Ll Start Search Results

How To: Hack web browsers with BeEF

This video tutorial talks about browser exploitation. Particularly, it talks about tools, like BeEF, that can be used to hack known vulnerabilities within browsers and some cool frameworks that you can use to check the security of your own browser. To get started hacking your own browser, watch this how-to.

How To: Play "Perfect Day" by Lou Reed on piano

What better way to end a perfect day than by learning how to play one of your favorite songs? In this free video keyboard lesson, you'll learn how to play Lou Reed's "Perfect Day" on the piano. While this lesson is geared toward intermediate players, beginners are certain to take something away as well. Watch this tutorial to get started playing "Perfect Day" by Lou Reed!

How To: Solo over Carlos Santana's "Samba Pa Ti" on ukulele

Ever wanted to solo over the chord progression from Carlos Santana's "Samba Pa Ti" on your ukulele? Who hasn't, right? This ukulele lesson presents a quick overview of a highly adaptable G scale pattern that works over the progression in Carlos' Santana's "Samba Pa Ti." For more information, or to get started soloing over Santana's "Samba Pa Ti" on your own ukulele, take a look.

How To: Do barbell squats

Squats are probably the most useful exercise you can do at the gym—no other single exercise encourages more muscle growth. With a range of motion that incorporates many different muscle groups in the legs, core and upper body, squats strengthen not only those muscles, but also the tendons and ligaments that connect them. In addition to their strength-building benefits, squats also teach you core stabilization, which is important for almost any athletic endeavor. Learn how to do barbell squats...

How To: Build an infrared smart board with a Wiimote

Save tons of money by building your own LED pen that works with a multitouch smart board / whiteboard. You'll also need a WiiMote (Wii Remote) to use in conjunction with your homemade LED pens that you'll be making in this video. To get started with this awesome project, you'll need a 1.5 volt tolerant infrared LED, momentary push button switch, AA-battery case holder, one AA battery, containment unit (Sharpie marker or highlighter body), pliers, superglue, thin copper wire and a soldering iron.

How To: Get started with VoIP using Asterisk

Kevin Rose is joined by John Todd, a well known, leading Asterisk expert, to introduce you to the amazing VoIP (Voice over IP) world of Asterisk, the open source voip telephony toolkit. In this episode, Kevin and John take you through the installation and configuration of this powerful tool, and show how it can be used to give anyone complete control over their phone experiences, such as voice over wifi, eliminating phone costs, choosing from hundreds of VoIP providers, creating your own voic...

How To: Use These Tricks to Set Timers Faster on Your iPhone

The native timer feature on your iPhone works well enough that you probably haven't even thought about installing a third-party timer. With just a few taps, you can get a countdown for any amount of time up to 24 hours (or one second shy of 24 hours, to be precise). But as fast as it can be to set a timer from the Clock app, there are even faster ways to start the countdown.

How To: Block Someone from Using Their Camera During Zoom Video Calls

As a meeting host on Zoom, you can't control what a participant does during your live video call, but you do have the power to turn off their camera so that other people aren't subjected to distractions. So if you catch someone in your call purposely making obscene gestures or accidentally exposing themselves while using the bathroom, you can block their camera, as long as you know how.

How To: Turn Your Phone into a Teleprompter to Record Selfie Videos Without Breaking Eye Contact

If you record yourself for a vlog or story post using your selfie camera, it can be challenging to stay on message. You might worry too much about the way you look or sound to focus on what you want to say. Using a script can help, but looking away from the camera to read is unprofessional, even on social platforms like Instagram. What you need is a teleprompter, and there are apps for that.

How To: Set Up the Meta 2 Head-Mounted Display

So after being teased last Christmas with an email promising that the Meta 2 was shipping, nearly a year later, we finally have one of the units that we ordered. Without a moment's hesitation, I tore the package open, set the device up, and started working with it.

News: A New Branch in My Career.

When I started to go to this site I found it fascinating and found myself coming here all day I have used a lot of the info I have gotten from here in my professional career and on my own. I currently am the VP of RND for a small IT company. I have been pushing toward Penetration Testing as a service for our clients and future clients. For the past 10 years here it has been a very long uphill battle and have hit a lot of road blocks. So I decided to work on this on my own of course as soon as...

How To: Take Pictures Through a Victim's Webcam with BeEF

Recently, I've been experimenting with BeEF (Browser Exploitation Framework), and to say the least, I'm hooked. When using BeEF, you must "hook" the victims browser. This means that you must run the script provided by BeEF, which is titled "hook.js", in the victims browser. Once you've done that, you can run commands against the victims browser and cause all kinds of mayhem. Among these commands, there is an option to use the victims webcam. This is what we'll be doing here today, so, let's g...

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 8 (More Windows Registry Forensics)

Welcome back, my fledgling hackers! Let's continue to expand our knowledge of digital forensics, to provide you the skills necessary to be a digital forensic analyst or investigator, as well make you a better hacker overall. In your attempts to enter a system or network undetected, it is key to understand what a skilled forensic investigator can learn about you, the alleged hacker.