Loaded' Search Results

How To: Control Your Android Phone via Your Computer for Easier Multitasking

In our society, multitasking is an obsession. Whether it's driving while using your phone (DON'T DO IT) or drinking a cup of coffee while typing up some work, we multitask at every turn of the day. People that work all day in front of a computer are especially prone to multitasking, and that's why XDA-Developers member Floyd1973 has developed a way to control any Android phone while connected via USB to a Windows or Linux PC. Android Remote Phone Tools

How To: Track a Target Using Canary Token Tracking Links

Canary tokens are customizable tracking links useful for learning about who is clicking on a link and where it's being shared. Thanks to the way many apps fetch a URL preview for links shared in private chats, canary tokens can even phone home when someone checks a private chat without clicking the link. Canary tokens come in several useful types and can be used even through URL shorteners.

How To: Abuse Session Management with OWASP ZAP

It's always a good idea to know how an attack works at the very basic level. Manual techniques for exploitation often find holes that even the most sophisticated tool cannot. Sometimes, though, using one of these tools can make things so much easier, especially if one has a solid foundation of how it works. One such tool can help us perform a cross-site request forgery with minimal difficulty.

How To: Manipulate User Credentials with a CSRF Attack

Web 2.0 technology has provided a convenient way to post videos online, keep up with old friends on social media, and even bank from the comfort of your web browser. But when applications are poorly designed or incorrectly configured, certain flaws can be exploited. One such flaw, known as CSRF, allows an attacker to use a legitimate user's session to execute unauthorized requests to the server.

How To: Replace the brushes in a corded DeWalt power drill

Removing and replacing the brushes in your DeWalt power drill doesn't have to be a costly repair. You can do it yourself, and it doesn't require a lot of time or effort. Simply unscrew and take the casing off your corded DeWalt power drill to expose the brushes. The model in the video has spring-loaded brush holders. It's as simple as taking the old ones out, and dropping the new brushes in. Learn from a pro to efficiently and correctly restore the brushes in your corded drill.

How To: Edit PDFs with Infix PDF Editor

Websupergoo demonstrates how to edit PDF files with the Infix PDF editor. Infix can replace an existing image with another image loaded from a file. To accomplish this, use the object select tool and choose the image for the replacement. The clipping mask is denoted by a pink border and will be retained and applied to the image that you would like to replace. Select the replacement by choosing the replace object option. Next, choose the replacement image from your computer files. After you re...

How To: Beat the World's Hardest Game in a few seconds

If you want to beat the worlds hardest game in a few seconds this is for you. The first step is to load the worlds hardest game. After the game is loaded right click on the pane and scroll down to the settings tab. Select the settings tab. After the setting tab is selected click the picture of the microphone located in the window pane. After this right click on the arrow using your mouse. To make this work loop and play must be ticked. After the game scrolls through all of the levels click th...

How To: Set Windows to boot from a CD-Rom first

The video shows users how to change the boot sequence in a computer with an older AMI (American Megatrends, Inc.) BIOS to boot from the CD/DVD drive. This is required, for instance, if you need to reinstall an operating system, or fix a corrupted windows installation by running Windows Setup from the installation CD. Users should first enter the BIOS setup by pressing the delete key when prompted shortly after powering the computer on. Once the Bios Setup screen has loaded, users may navigate...

How To: The Easiest Way to Download High-Res Cover Art for Albums, Movies, Books, Podcasts, Apps & More — Right from Your iPhone

The internet is saturated with low-quality pictures, making it difficult to find a high-resolution image for specific albums, TV shows, movies, podcasts, music videos, apps, and books. Apple uses high-quality images, but it seems impossible to download cover art, posters, thumbnails, icons, and other images from within its apps on your iPhone. Now, with the help of a shortcut, it's as simple as can be.

Hack Like a Pro: How to Use Hacking Team's Adobe Flash Exploit

Welcome back, my novice hackers! As most of you know by now, a notorious commercial, legal hacking group named "Hacking Team" was recently hacked. As part of the hack, thousands of emails and other material on their servers was divulged. Among the material released were three zero-day exploits. In this tutorial, we will walk through the steps to load one of them, which has become known as the CVE-2015-5119 exploit.

How To: Use the Nerf Gun Long Shot

In this how to video, you will learn how to use the Nerf Gun Long Shot. First, you will need to know about the magazine. These can hold 8 shots and are spring loaded. Do not load 8 shots, as it will jam. Instead, load 6 shots to prevent this. The shots can be used in other guns, but the Long Shot magazine can only use this shots. The holes in the shots make a whistling sound. If you get shot, you will feel it regardless of distance. The gun has a trigger, a mount, a quick grab design, a hidde...

How To: Install a Ceiling Hook

The tools required for this project are: an electric hand drill, a drill bit of the appropriate size and goggles to protect the eyes from falling debris. You will also need a ceiling hook kit, available in most major home stores. In the kit, there is a hook; a spring-loaded anchor; a threaded shank or screw, which is threaded on both ends; and another threaded shank or screw, which is threaded on one side and has screw thread on the other side for wood installation. To install in a sheetrock ...

How To: Exploit Remote File Inclusion to Get a Shell

A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website defacement to full-on code execution. For this reason, RFI can be a promising path to obtaining a shell.

How To: Use SELinux Targeted Policy to Secure Your Hosts

Hackers often rely on lazy system admins and unpatched vulnerabilities to get access to a host. Keeping intruders off of our machines requires us to update daily, only run the services we need, and read the code, among other things, but we can still make mistakes. Luckily for us, we can limit the damage caused by those mistakes by running SELinux.

News: What's New & Improved in Sense 6 for Your HTC One M7

After all the leaks and peeks of the HTC One M8, it has finally been officially introduced to the public, available for purchase at most U.S. carriers. HTC also unveiled Sense 6 during the launch event, the newest iteration of its operating system, and thanks to their new Advantage Program, the update shouldn't be too far behind for the older One (M7).

How to Hack Like a Pro: Getting Started with Metasploit

This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing professionals. There are hundreds of tools out there, but I will focus and those that meet four key criteria: