Handle Private Search Results

Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 12 (Web Delivery for Linux or Mac)

Welcome back, my budding hackers! Metasploit, one of my favorite hacking/pentesting tools, has so many capabilities that even after my many tutorials on it, I have only scratched the surface of it capabilities. For instance, it can be used with Nexpose for vulnerability scanning, with Nmap for port scanning, and with its numerous auxiliary modules, nearly unlimited other hacking related capabilities.

News: Why YOU Should Study Digital Forensics

As many of you know, I have been running a couple of series here on Null Byte about digital forensics called Digital Forensics for the Aspiring Hacker and Digital Forensics Using Kali. Although many readers have seemed to enjoy these series, just as many seem to be pondering, "Why should I study digital forensics?"

News: What REALLY Happened with the Juniper Networks Hack?

Last month, it was revealed that Juniper Networks' routers/firewalls were hacked. It was reported that a backdoor was implanted in the operating system of their routers/firewalls and that attackers could listen in on all encrypted communication. There are now fears that all confidential communications by U.S. government agencies and officials could have been compromised over the last three years.

News: Chinese Hack of U.S. Employment Records Reveals the Weakness of Signature-Based Defense Systems

With each day that dawns, there is a new, major hack that makes the news headlines. If you are paying attention, there are usually numerous hacks each day and far more that never make the news or are kept private by the victims. Every so often, a hack is so important that I feel compelled to comment on it here to help us learn something about the nature of hacking and IT security. This is one of those cases. Last week, the U.S. Office of Personnel Management (OPM) revealed that they had been ...

Hack Like a Pro: How to Spy on Anyone, Part 2 (Finding & Downloading Confidential Documents)

Welcome back, my tenderfoot hackers! A short while ago, I started a new series called "How to Spy on Anyone." The idea behind this series is that computer hacking is increasingly being used in espionage and cyber warfare, as well as by private detectives and law enforcement to solve cases. I am trying to demonstrate, in this series, ways that hacking is being used in these professions. For those of you who are training for those careers, I dedicate this series.

How To: Spot an Undercover Narcissist

Humans in general are great at keeping things about themselves private, from feelings to personality traits. While smartphones and social networks are making these secrets more open, narcissists have and always will love being out in the open with everyone's attention on them.

How To: Manage & Recover Your Facebook Chat & Messages History

In the UK, 20 percent of divorce filings include the word "Facebook." You may think you're being slick by using the site to chat with your ex, but the problem is that Facebook saves everything, and I mean everything. All someone needs is your login information and they have access to everything you've ever said on Facebook, public or private.

How To: Hack Someone's Cell Phone to Steal Their Pictures

Do you ever wonder how all these celebrities continue to have their private photos spread all over the internet? While celebrities' phones and computers are forever vulnerable to attacks, the common folk must also be wary. No matter how careful you think you were went you sent those "candid" photos to your ex, with a little effort and access to public information, your pictures can be snagged, too. Here's how.

How To: Create, share & embed a C-SPAN library video clip

C-SPAN is one of the best ways to get your news on the web. Watching their videos from their website will get you up-to-date on all of the new headlines, and it will always give you a history lesson with all of the past headlines. See something interesting while watching a C-SPAN video and want others to see it, too? C-SPAN makes it easy to clip the exact portion you want, and share it with friends or embed it on a website or blog. Just follow these instructions.

How To: Use Telescoping Poles for Fishing

Discover the art of Telescopic Pole Setup in this informative video, where we guide you through the process of preparing your pole for speedfishing. Whether you're targeting Bluegill, Crappie, Trout, or Perch, pole fishing stands out as one of the most effective methods to reel in a catch.

How To: Do the silk and ball magic trick

In this videos series, our experts Grace Fraga & Glenn Schneider will show you how to do the silk and ball magic trick. They will teach you about the supplies you'll need, all about the different balls you'll use, and teach you how to change the balls. They will also teach you how to handle the wand and finish the trick theatrically.

How To: Survive hiking in the Appalachian mountains

In this survival video series, learn how to survive hiking in the Appalachian Mountains from hiking expert David Jackel. David will teach you how to survive hiking in the Appalachian Mountains with camping tips and survival techniques such as how to pack for a camping trip in the Appalachians, how to choose footwear for hiking in the mountains, how to find firewood in the Appalachians, how to start a fire, how to find shelter when hiking, how to handle rain in the Appalachian Mountains, how t...

How To: Make a cappuccino mug

In this online video series, learn how to make a cappuccino mug from ceramics expert Susan Ting. Susan will teach you how to center porcelain clay on a potter's wheel, how to open the clay, and how to pull it up to create the basic shape of a cappuccino mug. She will show you how to form the shape of a cappuccino coffee mug, how to remove it from the potter's wheel, how to trim the bottom of the pot, and how to attach a handle to the cappuccino mug. Learn also how the firing and glazing proce...

How To: Do hacky sack moves

In this series of expert video clips, you will learn more about the fun and exciting hobby of hacky sack. Our hacky sack expert will show you a variety of different moves and tricks as well as introduce you to a few different games to play. In these educational videos you will see our expert perform basic hacky sack moves such as the over swoop and the foot stall. You will also get tips on relaxing. Keeping an eye on the ball can be tricky, but after watching this expert, you will have a bett...

How To: Be safe when welding

In this welding safety video series, learn from expert welder and welding teacher Malcolm MacDonald as he gives welding safety instructions, tips, and techniques on topics including: safety equipment (gloves, helmets); protecting yourself from fumes, fires, welding smoke, electric shocks; what not to do; welding on closed vessels; welding in wet conditions; handling gas cylinders; proper ventilation; tool safety; and tripping hazards.

How To: Use Your iPhone's Mail App to Send and Receive End-to-End Encrypted Emails in Gmail

Gmail uses TLS, or Transport Layer Security, by default for all email communications, so all of your emails will use the standard encryption as long as the recipients also support TLS. But there's a way to add even more security to your Gmail emails, and you can use your iPhone's Mail app to do it.

How To: The Way You Select Text on Your iPhone Will Change Once You Know These Hidden Tricks

While there's no denying that iPads are better when it comes to multitasking and productivity, your iPhone has a few tricks up its sleeve to rival even the best iPad features. One thing about iPadOS is that it's really easy to highlight editable text with gestures, but it's just as simple on iOS if you know all the secrets.