Info Relating Search Results

How To: Slip a Backdoor into PHP Websites with Weevely

Backdoors are convenient to leave behind once you've already found a way into a server, and they can come in handy for a variety of reasons. They're good for developers who want a quick way into machines they're working on, or for systems administrators who want similar access. Of course, backdoors are also a hacker's best friend, and can be added in a variety of ways. One good tool for doing this is Weevely, which uses a snippet of PHP code.

How To: Be More Secretive Using Hide SMS and Call Recorder

Some people are of extremely secretive nature. They do not like sharing their personal events in their lives with anyone. Thus people around that person wont be able to figure out details on their life's personal matters. It is not like they want to hide some mysterious secrets from the world, but it is just their nature that they do not want others to know much about them or are too shy to share their feelings with others. Being secretive is neither good nor bad, it is just how they are.

iOS Basics: How to Add Widgets to Your iPhone's Lock Screen & Notification Center

Apple definitely wasn't first to the widget game, but any iPhone running iOS 8 or higher can add widgets to their Today View found via a swipe down from the top of the screen when on the home screen or in any app. There's even access to widgets on the lock screen via the same swipe down on iOS 8 and iOS 9 (on iOS 10, iOS 11, and iOS 12, all you have to do is swipe right on the lock screen).

Hack Like a Pro: How to Exploit SNMP for Reconnaissance

Welcome back, my rookie hackers! The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked sources for information is the Simple Network Management Protocol (SNMP). Many rookie hackers are not even aware of it, but it can prove to be a treasure trove of information, if you understand how it works and how to hack it.

How To: Make iPhone ringtones for free with iTunes

In this video, we learn how to make iPhone ringtones for free with iTunes. First, open up iTunes and open up the song you want to make a ringtone out of. After this, right click and click "create an aac version". It will start to convert, then once that's done right click on the new song and click "get info". Now you can adjust the start and end time of the song, depending on what you want your tone to be. When finished, click "ok", then create an aac version of this new song. Delete the firs...

How To: Change CNAME records of a domain and create email apps

You can create the Google apps email like Gmail for your domain. So to do this first you need to go to the google.com/a and click on the standard in "other Google apps editions". Now click on "get started". Now select "administrator: I own..." and enter your domain name and click get started. Now on next page create your account by filling all the fields and click continue and now fill the info of your administrator account and click I accept button. Now next step is for the verification of y...

How To: Run multiple Windows operating systems simultaneously

If you want to run multiple windows operating systems at the same time you first need a Windows computer, the installation disk for the operating system you want to run, and Windows Virtual PC 2007. To install this, first type in Virtual PC 2007 to Google, go to the Microsoft link and download and install the program. Now, open the Virtual PC and click next on the wizard. Name your hard disk and click next until you choose where you want this at. Now your virtual hard drive is created. Now, p...

How To: Legally put ringtones on your iPhone 3Gs

TubeTutorials teaches viewers how to legally put free ring tones on their iPhone 3GS! First, go to start menu and click on computer. Click on organize, layout and make sure menu bar is checked. Click on tools and go to folder option go on view and uncheck 'hide extensions for known file types' and click 'apply'. Now open iTunes and pick a song you want. First, right click the song click get info. Go to options and click start time and stop time. Copy the stop time and change the stop time and...

How To: Download torrent files

This video is about how to download torrent files. The first thing that you will have to do is to open your uTorrent. After opening your uTorrent, open your browser and browse torrent sites that suit you best. Once you have found the site that you like, search for torrent files that you are interested in. Once the results have been displayed, refer to the number of seeds since this increases the download speed. Once you have found the largest number of seeds, click on the title of the file. A...

How To: Make free ringtones for a non-jailbroken iPhone 3G

gjtfreak demonstrates a new free tip for the iPhone 3G on how to get free ringtones on a Windows Vista environment in this video. Firstly go into the start menu open control panel option and from that open folder option. Click on view and find a box that says hide extensions for known file types and unclick that box click apply and then OK. Secondly open up iTunes and pick the song you want to use and go into the preferences column at the top left of the iTunes window. Make sure that the ring...

How To: Make and publish a podcast using Audacity

RabbidHedgeHog shows viewers how to easily make a podcast. This features how to make the podcast with the program Audacity. First open your internet browser and go to Audacity. Scroll down to download Audacity 1. 2. 6, save the file, Install and download the program. Now, open up Audacity which is basically a recorder. Connect your microphone which will allow you to record. Click edit, preference, find microphone and select the device you will use. Now, record your podcast by clicking the red...

How To: CC in a Physical Business Letter

CC, which stands for "carbon copy", is a familiar phrase in email, but can also be used in business letters and legal documents. This can be especially useful for letters you want to spend up a company or organizational chain, letting each recipient know exactly who else received the same document.

How To: Remove the fake virus protector Personal Antivirus

Having problems with your anti-virus software on Windows? Learn how to remove the fake virus protector Personal Antivirus! Personal Anti-Virus is NOT a legitimate anit-virus software and will use spyware to steal info from your computer. Personal Anti-Virus is hard to get rid of and is totally annoying. To get rid of it, you don't have to download anything.

How To: Hack a cell phone to make free phone calls

Want to control a friend's cell phone remotely and make "free" calls from it? In this hack how-to video, you'll learn how to hack Bluetooth-enabled cell phones with your Sony Ericsson or Nokia phone and the Super Bluetooth Hack—or "BT Info"—, a free program easily found through Google. Once installed, Super Bluetooth Hack will enable you to control your friends' cell phones remotely.

How To: Use Rembrandt lighting for images in Photoshop

This Photoshop video series is going to explain how to create a chiaroscuro lighting effect on an image. This art form was made famous by the Italian artist Rembrandt. Part one covers the origin of terms and how to create chiaroscuro dramatic lighting. Part two has instructions for downloading the image, and some very basic workspace and preferences instructions for beginners. Part three covers Duplicate Image, File Info, File Size, Eyedropper Sample, Doc Status Bar, Panels/Palettes. Part fou...

How To: Get your sister to stop stealing your clothes

She thinks just because you're related that your closet is her closet; and if she ever gives your things back, they're never washed. If it's time to stop your sister from being a closet bandit, check out this video. This tutorial is full of tips for gettinf rid of that pesky sibling and keeping your clothes all to yourself.

How To: Clear up office clutter

It's easy to find yourself drowning in a pile of papers and nick-nacks if you're not armed with a good organization system. By taking the time to set up a system where everything is condensed and has a place you'll find it much easier to keep it that way.

How To: Gather Information on PostgreSQL Databases with Metasploit

Attacks against databases have become one of the most popular and lucrative activities for hackers recently. New data breaches seem to be popping up every week, but even with all of that attention, databases continue to be a prime target. All of these attacks have to start somewhere, and we'll be exploring a variety of methods to gather information on PostgreSQL databases with Metasploit.