Infinite Access Search Results

How To: Use basic composition in a single camera setup

This episode of Take Zer0 discusses the differences between the multi-camera format used in television, and the single-camera setup most often used in film production. Since it's likely that indie filmmakers have access to only one camera, we will explain and offer examples of how to efficiently shoot multiple takes with one camera to convey a single action.

How To: Hack a Pepsi Machine

Learn how to con a vending Pepsi machine and access a secret (but benign) debug menu with this hack how-to video. While this hack won't get you any free soda, you might, at the very least, impress your friends with it. For complete instructions for this simple, pushbutton hack, take a look at this instructional video!

How To: Install a T-One vehicle wiring harness on a Forester

If you are going to use your Subaru Forester to tow, carry a cargo carrier that has lights, or if you have accessories that need power, you are going to need to install a T-One vehicle wiring harness. This video will demonstrate the simple installation of the harness on a 2007 Subaru Forester and includes tips showing which panels need to be removed, where to access the needed plugs, and good locations for the wires and module box.

How To: Capture video on Final Cut Pro

Don Schechter demonstrates how to capture your footage from your camera to your computer and log it for easy access later on for Final Cut Pro. Logging clips allows you to organize your footage without having to waste hard drive space.

How To: Share Wi-Fi Adapters Across a Network with Airserv-Ng

If you want to carry a variety of network adapters without looking suspicious, a perfect solution is accessing them through Airserv-ng. Tucked away in the Aircrack-ng suite, this tool allows a hacker to plug any number of network adapters into a Raspberry Pi and access them over a Wi-Fi or Ethernet connection.

How To: Use Metasploit's Timestomp to Modify File Attributes & Avoid Detection

It is said that the best way to avoid detection when hacking is to leave no trace, and often that means not touching the filesystem at all. But realistically, in most cases, it's impossible not to interact with the filesystem in one way or another. The next best thing to do to throw off any investigators is to change the file attributes to hide activity. We can do this with Metasploit's Timestomp.

How To: Root Your Pixel 3a with Magisk

The Pixel 3a came out of nowhere and flexed its muscles to show the industry that you can have a great phone without a hefty price tag. Since Pixel smartphones are first-party devices straight from Google, you can be sure you'll have root access one way or another. For right now the method used to get your Pixel 3a rooted will take a few steps, but they go by real quick.

How To: Perform Directory Traversal & Extract Sensitive Information

With all the web applications out on the internet today, and especially the ones built and configured by novices, it's easy to find vulnerabilities. Some are more perilous than others, but the consequences of even the slightest breach can be tremendous in the hands of a skilled hacker. Directory traversal is a relatively simple attack but can be used to expose sensitive information on a server.

How To: Most File Cleaners Are Trash — Here's Which Ones You Can Trust

Since the release of the T-Mobile G1, the Play Store has been flooded with apps that claim to improve performance by clearing cache and storage. These apps are typically useless, rarely providing more than a temporary fix which Android undoes immediately. As Android has continued to improve cache and storage management, such apps have become more trivial. However, there are few decent ones out there.

How To: Install Gitrob on Kali Linux to Mine GitHub for Credentials

GitHub is an extremely popular site that allows developers to store source code and interact with other users about their projects. Anyone can download public, open-source files on GitHub manually or with Git, and anyone can fork off someone's project to expand or improve it into its own project. It's a really great site for programmers, developers, and even inspiring hackers.

How To: 5 Mean Shoe Pranks You Must Try

The following are 5 pranks you can set up on your friends and family using their shoes. They're quite funny and to prepare these pranks all you really need are a few household items and a couple other things you can get at your local dollar store such as party snaps and party poppers. You'll also need access to your friends' shoes.