Highly Vulnerable Search Results

How To: Jerk (dance) - The "ReJect"

Curious how to Jerk dance? Team ExClu$!v3 is here to show us all we need to know in the world of jerk dancing. Instructors Michaelangelo and Donatello take us step by step through a move called "the ReJect" making it look easy, but don't get fooled! The ReJect is quite difficult and is in actuality, a highly technical move... So be sure to watch closely and don't be afraid to rewind and re-watch until you have it down smooth!

How To: Exercise picking musically on the guitar

To play a guitar riff is to do more than simply to memorize a short musical phrase. Guitar riffs are like any other musical exercise; practicing them can be a terrific means of building manual dexterity and improving your overall playing technique. We can say of riffs, then, that they are not so much about rote repetition as making available to the guitarist new and different ways of playing. Every new riff you learn will make you a more able and versatile guitarist and better equip you to st...

How To: Fold a paper airplane

This instructional video shows how to make a simple and very effective paper airplane that can stay aloft for about half a minute. It is a simple and elegant design which does a fantastic job of balancing the weight of the craft forward and makes for a highly stable and effective airfoil. It's a great deal of fun to make and almost as much fun to fly. Give it a try! Watch this video origami tutorial and learn how to fold a paper airplane.

How To: Mix a classic Old Fashioned mixed drink cocktail

The Old Fashioned is one of America's earliest cocktails. It has very few ingredients, but is very complex and is quite challenging. Brown sugar syrup adds extra flavor and works very well with the bourbon. If you use a different base, such as Crown Royal Canadian whiskey, brown sugar syrup might be too overpowering. Bitters is an important part of the Old Fashioned and the amount is entirely up to you (although omitting the bitters is not an option). Adding the orange zest is highly recommen...

How To: Abuse Vulnerable Sudo Versions to Get Root

Anyone who has used Linux long enough is familiar with sudo. Short for superuser do (or substitute user do, depending on who you ask), it allows users to run commands as either root or another user on the system. From a hacker's point of view, sudo is often all that stands between them and root access. We'll be exploring an older vulnerability in sudo that allows a user to run commands as root.

How To: Do an Idle Scan with Nmap

Welcome back my fellow hackers. Today I'm going to teach you how to preform an Idle Scan. You may be asking what is an Idle Scan. Its a very stealthy scan because you don't use your own ip you use a zombie (in computer terms).

Hack Like a Pro: How to Hack the Shellshock Vulnerability

Welcome back, my hacker novitiates! Every so often, a MAJOR vulnerability appears that makes millions of systems vulnerable to attack. The most recent, named Shellshock, basically leaves every Mac OS X, Linux, and UNIX system on the planet vulnerable. As nearly two-thirds of all web servers on planet Earth run one of these operating systems (primarily Linux), that's a whole lot of systems out there waiting to be harvested.

How To: Every Mac Is Vulnerable to the Shellshock Bash Exploit: Here's How to Patch OS X

Heartbleed, move over. There's a new bug in town, and this time it's also affecting Mac and Linux computers. It's called Shellshock (its original official title is CVE-2014-6271), and it's currently got a 10 out of 10 severity rating over at the National Cyber Awareness System. While some updates have been issued to fix this bug, they were incomplete, and your system is probably still vulnerable, as it has been for the last probably 20 years.

How To: Long Hair Messy Bun

Buns make the look of a woman highly fashionable and cool. Transform your appearance into highly swanky and dashing by following this simple tutorial to make an awesome Long Hair Messy Bun and instantly transform your simple look into a fashionable one. Step 1: Comb Your Hair and Make a High Pony. Now Take Small Section of Hair from the Pony and Start Backcombing the Surface Side. Step 2: Now with Your Fingers

News: Have an NFC-Enable Phone? This Hack Could Hijack It

Some of us use our smartphones for almost everything. Manufacturers know this, so they try to make their devices as convenient as possible to use, but sometimes that convenience comes with a cost to security. The very same technology that allows you to easily share music with friends and make purchases can also put you at risk. Photo by sam_churchill

How To: Harvest garlic scapes

Harvesting garlic scapes is a simple and very easy task. Grab some small clippers and then head out into the garden. Make sure you have harvested it before it has sprung its flower. Also make sure you cut it before the scape has curled around (at the top of the scape and where the flower will form), it tastes better and is nice and tender. Locate the scape and make a small mental note on where your going to cut it. The best location to do that is, as far down as the last set of leaves (near t...

How To: Build confidence during pregnancy

For many women, pregnancy is a very vulnerable time, especially when it comes to the health of their child. Your body is changing on a constant basis and it can be hard to find confidence in the fact things will go well. You can learn through this video that you can be proactive in the process of ensuring a healthy pregnancy. Having a diet that is full of healthful foods is key to making sure your pregnancy is on the track to good health. Exercise and reducing stress are also touted as good s...

How To: Protect your hands in boxing with a correct handwrap

Quinten shows us how to protect your hands in boxing using a correct hand wrap in this video. When you punch something, you put a lot of pressure on your hands and wrists so wrapping your hands before this is highly recommended. First, start on one end of the wrap and put your thumb through the loop at the end. Go over the top of the wrist first, then go over the top of the hand over the knuckles. Keep your fingers parted so the wrap doesn't become too tight at the end. Go between the knuckle...

How To: Recover deleted email in Outlook, Eudora

Computer forensics expert Steve Burgess gives a highly informative tutorial on how to recover deleted emails in Outlook and Eudora. The most critical factor affecting the recoverability of deleted web-based emails, according to Steve, is whether the PST file, which stores all the emails, has been compressed after the mail was deleted. If this hasn't been done it is possible to hack into this file and recover the deleted email. Text-based emails, like those one creates on programs like Eudora,...

How To: Draw cartoon girl clothing

Michael, a graphic designer, teaches us how to draw a cartoon girl's clothing. He draws this image in some light shaded pencil. He draws her hair, ear and the basic outline of her face. He then draws her basic build which is her chest, her arms and her legs. He uses a marker to highlight his strokes. He uses clean, precise, straight strokes and when drawing cartoon figures, this type of drawing technique is highly recommended. After drawing the girl, you can go ahead and decorate her clothing!

How To: Know which documents to have while traveling

Planning your vacation? Going on a trip? You definitely do not want to be caught without all your necessary documents. In this video, the viewers will be exposed to the basic list of documents that the viewers should bring with them on their trips. In addition, this video will describe some of the common problems that people encounter while traveling and offer basic solutions for these problems. Therefore, this video is highly recommended for any individual who may go on a trip at some point ...

How To: Make a strap lock for guitar

In this guitar tutorial, learn this great tip on how to make your own strap lock system for musical instruments. No modifications are required to the original buttons or button holes. They can be easily removed and replaced if necessary. They are sometimes called "lock-picks." Of course, these don't have to be made from a pick (although the nylon material is highly recommend), but guitarists don't go to the hardware store for parts. Make a strap lock for your guitar and play guitar with ease!

How To: Make a polymer clay dragon votive candle holder

Suzanne Ivester demonstrates how to cover a glass votive candle holder with stenciled polymer clay and embellish it with rubber stamping and metallic effects. Polymer clay is a highly versatile material and can be manipulated to create various effects for myriad crafting projects. Watch this video crafting tutorial and learn how to make a polymer clay candle holder with an Asian-themed dragon.

How To: Find & Exploit SUID Binaries with SUID3NUM

File permissions can get tricky on Linux and can be a valuable avenue of attack during privilege escalation if things aren't configured correctly. SUID binaries can often be an easy path to root, but sifting through all of the defaults can be a massive waste of time. Luckily, there's a simple script that can sort things out for us.

How To: Detect BlueBorne Vulnerable Devices & What It Means

Armis Labs has revealed eight vulnerabilities, called "BlueBorne", which put 5.3 billion Android, iOS, Windows, and Linux devices that use Bluetooth at risk. With it, hackers can control devices, access data, and spread malware to other vulnerable devices through networks. In this post, we will learn about the vulnerabilities, then look at how to find devices that have them.