous threats on the Internet, a properly-configured firewall is a crucial item in helping prevent your system from becoming compromised. The Windows Firewall in Windows Vista™ is the first line of defense in helping to keep your computer safe. By preventing your computer from being infected by malware, Windows Firewall is designed to be easy to use and is automatically enabled to protect your computer as soon as Windows starts. T...

Prev Page