Network Abilities Search Results

How To: Encrypt an Apple AirPort with WEP password protection

In this video tutorial, viewers learn how to set and encrypt the wireless password using WEP Apple Airport. Begin by opening the Apple Airport utility program. Then find the network's name and double-click on it. The Configure "Apple Airport Express" opens, click on the Airport tab. Then click on the Wireless Security button. Now click on the Wireless Security drop-down menu and select 128-bit. Click on the Set WEP Password button, type in the password and verify it. Finish by clicking on Upd...

How To: Encrypt a Linksys router with WEP password protection

Watch this video to learn how to encrypt Wi-Fi using WEP password on Linksys in 4 simple steps. Connect to your wireless network. Open your Web browser and type in the web address http://192.168.1.1. Press enter key. Type in the User Name for your network. Type in the Password, press OK button. Select the Wireless text tab, select the Wireless Security text item. Pull down and select the WEP menu item. Type in a good password. Click the Generate button. Click the Save Settings button. Encrypt...

How To: Connect an Xbox 360 to the Internet via Windows Vista

Jeremy at GamerTell shows us how to connect our X-Box 360 to the internet VIA Windows Vista and a Laptop Computer that is already connected to a wireless network. First we have to connect your laptop to your X-Box 360 using an Ethernet cable. Now we will turn on the Xbox 360. Make sure you are on the correct TV Input or channel. Now go to your laptop and Click on the start button on your laptop and find control panel. Once your in control panel select Network and Internet. Now we will select ...

Tor vs. I2P: The Great Onion Debate

In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and messages asking the technical differences between the two. I'd like to thank all of you for letting me know what was on your minds, as you should always!

How To: Make a coin go through rubber

Here is a magic trick for the kids. Ever want to learn how to make a coin go through something? Be the first kid on your block to learn how to make a coin go through a jar and make all your friends believers in your magical abilities. Make a coin go through rubber.

News: Unmasked caller ID

Do you'll know a program software to detect unmask caller's for cellphones for abroad network's carriers, as i often travel abroad to Hong Kong ,Japan and Malaysia and i went switch to those networks via changing the States sim card to the local domestic sim card i often received unmasked/private number's callers calling myself but i have not way of finding out who is it?

News: Unmasked caller ID

Do you know a program software to detect unmask caller's for cellphones for abroad network's carriers, as i often travel abroad to Hong Kong ,Japan and Malaysia and i went switch to those networks via changing the States sim card to the local domestic sim card i often received unmasked/private number's callers calling myself but i have not way of finding out who is it?

News: Bioshock Infinite Revealed!

Amazing trailer. A sequel that's not a sequel, but takes the series to the open skies! From the official website:BioShock Infinite is a first-person shooter currently in development at Irrational Games, the studio behind the original BioShock (which sold over 4 million units worldwide). Set in 1912, BioShock Infinite introduces an entirely new narrative and gameplay experience that lifts players out of the familiar confines of Rapture and rockets them to Columbia, an immense city in the sky.F...

How To: Use DNS spoofing in Ettercap

In this video, you'll find instructions on how to use the Ettercap plug-in dns_spoof to set up DNS spoofing on a local area network. This Ettercap plug-in is ony one potential way to pull of DNS spoofing, and only works if the attacker is on the same subnet. To get started DNS spoofing with Ettercap, press play! Use DNS spoofing in Ettercap.

How To: Torch fire precious metal clay

People who work in PMC all the time should really have a kiln, but for folks who want to give it a try, the ability of PMC3 to be torch fired is a huge advantage. This video is only a minute or two long, and it's practically a real-time demonstration on how to torch fire Precious Metal Clay. Torch fire precious metal clay.

How To: Reduce the Noise in Your Social Streams

Social network fatigue sets in when it starts to feel impossible to keep up with all that new content from your friends, followers, and acquaintances on a daily basis. You lose track of stuff you wanted to read more about, and you miss important news from your friends, but are bombarded with inconsequential details from people you don't actually care about. What's the solution? Filter your streams so that you only see the content you do care about, and get rid of the rest.

News: Networking Virtual Machines Using VDE

I've struggled for a long time trying to set up a virtual network between my KVM virtual machines. I tried several forums and tutorials on the web, but still on my system it just wouldn't work. I eventually got it owrking, so I've decided to make some notes of my own. Hopefully it will be helpful to you as a reader as well.