Illegal Ip Search Results

How To: Hack a bike lock without a key

Hacking a bike lock is something that you may need to do sometime if you forget your combination or maybe just didn't bring the key for the lock with you. You should never hack a bike lock to steal anything and should know that this tutorial is for informational purposes only. The first thing you will need to do to accomplish this task is to get a marker. Once you have the correct size marker to fit into the key hole, just stick it in there. Once it is in the lock, just press down while turni...

How To: Erase a CD-RW & Reuse It to Save Money

We know, we know: How many people actually burn stuff onto CDs these days? Well, while external hard drives that hold several terrabytes of data and flash drives have kind of replaced our reliance on CDs, every now and then they're good for quickly compiling a "Pop Hits of the '80s" CD for your girlfriend or simply for storing your illegal version of Microsoft Office.

How To: Make a VOIP phone call from your Google Gmail inbox

In this clip, you'll learn how to use Google's new VOIP (voice over IP) feature to make domestic and international phone calls from your Gmail inbox. For more information, including a complete demonstration of the process and detailed, step-by-step instructions, and to get started making calls from your own Gmail account, take a look.

How To: Turn a Microsoft Windows PC into a working telephone

In this clip, you'll learn how to make VOIP (or voice over IP) phone calls over your Windows PC. For more information, including a complete demonstration and detailed, step-by-step instructions, and to get started making phone calls over your own Internet connection, watch this handy home-computing how-to from the folks at CNET TV.

How To: Sneak out at night

We've all been there before. There's a huge party going on but your parents won't let you go out! If you're going to sneak out of the house, it helps to have a plan. This video will show not only how to sneak out, but how to get back in without getting caught.

News: The Galaxy S9 Is IP68 Water-Resistant — Here's What That Really Means

The day has finally arrived — Samsung has unveiled the Galaxy S9 and S9+. Apart from minor upgrades, the two might not appear to be much different from last year's S8 and S8+, but that's not necessarily a bad thing. One feature that hasn't changed is the Galaxy's IP68 water-resistance rating. That's a great score, but it begs the question — what does that number really mean?

The Hacks of Mr. Robot: How to Use the Shodan API with Python to Automate Scans for Vulnerable Devices

Shodan calls itself "the search engine for internet-connected devices." With so many devices connected to the internet featuring varying levels of security, the special capabilities of this search engine mean it can provide a list of devices to test and attack. In this tutorial, we'll use Python to target specific software vulnerabilities and extract vulnerable target IP addresses from Shodan.

Hack Like a Pro: Abusing DNS for Reconnaissance

Welcome back, my tenderfoot hackers! As you know, DNS, or Domain Name System, is critical to the operation of the Internet. It provides us with the ability to type in domain names such as www.wonderhowto.com rather than the IP address. This simple service saves us from having to memorize thousands of our favorite website IP addresses. Instead, we simply type in a domain name to retrieve the website.

How To: Add a CNAME record to tinydns (or djbdns)

In this überbrief video tutorial, you'll find instructions for adding a CNAME record to tinydns. The steps, demonstrated in the video, are as follows: Open up the data file, type a capital C, the domain you'd like to use, or subdomain, the IP address of the machine or destination you'd like that hostname to route to and the TTL or time to live. Save the changes, type make, and test it out!

How To: Set up your internet on Sciphone I68

Do you have a Sciphone? With its internet capabilities, you can check your email or surf the web. Take a look at this instructional video and learn how to set up your internet on the Sciphone 168. In order to set it up you need to contact your service provider for information such as an IP address, etc.

How To: Seize Control of a Router with RouterSploit

A router is the core of anyone's internet experience, but most people don't spend much time setting up this critical piece of hardware. Old firmware, default passwords, and other configuration issues continue to haunt many organizations. Exploiting the poor, neglected computer inside these routers has become so popular and easy that automated tools have been created to make the process a breeze.

Networking Foundations: Exploring UDP via Wireshark(Part 1)

Hello ladies and gentlemen, I'm back with another informative(hopefully) article for you all. Once again I would like to apologize for my absence for about a week or so. I have some stuff going on with my life and university and I haven't found enough time to make a fully in-depth article. In this article I'm going to walk you through one of the main networking protocols when it comes to communication across the Internet between programs, aka UDP(User Datagram Protocol).

Zanti: Nmap

In my last tutorial I very briefly introduced Zanti , but in this tutorial I will start to show its many features. The first step on hacking is recon . You could use Nmap , but the problem with Nmap on Android is that by itself, in order to gain full functionality your phone must be rooted. Thank goodness for a few geniuses in Zanti's dev team whom managed to implant full fuctionality of Nmap in Zanti without rooting your phone. With that being said, boot up your Android phone and lets start ...

How To: Set Up Private Internet Access in Linux

This tutorial is for those who've purchased an account with Private Internet Access to hide your VPN and would like to set it up in Kali. Please note, you can chose to run your PIA service from your Windows computer without configuring it in linux as long as you'll be using a NAT connection. Using a NAT connection will allow your Windows machine and Kali Virtual Machine to use the same IP address, hence if your IP is hidden on one, it will be hidden on the other.

How To: See Who's Clogging Up Your Wi-Fi Network with These Free Mobile Apps

Android has released a new application called ezNetScan, which is a free app that scans the wireless network you're connected to and gives you a full log of all of the devices connected to that network. This isn't new for smartphone users, let alone Android users. Fing has been around for a while and does practically the same thing that exNetScan does. It gathers information such as the IP and MAC addresses, device vendors, and ISP location. But while Fing is a great program, it does lack a f...

How To: Change your NAT to OPEN with a Linksys router

This is a Computers & Programming video tutorial where you will learn how to change your NAT to OPEN with a Linksys router. Go to your browser and type in 192. 168. 1. 1 and that will take you to the basic set up. The authentication dialog box comes up. Type in ‘admin’ for the username as well as the password. These are default settings. In the Linksys page, go to ‘applications and gaming’ and on the Port Range page fed in these information. Your application you can name anything. Start 80, E...