Welcome back, my hacker novitiates! If you have been following this new Snort series, you know that Snort is the world's most widely used intrusion detection/protection system. Now a part of the world's largest network equipment company, Cisco, it is likely to be found everywhere in one form or another. This makes a compelling argument for learning how to use it, as it will likely be a necessity in any security-related position.
Hello NullByte! This will be my first How To series.
Welcome back, my tenderfoot hackers! Have you ever wondered where the physical location of an IP address is? Maybe you want to know if that proxy server you are using is actually out of your local legal jurisdiction. Or, maybe you have the IP address of someone you are corresponding with and want to make certain they are where they say they are. Or, maybe you are a forensic investigator tracking down a suspect who wrote a threatening email or hacked someone's company.
In this Lynda video tutorial, learn how to use FileMaker Pro 10 software to create databases with pre-made templates. FileMaker offers these templates in a package called Starter Solutions. To access these options, click open FileMaker. Then, go to New Database under the File menu. Click the option "Create a database using a Starter Solution." The templates are grouped according to the nature of their use. Some are for the home, while some are for business. All you do is open the template you...
It's been said time and time again: reconnaissance is perhaps the most critical phase of an attack. It's especially important when preparing an attack against a database since one wrong move can destroy every last bit of data, which usually isn't the desired outcome. Metasploit contains a variety of modules that can be used to enumerate MySQL databases, making it easy to gather valuable information.
Now that we've set up Vuforia in Unity, we can work on the more exciting aspects of making physical objects come to life on the HoloLens. In this guide, we will choose an image (something that you physically have in your home), build our ImageTarget database, and then set up our Unity camera to be able to recognize the chosen image so that it can overlay the 3D holographic effect on top of it.
Attacks against databases have become one of the most popular and lucrative activities for hackers recently. New data breaches seem to be popping up every week, but even with all of that attention, databases continue to be a prime target. All of these attacks have to start somewhere, and we'll be exploring a variety of methods to gather information on PostgreSQL databases with Metasploit.
Welcome back, my budding hackers! In my continuing effort to build your basic Linux skills for hacking, I want to show you how to build a secure "tunnel" to MySQL.
Welcome back, my fledgling hackers! The database is the hacker's "pot-of-gold," as it contains information that is very valuable to both the business and the hacker. In this, the second of my series on hacking databases, we're on the "hunt" for Microsoft's SQL Server. Although far from the most commonly used database (Oracle hold's that title), Microsoft's SQL Server is very often found in small-to-medium sized businesses. Even a few big businesses use it.
This PHP newbie video with teach you what a Singleton Pattern is and how to use it in your PHP programming. PHP OOP Singleton is great for a database connection when you only want one consistent connection in your application. So, to prevent wasting space accidentally by calling it twice in different areas, this is good way to protect it. Singleton is very popular and used often in Database Connections.
MapForce supports flat files as the source and/or target of any mapping involving XML, database, EDI, web services or other flat file data. In this how-to, you'll find instructions for mapping data from arbitrary text files (such as log files, CSV, fixed-width, and other legacy data sources) to databases and XML files.
If you're new to DreamCoder for MySQL, one of the first things you may want to know how to do is export data from a remote MySQL database. Happily, this tutorial will walk you, step by step, through the process. To get started exporting MySQL data with DreamCoder, take a look!
New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun, the 602nd installment in their series of digital spreadsheet magic tricks, you'll learn how to create a compact array formula that can total sales with 1 criteria when the database does not have a price or total sales column. See how SUMIF can be used to lookup values and simulate a missing column from a database.
Learn how to make an e-mail server on your home computer to host your own web page and webmail service by following the steps outlined in this video tutorial. You will need a web server, an e-mail server, and a webmail interface. For the server, the most common program is WampServer, which you will need to download. Run through the installation process and grant the program access to your fire. Click on the new icon on your desktop and click Put Online and then Start All Services. This will g...
The ability to stay organized and be resourceful with data gathered from recon is one of the things that separates the true hackers from the script kiddies. Metasploit contains a built-in database that allows for efficient storage of information and the ability to utilize that information to better understand the target, which ultimately leads to more successful exploitation.
If you're looking for an efficient way to communicate with your online customers or fan base, one way to accomplish this is by setting up a PHP database of people who have signed up with your site, so you can send them email blasts or news updates.
If you are a user of FileMaker Pro then this video teaches you how to use calculation and summary fields in it while making new files. In Filemaker you can create a various kind of fields that you want your file to contain. In Filemaker a calculation is a data that gets computed depending up on the formula that is set in the Filemaker database settings. Calculations are very critical in file management. Open the Manage Database and there you can find some of the calculation fields. There in t...
This video demonstrates how users of the FileMaker Pro 10 software can easily start using this software from the quick start menu. It is demonstrated to users how to create a database or open an existing database from this quick start page. Also demonstrated is how users might be able to find further information using the "Learn More" option at the bottom of the menu. This option shows users the basics via videos, tours, and tutorials. A must see for those new to this software.
Nmap is possibly the most widely used security scanner of its kind, in part because of its appearances in films such as The Matrix Reloaded and Live Free or Die Hard. Still, most of Nmap's best features are under-appreciated by hackers and pentesters, one of which will improve one's abilities to quickly identify exploits and vulnerabilities when scanning servers.
This is a short explanation and tutorial on how to grab saved passwords from Google Chrome, ideally from a meterpreter session. The idea behind this is to understand how saved passwords work and how to keep them safe. Let's have some fun :D Understanding Google Chrome Saved Passwords
This is my first How-To on Null-Byte, so I hope it's not too complicated written, because I am not a native english speaker. I don't use pictures, but this Tutorial is a good supplement for my updated Tutorial here.
New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun, the 312th installment in their series of digital spreadsheet magic tricks, you'll learn how to use the DATE, MID, LEFT and TIME functions to extract dates and times from a database field that stores dates and times as a text string.
New to Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this Excel tutorial from ExcelIsFun, the 236th installment in their series of digital spreadsheet magic tricks, you'll learn how to create a database for keeping carpentry measurements as well as how to use a COUNTIF function formula for calculating how many lumber pieces you'll need to cut for your home improvement project.
This video explains how to create a database text alert using Google Forms. In Google documents click on new, then form. After naming the form and typing in that standard text messaging rates apply, our presenter selects multiple choice yes or no options. Select it to be a required question so that the user can make sure they understand terms. You can choose to select any or all of the questions to be required. You can then type in various questions for the user to answer-our presenter wants ...
In Access 2010 you can now create a navigation form (like a home page) for your database without writing a single piece of code or logic! Great for busy people who need to organize their database quickly, but who don't have code writing skills. It's just drag and drop. There are predefined layouts which help you design the form and then simply drag the information you want into the form. Reports can be added and accessed quickly from the navigation form so you can analyze the data simply and ...
The Microsoft Office Access 2007 relational database manager enables information workers to quickly track and report information with ease thanks to its interactive design capabilities that do not require deep database knowledge. In this Microsoft Access video tutorial, you'll learn how to force a password to be entered in order to run a query.
Now that we've learned about keeping all our data safe with encryption, it's time to continue progressing through getting your Mac set up for hacking.
Welcome back, my novice hackers! In this series, we have been exploring how a forensic investigator can find evidence of illegal or illicit activity. Among other things, we have examined the registry and prefetch files for artifacts and have done some rudimentary forensic analysis. For those of you who are seeking career as a forensic investigator or security engineer, this can be invaluable training. For hackers, it might be life-saving.
Information gathering is one of the most important steps in pentesting or hacking, and it can often be more rewarding to run things on the target itself as opposed to just running scripts against it remotely. With an SQL injection, a hacker can compromise a server and, ultimately, upload and run the "unix-privesc-check" script locally in order to further identify possible attack vectors.
Tossing an old Android smartphone with a decent battery into your hacking kit can let you quickly map hundreds of vulnerable networks in your area just by walking or driving by them. The practice of wardriving uses a Wi-Fi network card and GPS receiver to stealthily discover and record the location and settings of any nearby routers, and your phone allows you to easily discover those with security issues.
Hello my fellow hackers, it's been a while since my last post, I can't get the time now-a-days for the posts but can manage to tend to comments.
Whatever your reasons for doing it, if you are trying to hack passwords, it helps to have the right software for getting the job done. With the Cain and Abel program, you will be well on your way to hacking even the toughest personal passwords.
New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun, the 682nd installment in their series of digital spreadsheet magic tricks, you'll learn how to to average times values that were exported from a database as text values instead of number values.
This clip presents a general introduction to FileMaker Pro 11, providing special emphasis upon the application's new features. Whether you're new to FileMaker Pro database management program or just want to learn how to take advantage of FileMaker Pro 11's new features, you're sure to benefit from this free video tutorial from the folks at Lynda. For more information, including detailed, step-by-step instructions, watch this handy FileMaker Pro user's guide.
See how to create and append Find criteria to a script when working in FileMaker Pro 11. Whether you're new to FileMaker Pro database management program or just want to learn how to take advantage of FileMaker Pro 11's new features, you're sure to benefit from this free video tutorial from the folks at Lynda. For more information, including detailed, step-by-step instructions, watch this handy FileMaker Pro user's guide.
See how to create and work with Get functions in FileMaker Pro 11. Whether you're new to FileMaker Pro database management program or just want to learn how to take advantage of FileMaker Pro 11's new features, you're sure to benefit from this free video tutorial from the folks at Lynda. For more information, including detailed, step-by-step instructions, watch this handy FileMaker Pro user's guide.
See how to sort with button controls in FileMaker Pro 11. Whether you're new to FileMaker Pro database management program or just want to learn how to take advantage of FileMaker Pro 11's new features, you're sure to benefit from this free video tutorial from the folks at Lynda. For more information, including detailed, step-by-step instructions, watch this handy FileMaker Pro user's guide.
Learn how to constrain and extend found sets when working in FileMaker Pro 11. Whether you're new to the FileMaker Pro database management program or just want to learn how to take advantage of FileMaker Pro 11's new features, you're sure to benefit from this free video tutorial from the folks at Lynda. For more information, including detailed, step-by-step instructions, take a look.
See how to use the Layout Assistant to create custom labels in FileMaker Pro 11. Whether you're new to the FileMaker Pro database management program or just want to learn how to take advantage of FileMaker Pro 11's new features, you're sure to benefit from this free video tutorial from the folks at Lynda. For more information, including detailed, step-by-step instructions, take a look.
Learn how to create ER diagrams to display relationships when working within FileMaker Pro 11. Whether you're new to the FileMaker Pro database management program or just want to learn how to take advantage of FileMaker Pro 11's new features, you're sure to benefit from this free video tutorial from the folks at Lynda. For more information, including detailed, step-by-step instructions, take a look.