Construction Code Search Results

How to Use PowerShell Empire: Getting Started with Post-Exploitation of Windows Hosts

PowerShell Empire is a post-exploitation framework for computers and servers running Microsoft Windows, Windows Server operating systems, or both. In these tutorials, we will be exploring everything from how to install Powershell Empire to how to snoop around a target's computer without the antivirus software knowing about it. If we are lucky, we might even be able to obtain domain administrator credentials and own the whole network.

How To: Build a Directory Brute Forcing Tool in Python

While attempting to hack a web app, there may come a point where the attacker may have to escape the default directory in order to access unauthorized files. This is known as a directory traversal attack. Much as the name implies, this attack involved traversing the servers directories. But in order to move to an unauthorized directory, we need to know where those directories are. Today we'll be building a tool to brute force these directory locations based on HTTP response codes. Before we g...

SPLOIT: How To Build a Peer to Peer Chat Application in Python ( GUI - Linux )

Developing GUI apps in python is really cool. I ask those who understand the language to help convert some of the command-line or console programs or apps ( I mean programs that are useful to a hacker ) to GUI. I know GUI makes us lazy and not wanna learn but we should all know its fast. Today's tutorial is on p2p chat app I developed last week and decided to share it with the community since its kinda cool.

How To: Put your MS Access databases on your website

To start off the process of publishing your access database online we first look at a sample MS ACCESS database with typical formats and a online searchable application where users can search by library name or city and get details of the library. There are 3 steps to publish the database. The first step is importing data which can be done through clicking on the file menu and then click on import data through a Microsoft Access Database. Now select the file you want to import through the bro...

How To: Add rotating banner ads to WordPress Thesis theme

In this video, we learn how to add rotating banner ads to Wordpress Thesis theme. First, go to your Wordpress admin, then go to the thesis option. Now, click on custom file editor. After this, selection "custom_function.php", then go to the FTP path and open "launch.php". Now a notepad will open, copy the code inside where it says banner ad and past that into your Wordpress multimedia box. now, go to the drop down menu and click view custom code. Now you should be able to see banner ads on yo...

How To: Clear the check engine light on your dashboard

In this tutorial, we learn how to clear the check engine light on your dashboard. This could be caused from an over-boost from the turbo charger that the engine does not recognize. The solution is to grab a tuner device and plug it into the car. Wait for it to power up, then go to the main menu. After this, go to "read dtc's", then find the trouble codes. It will show you what unknown codes are coming up, then you can clear them by pressing the "s" key. Now your light should turn off and you ...

How To: Embed HTML code into a WordPress post or page

This clip presents a general tutorial on how to work with and embed HTML code into your WordPress posts and pages. Every version of WordPress brings with it new features, new functions and new ways of doing things. Fortunately, the very same technology that allows an open-source blog publishing application like WordPress to exist in the first place also makes it easy for its users to share information about the abovesaid things through videos like this one. Take a look.

How To: Create a fake virus to prank your friends

This video in the Pranks & Cons category will show you how to create a non-destructive fake virus on Windows. This video is from Tinkernut. For this right click on your desk top, go to new and select shortcut. Now type in this code 'shutdown 's 't 60 'c "this computer is shutting down; save your work", click next. This code is actually for shutting down the computer. But, you type in the name of the short cut as something else, say for example 'songs ' and click next. What will happen is when...

How To: Check property lines before putting a fence up

You may have all the tools and people needed for putting up a fence, but something that should not be skipped is coding. Checking the coding and property lines to your place is important for making sure you don't cross into a place that you aren't supposed to be. This can result in bad blood forming and the removal of your hard work. So check out what you'll need to do in order to prevent that, in this tutorial. Enjoy!

How To: Connect an Apple Wireless Keyboard to the iPad

In this video, we learn how to connect an Apple wireless keyboard to the iPad. This is great if you need to write something that requires a lot of typing. First, go to "system preferences" then click on "Bluetooth". Once you're in this, make sure the "discoverable" check box is not checked, then highlight your keyboard. In the bottom left hand corner click the minus sign, then click "remove". Now, on your iPad click "settings" then "general" then tap "Bluetooth". Almost right away you should ...

How To: Create a static FBML page for your Facebook fan page

This videos is a tutorial for using custom FBML coding on facebook fan page.The video begins by logging into facebook account.Then go to the search bar at the upper right hand corner and tpe "static fbml" and hit enter.This takes to the application page and click on "add to my page" below the default fbml picture.A window opens up showing a list of user pages and after selecting the page click on "add to page".Close the window and go to your fan page and click on "edit page".This shows a list...

How To: Make a screen capture program in Visual basic

This video shows how to make a screen capture program in Visual basic. The first step to create a screen capture is to open a new project and open a new form window. The second step is to create to temples for either saving or capturing the picture you choose to select. The third step involves following the code structure given by the instructor to enable the correct function for the save or capture button options. The final step is to open the project as a finished work with the correct codi...

How To: Jailbreak an iPod Touch or iPhone firmware Beta 3

Are you curious as to how to jailbreak the 3.0 Beta 3 on your iPod Touch/iPhone? In order for the instructions in the video to work you must own a 1G iPod or iPhone as the 2G will not work. The instructions are very easy to follow and you will be able to access the 3.0 Beta 3 on your phone in no time at all. If you don't know what jailbreaking is it allows iPod or iPhone users to run any type of code on your device as opposed to only running codes that are approved by Apple.

How To: Make a MySpace DIV overlay layout

Here we will be making a website page layout for your Myspace account. A very common thing that people find difficult is the alignment of things such as text boxes and other DIV's. This video will demonstrate the proper meaning of alignment, as we have an already misaligned page to visually work with here. -To watch in high quality: http://www.youtube.com/watch?v=ItUhjfqcLo0&fmt=18 -For help with source code: http://www.fileden.com/files/2008/6/12/1956714/1divblueblack.txt -Insert this code t...

How To: Increase battery life on LG phones

This video describes how to increase battery life on most of the LG phones", for that first we have to enter into the service by typing the numbers "##77647269700" and then clicking the call button. Now it will ask for 6 digit "service code" to enter into the service. Just type "000000" as a code and it will enter into the "services" Menu and from the menu click on the "Network Select" and from that choose "Mode Preference", by default "Digital Only Hybrid" mode will be in selected. Now to sa...

How To: Reboot an iPod Touch 2G after shutdown

This instructional video shows you how to reboot your iPod Touch 2G after shut down. First shut down the device and plug it to a computer via USB. Use the links in the description if you have the newest version of OS X. Put the device in to DFU mode by holding the home and power key for 10 seconds, letting go of the power key keep holding the home key. Download the RSlite folder from the link in the description. Open the terminal, change the directory to the Rslite folder and type the code re...

How To: Jacmel crochet a granny square

In Access 2010 you can now create a navigation form (like a home page) for your database without writing a single piece of code or logic! Great for busy people who need to organize their database quickly, but who don't have code writing skills. It's just drag and drop. There are predefined layouts which help you design the form and then simply drag the information you want into the form. Reports can be added and accessed quickly from the navigation form so you can analyze the data simply and ...

How To: Password protect queries in Microsoft Access

The Microsoft Office Access 2007 relational database manager enables information workers to quickly track and report information with ease thanks to its interactive design capabilities that do not require deep database knowledge. In this Microsoft Access video tutorial, you'll learn how to force a password to be entered in order to run a query.

How To: Password protect databases with Microsoft Access

The Microsoft Office Access 2007 relational database manager enables information workers to quickly track and report information with ease thanks to its interactive design capabilities that do not require deep database knowledge. In this Microsoft Access video tutorial, you'll learn about creating a login form and password protecting your database.

How To: Create a multiuser login system in Microsoft Access

The Microsoft Office Access 2007 relational database manager enables information workers to quickly track and report information with ease thanks to its interactive design capabilities that do not require deep database knowledge. In this Microsoft Access video tutorial, you'll learn about creating a multi-user login form to password protect different areas of your database.

How To: Find OSINT Data on License Plate Numbers with Skiptracer

While conducting an OSINT investigation, it's important to be able to pull in information based on any clue you uncover. In particular, license plate information can turn up everywhere, from photos to live data to on your own street. You could use that data to find the VIN, see if a Tinder date has hit anyone, find out who's blocking your driveway, and so on. Skiptracer can help get the ball rolling.

How To: Set Up Wireless Debugging on Android 11 to Send ADB Commands Without a USB Cable

From booting into Fastboot mode with a single command to installing mods without root access, there's no shortage of reasons to use ADB. The catch, though, you had to be tied to a computer with a USB connection. However, a new feature in Android 11 finally allows you to run ADB commands over Wi-Fi instead of being tethered.

How To: Fix Bidirectional Copy/Paste Issues for Kali Linux Running in VirtualBox

Last week, I updated VirtualBox on my computer since I had skipped a few versions, then I could no longer copy text or paste text from my Kali virtual machine to my host OS and vice versa. Installing the Guest Additions didn't seem to do anything, and the bidirectional shared clipboard was enabled, but there was one thing that did work for me that may help you out too if you experience the issue.

How To: Brute-Force SSH, FTP, VNC & More with BruteDum

Brute-forcing is an easy way of discovering weak login credentials and is often one of the first steps when a hacker finds network services running on a network they gain access to. For beginners and experienced hackers alike, it's useful to have access to the right tools to discover, classify, and then launch customized brute-force attacks against a target. BruteDum does it all from a single framework.

How To: Perform a Pass-the-Hash Attack & Get System Access on Windows

Passwords on Windows are stored as hashes, and sometimes they can be tough to crack. In certain situations, though, we can get around that by using the hash as is, with no need to know the plaintext password. It's especially interesting if we can manage to get the hash of an administrative user since we can then authenticate with higher privileges by performing an attack known as pass the hash.