Definitive Source Search Results

How To: Fix Kali 2016 Repository/Mirror Error

Recently, I decided to install Kali 2016 as dual boot on my laptop. Everything install perfectly up until the installer gave me the option to set up the package distribution mirror. No matter what setting I provided, no mirror would set up correctly. I was forced to continue the install without setting up the mirror. If you do not know what this means, I will explain it. Basically, you will not be able to update or install any tools onto your Kali distribution.

How To: Turn a OSX Backdoor into a .App

Hey its August. I dont know why I post so often but I wanted to add up on a post by Cameron Glass here What we are going to do today is turn that backdoor into a .app file so that we dont even need to touch the victims computer! also thanks to someone who helped me with this. (You know who you are)

How To: Get FeedingBottle Back in Kali 2.0

Back in Backtrack5 there was a nice GUI addon for the aircrack suite called feedingbottle. I liked it because it simplified easy tasks like fake auth with a click of a button. I was hunting for sources and it seems that all I could find was an ubuntu deb package from 2013. It was a little tricky installing it on a 64-bit system so I thought I would write a quick how to. Feedingbottle is an x86 package so you must install the corresponding libraries. If they are missing you will get a "bash:.....

How To: Use Your "Dead" Car Battery to Power Emergency Fans, Lighting, and More!

A common misconception is that all car batteries die. This, in fact, isn't true—the majority of "dead" car batteries just don't contain enough juice to power a car, but they can still provide enough watts to keep emergency fans and lighting running, which is great when a power outage occurs. So, instead of lugging the battery to the nearest drop-off center or just letting it collect dust in the garage, you can put that car battery to good use.

How To: Geekify Your Business Card with This Custom PCB Résumé Flash Drive

Whether you're job searching, networking, or just giving your information out to someone you just met at a bar, this circuit board business card made by Brian Carrigan will make sure no one ever forgets meeting you! Sure, you could buy a customized USB business card on some online shop, but if you're trying to emphasize your geek cred, why wouldn't you make your own PCB card from scratch? Carrigan used a USB controller and added an Atmel AT45DB series flash chip so that it could store his res...

How To: Add Virtual Memory to a Idevice.

WARNING VM uses the hard disk as ram. So it repeatedly writes and reads of the hard disk. Since the iPod has flash memory usage of this tweak will lower your device lifespan to 5-7 years. So i recommend this tweak on a old device you want to speed UP!!!

News: News Clips - June 4

Water Purification Device Prompts TSA to Close Down Minneapolis Airport In another stupendous incident of comical over-reaction, the TSA ordered the evacuation of two airport terminals in Minneapolis after a water purification device was found in a woman’s luggage.

News: Credit for coming up with it

In case you haven't figured out already, our government is always on the move to figure out new ways to extend their control. The CISPA, for one, is one of the best examples, along with "re-education" programs, and racial divide (Trayvon). What I've noticed in the past few months is that their new "ideas" are coming out at an increasingly alarming rate.

How To: Make an Exploding Ashtray Prank for April Fool's Day

The exploding ashtray prank was once fairly commonplace long before the Internet was born. Using flash cotton to create a startling explosion, this prank is certainly effective at getting a reaction. Flash cotton is a staple of many magic acts; used for its ability to create a brilliant flash of fire without causing a burn to the skin.

Winspiration: 16 Crazy Stock Photos to Inspire Your WTFoto Contest Submissions

So far, there have been some excellent entries to our WTFoto Stock Photo Challenge, but the battle is not over yet. You still have a couple days left to submit your best find to the WTFoto community corkboard for a chance to take the crown. Remember, we're looking for an absurd stock photo image that nobody's ever seen before. Entries are due Monday, February 27th, 11:59:59pm PST. One second later and, well... I'll probably just let it slide. But 2 seconds later and you're out!

Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations

Last Friday's mission was to accomplish solving HackThisSite, Realistic 5, the fifth and last in my series of realistic hacking simulation missions. This time, telemarketers are invading people's privacy, and it was up to us to stop them! The job was to get root on the site and delete the contact database in order to return the right of privacy to its victims.

Goodnight Byte: HackThisSite, Realistic 4 - Real Hacking Simulations

Last Friday's mission was to accomplish solving HackThisSite, realistic 4. The fourth in a series of realistic simulation missions was designed to be exactly like a situation you may encounter in the real world. This time, we are told "Fischer's Animal Products is a company that slaughters animals and turns their skin into overpriced products which are then sold to rich bastards! Help animal rights activists increase political awareness by hacking their mailing list."

How To: Electron Spirographs with a Cathode Ray Tube

In this article, I'll be showing you how to make a cool visual representation of sound using an old cathode ray tube (CRT) television, a stereo, and a sound source. You'll also need a pair of wire cutters, and a few screwdrivers. To properly understand this project, it's a good idea to learn a little bit about how CRT TVs work. Check out this article on how they work.

How To: Fix the Unreadable USB Glitch in VirtualBox

Many users of the virtualization software VirtualBox may have noticed that the USB system has been pretty buggy for quite a long time. I've had my USB randomly duck out on me way too many times to count. This can really be difficult to deal with when you require access to the devices and files from the host system.