Management Application Search Results

How To: Use the Hacker Defender rootkit or HackDef

Hacker Defender is one of the most widely deployed rootkits in the world. It is a user-mode rootkit that modifies several Windows and Native API functions, which allows it to hide information (files, processes, etc.) from other applications. In addition, Hacker Defender implements a backdoor and port redirector that operates through TCP ports opened by existing services. This means it is not possible to find the hidden backdoor through traditional means, like launching a remote port scan agai...

How To: Create PDFs in Mac OS X

A PDF file is a great way to share your documents with anyone. Both Macs and PCs can read them and it's very easy to create them in Mac OS X. From any application that you can print from, go to File–Print–which will open up the print dialogue box–and find the PDF button in the lower left corner. To learn more, and for a complete walkthrough of printing to PDF in Mac OS X (as well as information on using the handy Web Receipts) feature, watch this video tutorial.

How To: Apply an Ashanti inspired MAC makeup look

Pop/R&B singer Ashanti is the basis of this pretty silver and grey eye look. This how-to video demonstrates how to replicate this look that will really define your eyes. The cosmetic products used to create this look are Studio Fix Fluid Foundation, Makeup Forever HD Powder, Mineralize Skinfinish Duo in “Medium Dark,” Mineralize Blush in “Pleasantry,” Cream Color Base in “Pearl,” Painterly Paintpot, Platinum Pigment, Concrete e/s, Kid e/s, Brule e/s, White Frost e/s, Blacktrack Fluidline, Lor...

How To: Apply a Slave 4 U Britney Spears video makeup look

Just a few years ago, Britney Spears was considered hot. Regardless of what you think of her now, this how-to video recaptures her glory days via makeup. The cosmetic products used to create this look are MAC Studio Fix Fluid mixed with Covergirl Trublend, Bare Escentuals Foundation, NARS Laguna Bronzer, MAC Warm Soul Blush, MAC Cream Color Base in “Pearl,” MAC Blackground Paintpot, 88 Shimmer Palette from Coastal Scents, MAC Black Tied e/s, MAC Blacktrack Fluidline, Urban Decay 24/7 Eyeliner...

How To: Find Missing Apps on Your iPhone

Unlike on Android, you can't easily hide your iPhone apps. Sure, you can nestle them away in folders labeled "junk," but they're supposed to be omni-present somewhere on your home screen. That is, until one day they're just ... gone. The fact that some of your apps disappeared only makes it more frustrating because there's no logical reason why they should have, right?

How To: Set Up the Meta 2 Head-Mounted Display

So after being teased last Christmas with an email promising that the Meta 2 was shipping, nearly a year later, we finally have one of the units that we ordered. Without a moment's hesitation, I tore the package open, set the device up, and started working with it.

How To: Remove Bloatware on Your LG V30 — No Root Needed

With the V30, LG has really delivered an amazing smartphone that hits all the major features consumers want. Amazing camera, beautiful edge-to-edge display, great battery life, water resistance, and smooth performance — there isn't much not to like about the LG V30. Unfortunately, it does suffer from heavy bloatware thanks to the carriers. The good thing is, unlike in the past, you are not stuck with it.

How To: Extract Windows Usernames, Passwords, Wi-Fi Keys & Other User Credentials with LaZagne

After exploiting a vulnerable target, scooping up a victim's credentials is a high priority for hackers, since most people reuse passwords. Those credentials can get hackers deeper into a network or other accounts, but digging through the system by hand to find them is difficult. A missed stored password could mean missing a big opportunity. But the process can largely be automated with LaZagne.

News: Proof-of-Concept HoloTire App Shows How Much People Are Going to Love Shopping in Mixed Reality

We've already seen plenty of shopping potential for mixed reality headsets, from holographic car showrooms to trying on clothes and picking out furniture. Very few of those ideas have been put into actual practice, but we're getting closer, and consulting firm Valorem is making headway. They created HoloTire for the Microsoft HoloLens to demonstrate the advantage of experiencing a product in mixed reality. I'm hard-pressed to think of a more boring product to put on a holographic pedestal tha...

Hack Like a Pro: Snort IDS for the Aspiring Hacker, Part 2 (Setting Up the Basic Configuration)

Welcome back, my tenderfoot hackers! As you should know from before, Snort is the most widely deployed intrusion detection system (IDS) in the world, and every hacker and IT security professional should be familiar with it. Hackers need to understand it for evasion, and IT security professionals to prevent intrusions. So a basic understanding of this ubiquitous IDS is crucial.