Indexes Scanned Search Results

How To: Hack Age of War 2 with Cheat Engine (01/08/10)

In this video tutorial, viewers learn how to hack the flash game, Age Of War 2. Users will need to download the Cheat Engine program for this process. Begin by starting the game. The game should start with 2500 gold. Then pause the game and open Cheat Engine. Click on the Process computer icon and select the current web browser. Now type "@500" into the Value box and click First Scan. Then deduct your amount of gold, type in the new value and click on Next Scan. There should only be 1 result ...

How To: Use Avast to remove viruses and speed up your computer

Ian Brown shows us how to use Avast to remove viruses from your computer. First, go to Avast.com and download their new and free edition of their virus protection. After you have installed this program, you will receive an email with your product key to access the program. Now, change the settings on the program so it scans your computer at least once a day for viruses. Now, reboot your computer to save settings and scan your computer automatically for viruses. When you see a blue screen with...

How To: Throw playing cards with skill

In this video, you will learn the best way to throw cards. This takes practice, as many people who first try to throw card do not have the right grip. In order to throw the card properly, you will need to place your thumb on the center of the top side and the index finger on the corner. When you throw the card, use your index finger to create spin. You can use your wrist to add more power, or put your entire arm into it to increase throwing distance. You must work up to using your entire arm....

How To: Remove the trojan .dnschanger virus with Malwarebytes

In this video you will learn how to remove the Trojan .dnschanger virus with Malwarebytes. To see if you got a Trojan .dnschanger virus go to your network connections right click on Local Area Connection, select proprieties, click ok internet protocol, click again proprieties and if you got an ip address at preferred DNS server that means that the Trojan entered a fake ip address. You can remove the Trojan. To do this first run the Malwarebytes application, click on the update tab, click on c...

How To: Do a Simple NMAP Scan on Armatige

How to do an NMAP scan on Armitage to find IPs within a certain range. Armitage is a gui interface of Metasploit, and advanced hacking/exploiting program. It can be downloaded from http://metasploit.com/ and http://fastandeasyhacking.com/ and you will need NMAP. http://www.nmap.org/

How to Use Photoshop for video: pan & scan image preparation

In this Adobe Photoshop tutorial the instructor shows how to prepare pan and scan images. To prepare an image by panning and scanning is quite different than preparing an image normally for using in your video. These images should be extra sized as you would perform special effects on the image in your video. This is also called as "Ken Burns" effect. Now go to the file, new menu and select the video format that you want to use according to your requirement. Enable the correct pixel aspect ra...

How To: Attach Photos, Document Scans & Web Links to Reminders in iOS 13

Apple's Reminders app has always been an underrated yet useful productivity tool for iPhone. It's not as powerful as many third-party to-do apps, but it makes it easy to keep track of a few basic tasks, and it's integrated deeply with iOS, macOS, and watchOS. In iOS 13, it's even better since you can now add attachments to your reminders, such as photos, documents, and webpages.

Zanti: Nmap

In my last tutorial I very briefly introduced Zanti , but in this tutorial I will start to show its many features. The first step on hacking is recon . You could use Nmap , but the problem with Nmap on Android is that by itself, in order to gain full functionality your phone must be rooted. Thank goodness for a few geniuses in Zanti's dev team whom managed to implant full fuctionality of Nmap in Zanti without rooting your phone. With that being said, boot up your Android phone and lets start ...

How To: Do an Idle Scan with Nmap

Welcome back my fellow hackers. Today I'm going to teach you how to preform an Idle Scan. You may be asking what is an Idle Scan. Its a very stealthy scan because you don't use your own ip you use a zombie (in computer terms).

Hack Like a Pro: Scripting for the Aspiring Hacker, Part 2 (Conditional Statements)

Welcome back, my greenhorn hackers! I recently began a series on scripting and have received such positive feedback that I'm going to keep this series going. As I've said before, to graduate from the script kiddie to the pro hacker, you'll need to have some scripting skills. The better you are at scripting, the more advanced your hacking. Ultimately, we are leading up to developing the skills to build your own zero day exploits.

How To: Install Jog Grips on a VCI-100 MIDI controller

Interested in having your VCI-100 feel more like a CDJ-1000 when pitch bending? Jog Grips have been designed so that your hand naturally falls half on, half off the grips when you grab the wheel. So one of your fingers activate the touch sensor while the index finger benefits from from the grip and added tactility. For step-by-step instructions on the Jog Grip installation process for VCI-100 controllers, take a look.

How To: Make a simple port scanner in VB.Net

This is a Computers & Programming video tutorial where you will learn how to make a simple port scanner in VB.Net. It detects all the open ports on your network. Open up a Form1 and you will have a ListBox1, a ‘Start’ and a ‘Stop’ button and a blank text box. There is also a Timer1 button at the bottom. Thereafter, the video shows the various parts of the code on the screen. Then click on Debugging, and click ‘Start’. The system starts scanning ports starting with port 1. In the video it show...

How To: Port scan with Nmap

Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they a...

How To: Use Metasploit's WMAP Module to Scan Web Applications for Common Vulnerabilities

Having an efficient workflow is an integral part of any craft, but it's especially important when it comes to probing apps for vulnerabilities. While Metasploit is considered the de facto standard when it comes to exploitation, it also contains modules for other activities, such as scanning. Case in point, WMAP, a web application scanner available for use from within the Metasploit framework.

Hack Like a Pro: How to Scan for Vulnerabilities with Nessus

Welcome back, my tenderfoot hackers! Generally, you will want to perform a vulnerability scan before doing a penetration test. Vulnerability scanners contain a database of all known vulnerabilities and will scan your machine or network to see whether those vulnerabilities appear to exist. If they do, it is your job to test whether they are real and can be exploited.

How To: Anti-Virus in Kali Linux

Hello fellows nullbyters, first of i will start saying that im addicted to this community, i feel the challenge growing up so fast, all the newbies, amateurs,advanced and professionals hackers around trying their best to help the community, badly but we got some script-kids too but anyway, today we are going to learn how to install and use clanAV in kali linux.. INTRODUCTION

How To: Build a Stealth Port Scanner with Scapy and Python

As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance. The issue with port scanning is that is makes a lot of noise. Every connection to every port will be logged. This is where stealth scanning comes in. Also known as SYN or half-open scanning, stealth port scanning is a bit quieter, and is l...

How To: Have Proper Risk Managment When Trading

This video is teaching you how to have proper Risk Management when trading. Not managing your risk will eventually kill your capital, whether you are trading stocks, forex, futures or indices. After explaining the concepts instructions are provided for you to adopt the principles mentioned.