Amazon just signed a deal with HBO to host the cable channel's original content on its Instant Video service. For those of us with Amazon Prime accounts, this is great news—but there aren't any readily apparent options for playing it on Chromecast.
Android updates are a funny thing—they give us a host of new features and upgrades, but they can also change things that we're used to. And sometimes we prefer to have things the way they were.
Welcome back, my greenhorn hackers! In my continuing effort to demonstrate to you how to hack the ubiquitous Windows 7, we will going after that notoriously vulnerable Adobe Flash that is on nearly every client Windows system (you are not likely to find it on servers).
Welcome back, my greenhorn hackers! After the disaster that was Windows Vista and the limited and reluctant adoption of Windows 8 and 8.1, Windows 7 has become the de facto standard operating system on the desktop/client.
Welcome back, my greenhorn hackers! In a previous tutorial on hacking databases, I showed you how to find online databases and then how to enumerate the databases, tables, and columns. In this guide, we'll now exfiltrate, extract, remove—whatever term you prefer—the data from an online database.
There are several ways to get around location restrictions on subscription sites like Netflix and Hulu using apps, extensions and proxies, but they tend to only work on laptops and computers. Users who want to access content from mobile devices and gaming consoles are usually out of luck.
#FOMO. If it bugs the living hell out of you that you don't know what that means, you're presently FOMO, as in you've got a Fear of Missing Out.
If you want the latest in breaking news, a heavy dose of humor, and all things kittens, look no further than reddit. But no matter how great the content and community is, reddit has yet to fully catch up to the mobile world.
Welcome back, my hacker apprentices! In recent weeks, the revelation that the NSA has been spying on all of us has many people up in arms. I guess I take it all in stride as I just assume that the NSA is spying on all of us—all of the time. Don't get me wrong, I don't condone it, but I know the NSA.
Welcome back my social engineers/hackarians! Today we'll be looking into a fantastic piece of software, The Social-Engineer Toolkit or just SET for short. SET is designed, Developed and used by several Social-engineers. So... Let's get started!
BitTorrent—corporations hate it with a passion, but the people love it. The notorious file-sharing protocol was responsible for 36.8% of all upstream Internet traffic last year, as well as 10.3% of all traffic.
I've had the thankless duty of choosing the music for far too many get-togethers, and no matter how good you think your music taste is, or how many new tracks you have on your iPhone or iPod, you will never—ever—satisfy everyone.
Inhabiting the microgravity environment on the cusp of the world's atmosphere has to be filled with some of the most unique experiences in the world. Astronauts eat, sleep, and work just as we do, except that their lives are filled with the added dangers of extreme temperatures and possible life-threatening malfunctions, all while being 240 miles up in the sky. Well, now's your chance to ask a handful of astronauts anything you ever wanted to know about life on the International Space Station.
Firstly, I'd like to say that I have nothing against iPhoto; it's a great application that works wonderfully in Mac OS X. Unfortunately, when you no longer have iPhoto on your MacBook—and you don't want to pay for it—looking for an alternative is a necessary endeavor. I could sit here and try to explain to you how I updated to Lion and then inexplicably dragged the iPhoto application into the trash—and proceeded to empty said trash. I could tell you guys that story, but I fear you might judge...
When I left off on our last hack, we had hacked into the ubiquitous Windows Server 2003 server by adding ourselves as a user to that system so that we can return undetected at any time. The problem with this approach is that a sysadmin who is on their toes will note that a new user has been added and will begin to take preventative action.
If you've got more than one computer, it can be a huge pain to switch form one to the other. Between files, settings and apps, it can take a while to transfer everything—and if you're running different operating systems, it's even worse. Image by Onion
There are a lot of things on your computer that can reveal information about you when you are surfing the Internet. If you are like me, then you will do anything to maintain your privacy and prevent those little leaks of information from happening. Here's a list of a few of the "threats" that can reveal information about you:
In order to bypass Megavideo and Veoh's viewing time limits you will first need Mozilla Firefox. To download Mozilla Firefox then go to Firefox and download the Mozilla Firefox browser. After downloading the browser you will need to install the add-ons. Go to the website Illumitux add-on in order to download the add on Illimitux, after downloading the add on then Mozilla will prompt you to close the browser window. Go ahead and close the window then re-open it. When you re-open it Mozilla wil...
A cold frame is a great way to extend the growing season in your garden. When you set up a cold frame, you can keep your plants healthy and growing, even when it's cold outside. In this video tutorial, you'll learn how to set up and use a cold frame.
Aerating your soil is an essential part of gardening, but it can be long and back-breaking work. In this episode of Growing Wisdom, Dave Epstein will teach you how to use a broadfork to aerate your soil. Using a broadfork, you can aerate the soil without damaging the soil's ecology.
If you don't want to shell out the money to rent a dedicated server in order to host a Left 4 Dead game server, follow this tutorial on how to create one on your home computer. Keep in mind that if you intend on letting other people play it, you will need a fast connection to prevent lag.
In this video you practice a decrease method, the slip slip knit, to knit the fingers of a mitten. Our hosts show you the kitchener stitch to graft closed the top of the mitten. They also show you how to make your thumb stitches live, pick up stitches to get the thumb going.
Before attacking any website, a hacker or penetration tester will first compile a list of target surfaces. After they've used some good recon and found the right places to point their scope at, they'll use a web server scanning tool such as Nikto for hunting down vulnerabilities that could be potential attack vectors.
Now that we have our payload hosted on our VPS, as well as Metasploit installed, we can begin developing the webpage which will trick our "John Smith" target into opening our malicious file. Once he has, we can take over his computer.
Configuring onion services for the first time can be tricky. A surprising number of system administrators make seemingly trivial mistakes that ultimately lead to catastrophic cases of de-anonymizing supposedly anonymous sites on the dark web. OnionScan is a tool designed to identify common misconfigurations in onion services and aid us in understanding how to fix them.
JavaScript is one of the most common languages used on the web. It can automate and animate website components, manage website content, and carry out many other useful functions from within a webpage. The scripting language also has many functions which can be used for malicious purposes, including stealing a user's cookies containing passwords and other information.
Hello ladies and gentlemen, PySec here coming at you with another informative(hopefully) article for you all. In the last tutorial, we finally finished our discussion about IP Addressing and I intentionally didn't mention a really important concept with which IP Addressing wouldn't be feasible without it. What I'm talking about is how our network device gets the IP Address in order to communicate with other devices on the network/Internet. There are many different ways for that to be accompli...
All kinds of people pretend to be someone they're not on the internet, including scammers, people attempting to wind others up, hackers and web predators. Almost all of these people will leave bases uncovered and they're all easy to expose when you understand how to. Here are my favorite ways of finding out when somebody is lying quickly. Image Search
Welcome to graduation! This is your senior year of Strength School, co-hosted by world record holder and supreme badass Dennis Rogers!
Cashcroppimp teaches you how to open your XBox 360's NAT with Verizon Fios. You first have to find your IP address. For this, you simply point your internet browser to http://findmyip.com to find IP. This is also calling the default gateway. Make sure to write this down somewhere. Now you need to input this number in your internet browser. Enter your username and password and proceed to the next step. Now go to Firewall settings-DMZ Host. Here you will need the IP address from the XBox 360, w...
Hunterjacob2 demonstrates how to get around website blockers at school. The first thing that he demonstrates is to open Control Panel in Windows XP and then to open Windows Firewall in the same. After that he provides you with some additional steps to follow within the windows firewall. The next thing he does in the video is show you how to exit the Hosts file in order to redirect websites. Following these steps makes it possible to go to almost any website of your choice pretty fast and easy.
It can be a real challenge to plant your seeds in evenly-spaced lines. In this episode of Growing Wisdom, Dave Epstein will show you how to use a four-row pinpoint seeder to plenty your seeds. Using devices like this, planting seeds in even lines will be a whole lot easier.
If you want to play Julien Doré on the ukulele then this how to video is the place to start. With this tutorial you can learn how to play "Freaky New Child" by Julien Doré on the ukulele. The host covers the basic chord structure for "Freaky New Child." Watch this how to video and you will be able to sing and play "Freaky New Child" by Julien Doré.
Seems self explanatory right? This quick video tutorial is for all of you big mouths out there. Well, check out what not to say to cops with thanks from former NYPD Detective Scott Androvic on Playbook, hosted by Matt Bean.
This crochet how-to video is a quick demonstration on color stranding using single crochet. Watch as our host shows you how to practice color stranding on his single crochet hat.
Start training your pig to do pet tricks. Watch this how to video as our host piggy shows you what he can do. Just as his owner uses treats as a positive reinforcement, you too can teach your hog to sit and do other tricks.
This how to video series shows you how to knit a sock. Our hosts guide you through the basics of knitting socks. In addition to demonstrating how to knit and turn the heel flap, they also show how to knit the foot and toes.
It may not seem like a big deal, but sometimes when your filenames are being saved in the incorrect case, it is. If you save a file with uppercase letters in the name, your computer may change them to all lowercase. This occurs when downloading files form a host server to a local hard drive. But what if you want them back how you had them? Well, there's a small Windows tweak you can use to stop it from happening. Learn how!