Domain Names Search Results

How To: Setup and play the chess-like game Shogi

Do you like chess? How about Japanese chess? Aren't there different chess variants in Japan though? Maybe, but this specific chess variant is called Shogi. The chess-like game Shogi is won by capturing the king, just like chess, but defeat is conceded at mate, or when mate becomes unavoidable.

How To: Tie the 'Windsor' knot

The Windsor knot, also (wrongly) known as the "Double-Windsor" (a non-existent enormous 16-move knot), is the most well known knot in the world. The Windsor is a large, symmetrical, self-releasing triangular knot. The tie was named by Americans in the 1920-30's after the Duke of Windsor. The Duke was known for his fondness of large triangular tie knots, but didn't in fact invent this particular knot. His secret was a specially tailored tie with an extra thickness of material.

How To: Fix the Missing Tags in Your MP3 Files

How to easily fix the missing tags in your MP3 collection using free software called Fixtunes. The tags on an MP3 file identify things like the Song Title, Recording Artist, Album Name, Genre, Track Number, etc. When you buy songs from places like the iTunes Music Store or MP3.com these tags are complete. Some of the songs in your iTunes library may have incomplete tags. This is how you fix them.

How To: Apple Finally Fixed the Biggest Problem with the iPhone's Files App

The Files app was first introduced to the iPhone with the release of iOS 11. In the two years since its unveiling, we've enjoyed a more desktop-class experience since there's finally a decent file manager for mobile devices. That said, there was always one major issue with the Files app, an issue iOS 13 solves for good.

How To: Perform a Pass-the-Hash Attack & Get System Access on Windows

Passwords on Windows are stored as hashes, and sometimes they can be tough to crack. In certain situations, though, we can get around that by using the hash as is, with no need to know the plaintext password. It's especially interesting if we can manage to get the hash of an administrative user since we can then authenticate with higher privileges by performing an attack known as pass the hash.

Android for Hackers: How to Backdoor Windows 10 & Livestream the Desktop (Without RDP)

The Windows 10 desktop and microphone can be livestreamed without using Remote Desktop Protocol (RDP) software and without opening any ports on the target computer. A hacker with low user privileges can monitor and exfiltrate a target's every move and private conversation in real time no matter where they are. Hackers are watching and listening, and there are few ways to protect yourself.

How To: Save Custom Shooting Presets in Filmic Pro So You Don't Have to Adjust Settings Later for Similar Shots

Filmic Pro has a superb suite of professional settings — bit rate, frame rate, and mic choice, to name a few — which can enable you to capture the best footage possible. But different shots require different setups, and it can be frustrating to change settings on the fly. Filmic Pro lets you skip that whole process by saving your favorite settings as presets for quick and easy access.

How To: Use Google Maps or Waze with Siri Instead of Apple Maps

When driving, you can get directions hands-free by asking Siri. You can also make general map searches, show a location's details, call a query's phone number, and view traffic details. However, Siri defaults to Apple Maps for all those. If you prefer Google Maps, Waze, or another third-party navigation app, the map-based Siri commands won't work. But that doesn't mean you can't still use Siri.

Hacking Twitter: See Who Unfollowed You with These Apps

Followers are everything. After all, you need someone to listen to your tweets about last night's episode of your favorite TV show. But what about when people unfollow your account? Not only have you lost part of your follower base, you have no idea who left. Luckily, there are tools out there to help you learn just that, even if Twitter itself won't give up the info.

How To: Create an Evil Access Point with MitmAP

The threat of an evil access point has been around for a long time, and with the rise of open public Wi-Fi, that threat is often overshadowed by how comfortable we are using third-party Wi-Fi hotspots at coffee shops and public spaces. While we've shown an evil twin attack using the Aircrack-ng suite of tools, MitmAP is a Python tool to configure custom APs for many types of wireless attacks.

Video: How to Use Maltego to Research & Mine Data Like an Analyst

So much information exists online that it's easy to get lost in data while researching. Understanding the bigger picture can take a lot of time and energy, but narrowing the question to one that's easy to answer is the first step of any investigation. That's why analysts use open-source intelligence (OSINT) tools like Maltego — to help refine raw data into a complete understanding of a situation.