Government Gathers Search Results

How To: Play home run derby

It's summer again and it's time to get out of the house and there's no better way than with a fun game like some improvised baseball. You don't need a whole team of people all you need is a bat, a ball and another person to play with.

How To: Quickly Gather Target Information with Metasploit Post Modules

Post-exploitation information gathering can be a long and drawn-out process, but it is an essential step when trying to pivot or establish advanced persistence. Every hacker should know how to enumerate a target manually, but sometimes it is worth it to automate the process. Metasploit contains post modules that can quickly gather valuable information about a target, saving both time and effort.

Mac for Hackers: How to Organize Your Tools by Pentest Stages

With all of the bare-bones setup out of the way in our Mac for Hackers series, your Apple machine should be ready to run a significant amount of pentesting tools. We can pull tools from GitHub and compile them, we can pull dependencies or tools from Homebrew, we have both Python and Ruby. Everything is ready to go and now it's time to start building a toolbox on our local host.

News: It's Time to Ditch Your Yahoo Account

If the recent "state sponsored" Yahoo hack wasn't enough motivation for users to stop using their services, the latest news about Yahoo should be. Joseph Menn, a reporter at Reuters, just revealed that Yahoo created a custom email wiretap service for the US government.

News: Drop That Kindle—Amazon Removes Encryption Support for Fire Tablets (Update: It's Coming Back)

If you have personal information stored on a Kindle Fire tablet, be warned that Amazon has removed encryption support for Fire OS 5. So if you have stuff on these devices...maybe a risque book, or private notes, or pictures you'd rather not let out to the world, now would be the time to remove them. And unless Amazon changes its mind and re-enables encryption, don't use your device for anything personal, as anyone who gets a hold of it will be able to gain access to everything on it.

Hack Like a Pro: The Hacker Methodology

Welcome back, my neophyte hackers! Many newbie hackers seem to be confused regarding the process or methodology to employ a successful hack. Most want to simply go straight to the exploit without doing the due diligence to make certain that the hack will work and you won't get caught.

How To: Do Prom Bun Hair Style

Take a look at this new and contemporary Prom Bun Hair Style which is super cool and exclusive to adorn. Its over the top style has a unique and sophisticated appearance which appends a ritzy accent to your urbane persona. Try out this style following this simple tutorial. Step 1: Comb Your Hair to Make Them Smooth and Tangle Free. Once Done Gather All Your Hair in a

Hack Like a Pro: How to Exploit SNMP for Reconnaissance

Welcome back, my rookie hackers! The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked sources for information is the Simple Network Management Protocol (SNMP). Many rookie hackers are not even aware of it, but it can prove to be a treasure trove of information, if you understand how it works and how to hack it.

How To: Find & Eradicate Android Apps Maliciously Tracking You on Your Samsung Galaxy Note 2

A wave of shock and anger swept across the country after Edward Snowden released private documents recounting the U.S. government's secretive mass surveillance programs. Although some of the fear was unwarranted (they don't read your emails or listen to your calls), many scrambled to find privacy of new heights for protection from the all-watchful eye. While the government may not be tracking you down, there are a myriad of other candidates that fill that Big Brother role—and I'm not talking ...

How To: Understand the physics of waves: true story of Roswell

In this three-part video, learn about the events surrounding the newspaper article in Roswell New Mexico 1947 regarding crashed flying saucers. The story has to do with nuclear weapons, the second world war, government lies and the movement of sound waves. See how the evnst of Roswell tie in with physics of waves with help from host, Professor Richard Muller of Berkeley University.

How To: Make a Filipino-style chicken empanada

To make the Crust, mix the flour, sugar, baking powder and salt in a bowl. Cut in the butter and shortening with a knife or pastry blender until mixture resembles coarse breadcrumbs. Stir in the iced water, a little at a time while gathering the mixture to form a soft dough.

How To: Hook up a digital-to-analog converter box

Are you still watching television with an analog signal? If so, your TV may no longer work after February 17th, 2009. There is one easy fix to this problem though. There are many different kinds of convertor boxes out there, and the government is offering forty dollar coupons that you could use to get these digital-to-analog (DTV) converter boxes.

Beat Mirror's Edge Chapter 1: Flight Part 1/2

This is a video walkthrough for Chapter 1: Flight (PT. 1/2) in Mirror's Edge for the Xbox 360. The game has a realistic, brightly-colored style and differs from most other first-person perspective video games in allowing for a wider range of actions—such as sliding under barriers, tumbling, wall-running, and shimmying across ledges—and greater freedom of movement, in having no HUD, and in allowing the legs, arms, and torso of the character to be visible on-screen.

Beat Mirror's Edge Chapter 2: Jackknife Part 1/2

This is a video walkthrough for Chapter 2: Jackknife (PT. 1/2) in Mirror's Edge for the Xbox 360. The game has a realistic, brightly-colored style and differs from most other first-person perspective video games in allowing for a wider range of actions—such as sliding under barriers, tumbling, wall-running, and shimmying across ledges—and greater freedom of movement, in having no HUD, and in allowing the legs, arms, and torso of the character to be visible on-screen.

Beat Mirror's Edge Chapter 2: Jacknife Part 2

This is a video walkthrough for Chapter 2: Jacknife (PT. 2/2) in Mirror's Edge for the Xbox 360. The game has a realistic, brightly-colored style and differs from most other first-person perspective video games in allowing for a wider range of actions—such as sliding under barriers, tumbling, wall-running, and shimmying across ledges—and greater freedom of movement, in having no HUD, and in allowing the legs, arms, and torso of the character to be visible on-screen.

How To: Make coasters or decorative tiles with photographs

In this tutorial, we learn how to make coasters or decorative tiles with photographs. To make this fun art project, you will need: glue, glue stick, paint brush, tile, picture, and scissors. After you have gathered these, cut your picture out if you printed it out. Then, apply the glue from the glue stick to the back of it and place it on the coaster. From here, apply the glue to the area around the coaster and brush it around with a paint brush. Once you have covered the entire area of the c...

How To: Increase the power of a 5mw green laser pointer

In this tutorial, we learn how to increase the power of a 5mw green laser pointer. First, you will need to gather the parts you will need, which include a vise, the laser, a soldering iron, and a block of wood. After this, cut the block of wood in half and then put your laser pointer in the middle. Pull and twist so the module comes out, then pull the foam protector off. Don't lose any small parts that come out. Next, unscrew the silver cap and then put on your new laser module. Replace all p...

How To: Grasp the differences of census, study, & sample survey

In this tutorial, we learn how to know the difference: census, study, & sample survey. The census is when everyone's opinion is needed. An example is when you will see census studies happen throughout the year from the government seeing how many people live in one household. A study is when you only need the opinion of experts. This can be when companies are releasing a new product and need the opinions of doctors or dentists about it. A sample survey is when a few people's opinions are enoug...

How To: Make a 12" by 24" two-page scrapbook layout

In this tutorial, we learn how to make a 12" by 24" two-page scrapbook layout. First, you will need to gather all of your papers and stickers that you want on your pages. Also, grab your pictures you want to use. Next, figure out where you want to place your photo, then glue it down. After you do this, add on an additional photo in another space of the paper. Place a background underneath the picture first if you want to give it a matted look. Also make sure to place in any stickers that you ...

How To: Make lightning with a spoon and a balloon

In this video, we learn how to make lightning with a spoon and a balloon. First, you will need to gather a spoon and a balloon. Once you have these, blow up the balloon then tie it on the end so it's sealed. After this, rub the balloon on your hair and then slowly move the spoon towards the balloon. Turn the lights out and watch what happens. You will see sparks of electricity start to appear between the balloon and the spoon! This is great to do with children or as a quick experiment to show...

How To: Renew a US passport

In this tutorial, Laurie Lee-Partner teaches us how to renew a US passport. First, you can only renew your passport if you have the current one and it expired less than five days ago. You will first need government form ds-82 and remember to sign it in black or blue ink, then send it in. Next, you will have to send in your passport that has already expired or is going to expire. Next, you will need two identical passport photos that have been taken in the last six months. They must be in colo...

How To: Make an origami Shogun Japanese warrior for beginners

The Japanese Shoguns built their entire warrior culture around masochism. Did you lose in battle? Congratulations, you must cut off your own head! Did you dishonor your general? Punishment consists of swirling your guts around with your own sword (yes, you're doing this yourself) and then chopping off your head. As you can see, failure - and disobedience - was not an option, and to commit it shamed you so much it would be more honorable to be dead than alive.

How To: Use a memorandum of understanding to seal a deal

Using a memorandum of understanding, or MoU or letter of intent, is an important business tool that can help deals or projects in the business world. Many companies and government agencies are known for using MoUs to help with relationships with departments, agencies, and other close partners. Although it's not really thought of as a binding contract, they can have that power with the right words being used.

How To: Use a memorandum of understanding

A memorandum of understanding, or letter of intent, is used as a document that shows an understanding between parties. Although it can be used as a sort of contract, it needs to meet certain standards and wording. This MoU, as it's also referred to, is used amongst businesses and governments agencies. So if you need to figure out how to use a memorandum of understanding, this tutorial will tell you more about it. Good luck, pay attention, and enjoy!

How To: Hack a PlayStation monitor into a digital television

Hack a PlayStation monitor into a digital television! Get that old PS1 out of the closet and dust it off, because the switch to digital television is coming soon, and you need a DTV, so why not put that PlayStation One to use? You can build a digital television from a new set top digital converter box and that PSone video monitor, plain and simple. It's easy! Don't forget that forty dollar coupon though from the government for the purchase of the digital converter box.

How To: Enumerate SMB with Enum4linux & Smbclient

SMB (Server Message Block) is a protocol that allows resources on the same network to share files, browse the network, and print over the network. It was initially used on Windows, but Unix systems can use SMB through Samba. Today, we will be using a tool called Enum4linux to extract information from a target, as well as smbclient to connect to an SMB share and transfer files.

How To: Congress Wants to Make Unlocking Smartphones Legal Again—Here's How You Can Help

Whether you have AT&T, Verizon, Sprint, T-Mobile, or any other mobile carrier, chances are your smartphone is sold locked to only work on that specific carrier's network. Sure, you could unlock your carrier-subsidized device, but that would mean breaching the Library of Congress' latest Interpretation of the Digital Millennium Copyright Act—making the whole process illegal. As softModders, boundaries and regulations are things that we don't take lightly, although many times we have to begrudg...

How To: Use Dmitry Effectively.

Greetings comrades! Great leader has ordered that we gain intel on a website owned by the opposition. For all general purposes we will be scanning nmap.org because they really don't care if Big Brother decides to perform a whois on their IP. We will be using Dmitry for the scanning.

How To: Make a Sequel to a Game

If your company has already released some popular and addictive game and you're thinking about creation a sequel, this article is just what you need. We gathered the main tips and advices that will be useful for the building a strategy and a sequel itself. Check out the following instructions and recommendations that can lend you a hand in making a sequel for your game.

How To: Clean a dog's ears of dirt and wax

Your mother used to remind you to wash behind your ears now make sure you keep your dog in tip top health and clean their ears too. Dogs depend a lot on their hearing but can build dirt and wax in and around their ears which can be irritating or lead to infection.