Major Networks Search Results

How To: Hack SSL passwords with ARP poisoning

Are you serious about becoming a bonafide hacker? Then you simply must learn how to hack SSL passwords using ARP poisoning. ARP poisoning, also known as ARP spoofing, involves attacking an ethernet wireless network by looking at the data frames on a LAN (local area network). Resultingly, you can sniff plaintext passwords, SSL passwords, and even manufacture denial-of-service attacks.

How To: Play scales in the Locrian mode on the piano

The Locrian mode has the formula 1, b2, b3, 4, b5, b6, b7. Its tonic chord is a diminished triad (Bdim in the Locrian mode of the diatonic scale corresponding to C major). This video explains how to play scales in the Locrian mode on the piano and also gives a great breakdown at the end of each mode in C.

How To: Hack Wi-Fi Networks with Bettercap

There are many tools out there for Wi-Fi hacking, but few are as integrated and well-rounded as Bettercap. Thanks to an impressively simple interface that works even over SSH, it's easy to access many of the most powerful Wi-Fi attacks available from anywhere. To capture handshakes from both attended and unattended Wi-Fi networks, we'll use two of Bettercap's modules to help us search for weak Wi-Fi passwords.

How To: Use an ESP8266 Beacon Spammer to Track Smartphone Users

Smartphones and laptops are constantly sending Wi-Fi radio signals, and many of these signals can be used to track us. In this guide, we'll program a cheap IoT device in Arduino to create hundreds of fake networks with common names; This will cause nearby devices to reveal their real trackable MAC address, and it can even let an attacker take over the phone's data connection with no warning.

How To: Use SSH Local Port Forwarding to Pivot into Restricted Networks

SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port forwarding, secure file transfer, and more. Using SSH port forwarding on a compromised host with access to a restricted network can allow an attacker to access hosts within the restricted network or pivot into the network.

How To: Do the lighter makeup look from the Taylor Swift music video for "Mine"

Taylor Swift is one of the most talented and most beautiful musicians to grace the pop stage in quite some time. Her latest single "Mine" lives up to the legacy of her past hits by being insanely catchy and having really clever, deep lyrics. If you liked the makeup look she rocked in the music video, watch this. It will show you how to recreate that look yourself. No word on how to replicate the blonde guy though...

How To: Crack the combination on a combination lock with no math

Combination locks are a major part of life for people High School, the Armed Services, and enough other places to make this video very useful to a lot of people. It will show you how to open any twisting combination lock (like a Masterlock) with using math or any other sophisticated skills or tools. All you need is a sharp knife and your fingers. Now you won't have to wonder whether Person X has your picture up in their locker or not anymore.

How To: Prank your friends into thinking their computer has had a major DOS error

DOS may be a distant memory for most computer users at this point, but for many it will always be the first thing that pops into their head when they ponder PC computing. Nowadays, the only time most people see anything that even looks like DOS is if they're playing old PC games in a shell or something has gone very, very wrong with their computer. With this prank, you can make your friend believe that the latter has happened to them! All you do is open the DOS command program (Windows XP or ...

How To: Create a nuclear blast on 2D surface in After Effects

Not TOO many Western people want to see the United States nuked into the stone age. Some do, but not too many. Now you can simulate the effect on your computer! This video will show you how to use After Effects to simulate the effect of a nuclear blast or other major explosive catastrophe on a map of the US in 2D. This effect is used in many video games and movies, so master it yourself and we promise that you'll find cause to use it again at some point.

How To: Prevent workplace-related back injuries and back aches

Work can be a rough place, especially if you're in construction or another laborious field of work, but that doesn't mean that anybody who works (or even doesn't work) isn't susceptible to work-related injuries. The most common workplace injuries are back injuries. This educational video, entitled "Back Your Back: Back & Muscle Injury Prevention" is all about reducing your risk of back problems.

How To: Suture a wound with a first aid kit in austere conditions

In a wilderness survival situation, someone in your group suffering a major laceration is a catastrophe. Achieving sterility and suturing the wound closed will both be very difficult to achieve. This four-part video series features a detailed explanation and demonstration of how to use a basic first aid kit to suture a wound closed in an austere situation, such as out in the wilderness. Suturing a wound closed in an austere setting is a last resort, but knowing how to do it could keep you or ...