Hacking Macos Search Results

How To: Load & Use Keystroke Injection Payloads on the USB Rubber Ducky

Keystroke injection attacks are popular because they exploit the trust computers have in human interface devices (HIDs). One of the most popular and easily accessible keystroke injection tools is the USB Rubber Ducky from Hack5, which has a huge range of uses beyond simple HID attacks. The USB Rubber Ducky can be used to attack any unlocked computer in seconds or to automate processes and save time.

News: A Brief History of Hacking

Welcome back, my fledgling hackers! Hacking has a long and storied history in the U.S. and around the world. It did not begin yesterday, or even at the advent of the 21st century, but rather dates back at least 40 years. Of course, once the internet migrated to commercial use in the 1990s, hacking went into hyperdrive.

How To: Make Instant 'Aged' Bourbon Out of the Cheap Stuff

Step aside, vodka—whiskey will soon be the best-selling hard liquor in the United States. The whiskey renaissance has been largely attributed to the current trend for locally- and artisan-produced goods. Local whiskey distilleries are rapidly increasing in number across the nation while bars in every state are including the old-fashioned cocktail on their menus in an attempt to capitalize on the trend (which we can probably thank Mad Men for).

News: The Hacking of Blackhat, the Movie

A while back, I wrote review of my favorite hacking movies of all time. Two of my key criteria were; (1) how realistic was the hacking, and (2) are the hackers portrayed as the "good guys." This past winter, a new hacker movie was released, appropriately named Blackhat starring Chris Hemsworth (from Thor fame) as a blackhat hacker who is released from prison to stop a notorious and destructive hacker that only he can stop. Although the movie did very poorly at the box office, I thought it was...

The Sony Hack: Thoughts & Observations from a Real Hacker

By now, nearly everyone with any type of media access is aware that Sony Pictures Entertainment was hacked on November 24th. Although there can be many interpretations and lessons drawn from this audacious act, there is one indisputable conclusion: it and its ripples across the globe underlines how important hacking has become in our all-digital 21st century. As I have emphasized so many times in this column, hacking is the discipline of the future. From cybercrime to cyber intelligence to cy...

Hack Like a Pro: How to Use Netcat, the Swiss Army Knife of Hacking Tools

For over 20 years, a tiny but mighty tool has been used by hackers for a wide range of activities. Although well known in hacking circles, Netcat is virtually unknown outside. It's so simple, powerful, and useful that many people within the IT community refer to it as the "Swiss Army knife of hacking tools." We'll look at the capabilities of Netcat and how the aspiring hacker can use it.

Hack Like a Pro: How to Install BackTrack 5 (With Metasploit) as a Dual Boot Hacking System

Welcome back, my hacker novitiates! Many of you have written me that you're having difficulty installing and running Metasploit on a variety of platforms. No matter if you're using Mac, Linux, or Windows, I strongly recommend you install BackTrack as your secondary OS, a virtaulization system, or on an external drive. This particular Linux distribution has many hacking and security tools integrated—including Metasploit.

Hack Like a Pro: How to Cover Your Tracks So You Aren't Detected

Welcome back, my greenhorn hackers! Congratulations on your successful hack that saved the world from nuclear annihilation from our little, bellicose, Twinkie-eating dictator. The rest of world may not know what you did, but I do. Good job! Now that we hacked into the malevolent dictator's computer and temporarily disabled his nuclear launch capability, we have to think about covering our tracks so that he and his minions can't track our good works back to us.

How To: Flash an XBox 360 ms28 disc drive

There are several different kinds of disc drives that come in different iterations of the XBox 360, and each one has to be hacked a little differently. This video will show you how to flash the ms28 drive used in some systems, the second part of the video will show you how to determine what model of drive you have. It is very detailed, and should have you well on your way to hacking you beloved XBox 360 and maximizing its potential.

How To: Hack a Candy Machine with a Paper Coin

Craving candy but have no change? Then listen closely to this hack. This con how-to video shows you how to hack a candy machine by creating fake quarters. This hack trick should also work on parking meters. Never pay for candy or meters again. Watch this video tutorial on YouTube and learn how to hack a candy machine with a paper coin or cardboard.

How To: Hack your Facebook status updates and profile page

Want to add a dislike button to your page? Or want to make an update about what you did last night, but don't want your grandmother to read it? This video shows you ten ways you can hack your Facebook page. You can also pre-schedule certain status updates, set your Facebook language to 'Pirate English', create a status update word cloud, tag your friends in updates, add symbols to updates, and even redirect your friends back to their own profile page!

How To: Hack Sandcastle with Cheat Engine (01/08/10)

In this video, we learn how to hack Sandcastle with Cheat Engine. First, start the game and then click the process list icon. Now, use the Firefox browser and then type in the amount of gold you have into the value section. Now, buy something and then click the frozen box and change the value to 999. Next, when you buy something it will say that you have unlimited amount of cash. You will be able to buy all of the things you want, and you won't have to gather more coins to do so! This is a ve...

How To: Deal with having your website hacked

Google is one of the most powerful forces on the Internet, and their technology can be the key to helping you find success in whatever your online endeavor might be, from web design to filmmaking. This video is a part of their Google Webmaster Series, offering help to webmasters the world over on how to best utilize Google in their work. This video will show you how to restore your Google ranking after your website has been hacked. Hopefully you never will be, but if you are this video is her...

How To: Install ios249 on the Wii and play backup games

ios249 is a sweet little hack for the Wii that allows you to play backup burned copies of games on your console. Pirated games will work too, although we DO NOT condone piracy. This video will walk you through the whole rather elaborate process of installing it on a hacked Wii with the Homebrew channel. You will need to download a whole mess of free software:

How To: Use AGBX360 to stealth patch your XBox 360 games

You can hack you XBox 360 as perfectly as you please, but if you don't burn the games that you want to play on it properly than it will all be for naught. This video will teach you an important part of the process, using AGBX360 and S360X to stealth patch your .iso game files and make sure that they are SSv2. Taking these steps will ensure that the games you are burning are ready to be played on XBox 360's and ensure greater enjoyment of you XBox hacking experience.

How To: Hack Google to find anything

This is a Computers & Programming video tutorial where you will learn how to hack Google to find anything. There are no audio instructions; only a demonstration of the steps to follow. Go to Google and type into the search box: intitle:”index.of” (type anything here) and search. For example, type in: intitle:”index.of”Shakira mp3. And click search. Then you will get the search results. Now you can click on Index of…/songs and it will take you to the songs index page. From there you can downlo...