Exploits Para Linux Search Results

How To: Reload modules in Python

Bucky from The New Boston serves up this Python video tutorial on how to reload modules in Python. This is the program you use to write all of your Python code down. Learn how to reload modules once your source file has been edited!

How To: Program methods in Python

Bucky from The New Boston serves up this Python video tutorial on how to program methods in Python. This is the program you use to write all of your Python code down. Fun with methods! Learn what methods are and how to use them.

How To: Backup Wii games to SD to play in HD

Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to backup Wii games to SD to play in HD.

How To: Get free WiFi by tunneling through DNS

Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to get free WiFi by tunneling through DNS.

How To: Build an Android application for mobile devices

This video tutorial is about Android, and no it's not a robotic creature, it's a software platform and operating system form mobile phones and PDAs. The Android system is based on Linux and was developed by Google and the Open Handset Alliance. Code is managed in the Java language, but can be written in C also, although C is not officially supported. A lot of the new cell phone and other mobile devices will be running off of Android, so know how to use it.

How To: Protect private files from prying eyes with TrueCrypt

Check out this video tutorial to see how to keep your private files private, even if you have to email them to yourself at your office? TrueCrypt, an open source piece of software, lets you encrypt your files so they remain accessible only to you. This works on any platform; Windows, Linux, or Mac. So, watch this video to see the TrueCrypt download process, how to install it, and how to create an encrypted volume on your hard drive.

How To: Build an application on Android for mobile devices

This video tutorial is about Android, and no it's not a robotic creature, it's a software platform and operating system form mobile phones and PDAs. The Android system is based on Linux and was developed by Google and the Open Handset Alliance. Code is managed in the Java language, but can be written in C also, although C is not officially supported. A lot of the new cell phone and other mobile devices will be running off of Android, so know how to use it.

How To: Do Favela glitches and tricks in Modern Warfare 2

GamingGuy118 shows a live walkthrough of glitches & tricks for Modern Warfare 2 on Favela. Watch step by step how to use a variety glitches & tricks during gameplay for Modern Warfare 2 on Favela. Strafe jump like a pro, learn the Elevator trick, find the perfect sniping places, and earn a lot of points. Learn the tricks to accessing untouchable positions. Exploit glitches to take out your enemies and render yourself untouchable. Hover a mile above the ground and take down your opponents. Fol...

How To: Cheat in Bejeweled Blitz legally

This shows me getting the highest possible medal on Bejeweled Blitz on Facebook applications by exploiting the timing window when the clock runs out (250k medal). To keep getting combos when the timer runs out, you need to select the next gem you want to swap before all the other gems are done falling. Once you have the desired gems selected repeatedly click the square that you want to swap. If you did it right, as soon as the gems on the screen all stop falling, your combo will go off and th...

How To: Hack websites with SQL injection

For Infinity Exists Full Disclosure's first Website Hacking episode, we demonstrate how to exploit a security vulnerability occurring in a website's database to extract password hashes. Sql (Structured Query Language) is a computer language designed for the retrieval and management of data in a system's database. The Attack, known as Sql Injection, manipulates Sql statements before they are sent to the Sql Server, allowing the Attacker to create, change, or retrieve data stored in the database.

How To: Set Up Private Internet Access in Linux

This tutorial is for those who've purchased an account with Private Internet Access to hide your VPN and would like to set it up in Kali. Please note, you can chose to run your PIA service from your Windows computer without configuring it in linux as long as you'll be using a NAT connection. Using a NAT connection will allow your Windows machine and Kali Virtual Machine to use the same IP address, hence if your IP is hidden on one, it will be hidden on the other.