Gaining Psychological Search Results

Hack Like a Pro: How to Remotely Grab Encrypted Passwords from a Compromised Computer

Welcome back, my fledgling hackers! There's an evil dictator hellbent on destroying the world, and in one of our last hacks, we successfully compromised his computer and saved the world from nuclear annihilation. Then, we covered our tracks so no one would know what we did, and developed a hack to capture screenshots of his computer periodically so we could track of what he was up to next.

How To: Make Siri More Powerful on Your iPhone by Adding These Extra Voice Commands

While Siri may be the cream of the crop when it comes to smartphone personal assistants, there is always room to grow bigger and better (that's what she said). Siri, although recently expanded, is still lacking in the amount of commands and actions she can currently perform. While looking up directions and restaurants is fairly easy for Siri, asking her to gain access to third-party programs or browsers is a little more difficult.

How To: Hack Someone's Cell Phone to Steal Their Pictures

Do you ever wonder how all these celebrities continue to have their private photos spread all over the internet? While celebrities' phones and computers are forever vulnerable to attacks, the common folk must also be wary. No matter how careful you think you were went you sent those "candid" photos to your ex, with a little effort and access to public information, your pictures can be snagged, too. Here's how.

How To: Successfully Prestige in Call of Duty: Black Ops 2

The new Call of Duty: Black Ops 2 is the hottest game on the market right now, and there's no doubt it'll end up being the most unwrapped gaming gift come Christmas morning. The first-person shooter hopes to carry on the tradition of its many predecessors in bringing the most action-packed gaming modes, along with a high-replay value, to its legions of fans.

How To: Strengthen your 4th & 5th fingers with piano exercises

If you are looking to improve your piano technique then this how to video is the place to start. You will learn how to strengthen your fourth and fifth fingers with this easy piano exercise. The fourth and fifth fingers are often the weakest fingers when playing piano. You must learn to strengthen then so you can play piano better. This exercise also improves the extension between the ring finger and the pinky finger. This is a great exercise for beginner to advanced students. With this tutor...

How To: Beach Start Clew First

This video is all about gaining clew first sailing skills. If you've mastered the beach starts and water starts, then you're ready to learn how to get up on the board using the clew first style. When crashing gybes, jumps, and getting into waves, the clew first water start can be a great way of getting back on the board without having to flip the rig. Watch Sam Ross show you how.

How To: Create fire and smoke using Pyro FX in Houdini 10

The new Pyro FX in Houdini 10 are very impressive with improved workflow. The Pyro FX are great for creating 3D fire and smoke effects. And in this video tutorial series, you will learn the Pyro FX workflow in-depth and the parameters used to create fire and smoke effects. You will also see how volumetric data is created and recorded, and how to visualize it.

How To: Repair your lawn mower's pull starter with silicone spray

You're trying to mow your lawn, but the engine on your pull-string push mower isn't turning over— why won't it power up? Well, if your lawn mower was stored outdoors for a large amount of time, chances are that the recoil has built up some corrosion or is simply sticking. This video will show you a very simple repair, where you only need to remove 2 or 3 screws to gain access to the mechanism, then grease with silicone spray.

How To: Dance the Soukous

In this 5 part tutorial video, you will learn how to dance the Soukous. Soukous is a vernacular dance which is one of many roots of swing dance. Originating in the Democratic Republic of Congo, this form of dance has been modernized, much like today's swing is a descendant of the cakewalk and Texas Tommy.

How To: Share iCloud Drive Folders to Collaborators or as ZIP Files to Anyone from Your iPhone

In the iOS 13.4 update, Apple added folder-sharing capabilities in the Files app. That means you can share multiple documents at the same time instead of doing it one by one. But that's not all — you can share folders with numerous contacts and even enforce access and permission settings.

How To: Brute-Force SSH, FTP, VNC & More with BruteDum

Brute-forcing is an easy way of discovering weak login credentials and is often one of the first steps when a hacker finds network services running on a network they gain access to. For beginners and experienced hackers alike, it's useful to have access to the right tools to discover, classify, and then launch customized brute-force attacks against a target. BruteDum does it all from a single framework.

How To: Get Unique Face Filters by Following AR Creators on Instagram

It's easy to forget just how cool face filters are. Augmented reality has come a long way, and apps like Instagram now offer a suite of impressive effects to play with, but some of the best ones aren't easily found. There is a treasure trove of exclusive, custom face filters that are unavailable to the general public, but not at all inaccessible — you just need to know the trick to getting them.

How To: Crack Shadow Hashes After Getting Root on a Linux System

After gaining access to a root account, the next order of business is using that power to do something more significant. If the user passwords on the system can be obtained and cracked, an attacker can use them to pivot to other machines if the login is the same across systems. There are two tried-and-true password cracking tools that can accomplish this: John the Ripper and Hashcat.

How To: Perform Local Privilege Escalation Using a Linux Kernel Exploit

Getting root is considered the Holy Grail in the world of Linux exploitation. Much like SYSTEM on Windows, the root account provides full administrative access to the operating system. Sometimes even a successful exploit will only give a low-level shell; In that case, a technique called privilege escalation can be used to gain access to more powerful accounts and completely own the system.

Hacking macOS: How to Use One Tclsh Command to Bypass Antivirus Protections

Using Netcat to backdoor a macOS device has its short-comings. If the compromised Mac goes to sleep, the Netcat background process will occasionally fail to terminate correctly; This leaves Netcat running infinitely in the background and the attacker with no new way into the device. As an alternative, we'll use the lesser-known Tcl shell which can handle abrupt backdoor disconnections.

News: What Every Phone Gained by Adding a Notch

If bezel-less was the goal of OEMs in 2017, 2018 seems to be the year of the notch. Thanks in no small part to Apple's iPhone X, more and more smartphone manufacturers are designing their displays with this polarizing cutout. While many are frustrated with the trend, it's worth taking the time to consider what each phone gains with the unique design.