Online Targeted Search Results

How To: Tie a two handed surgical square knot

Are you in medical school an planning to be a surgeon? Then here is a how-to video with various different surgical knot tips. The UT Huston Student Surgical Association (SSA) has put together this surgical knot tying online tutorial. Watch as Dr. John R. Potts, MD. demonstrates the two handed square knot. Practice the two handed square knot surgical suture before going into your surgical rotation.

How To: Have proper internet etiquette

Just because the internet renders you virtually anonymous does not mean social customs should be ignored. Just like in the outside world, there is etiquette that should be obeyed if you want to be treated as a friend rather than an annoyance online. In this how to video, Proper Ollie teaches you how you can have proper internet etiquette in social networking forums.

How To: Prepare a photography portfolio presentation

Putting together a print portfolio for your photography? This instructional photography video provides some suggestions on photographic portfolios and how to assemble a portfolio. It is very important to have a good online presence, a nice gallery of your work to show. But there are advantages to having a print portfolio as well.

How To: Plan to travel around the world

Sow your wild oats! In this video, Jody Fath shares the expertise she gleaned from her eleven months backpacking around the world. In this video, you'll learn to plan for a long-term trip abroad. Learn how to determine what type of traveller you are, how to budget for your trip using online cost-of-living estimation and even how to pack in this great tutorial.

How To: Play drums

Do you want to learn to play drums for the very first time? Watch Mike Michalkow's step-by-step training video to get started. It will guide you through four simple patterns that form a basic rock drum beat.

How To: Use Facebook to meet and connect with people online

Facebook is an internet phenomenon which is quickly gaining popularity. For those who do not yet have a Facebook, this video will show you the basics of how to meet people and to connect with people online as well as how to set up your profile on the site. After creating an account using your email address and setting up your password, log on to the website. Set up your profile by clicking on the tab labeled "info" and entering information which you would like to share about yourself. You can...

How To: Convert Fahrenheit, Celsius, Rankine & Kelvin online

Need to easily convert Fahrenheit to Celsius? What about Rankine and Kelvin? There's an easy way to do it online, and this video tutorial shows you how. Navigate your browser to Tampile, where you'll find an easy to use temperature converter. The drop-down menu in the center of the page allows you to choose between Fahrenheit, Celsius, Rankine, and Kelvin. All you have to do is input a temperature and then press the "Convert Temperature" button. The results will appear in a table directly bel...

How To: Scan, Fake & Attack Wi-Fi Networks with the ESP8266-Based WiFi Deauther

The price of hacking Wi-Fi has fallen dramatically, and low-cost microcontrollers are increasingly being turned into cheap yet powerful hacking tools. One of the most popular is the ESP8266, an Arduino-programmable chip on which the Wi-Fi Deauther project is based. On this inexpensive board, a hacker can create fake networks, clone real ones, or disable all Wi-Fi in an area from a slick web interface.

How To: Set App Limits on Your iPhone to Restrict All-Day Access to Games & Other Addictive Apps

Most of us have, at one point or another, found ourselves glued to our smartphone in a trance-like state, totally unaware of what's around us. Well, Apple has a way to curb overuse with an awesome tool for iPhone starting in iOS 12. It can help nudge us away from our phones to spend more time attending to real-life matters.

How To: Use SSH Local Port Forwarding to Pivot into Restricted Networks

SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port forwarding, secure file transfer, and more. Using SSH port forwarding on a compromised host with access to a restricted network can allow an attacker to access hosts within the restricted network or pivot into the network.

The Hacks of Mr. Robot: How to Use the Shodan API with Python to Automate Scans for Vulnerable Devices

Shodan calls itself "the search engine for internet-connected devices." With so many devices connected to the internet featuring varying levels of security, the special capabilities of this search engine mean it can provide a list of devices to test and attack. In this tutorial, we'll use Python to target specific software vulnerabilities and extract vulnerable target IP addresses from Shodan.

How To: Hide DDE-Based Attacks in MS Word

In a previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when a Microsoft Word document is opened. The biggest challenge of this attack is that it requires getting the user to agree to a pop-up prompt. Fortunately, since I posted that article, many new obfuscation techniques have been discovered to make this easier. Today, we explore and combine some of them to make the ultimate hidden DDE attack.

How to Use PowerShell Empire: Getting Started with Post-Exploitation of Windows Hosts

PowerShell Empire is a post-exploitation framework for computers and servers running Microsoft Windows, Windows Server operating systems, or both. In these tutorials, we will be exploring everything from how to install Powershell Empire to how to snoop around a target's computer without the antivirus software knowing about it. If we are lucky, we might even be able to obtain domain administrator credentials and own the whole network.

The Giving Plant: Same Asian Plant Used for Arthritis Treatment Gives Us Powerful HIV Drug

Natural remedies used through the ages abound, especially in Asian medicine. The willow-leaved justicia plant, found throughout Southeast Asia, has traditionally been used to treat arthritis, but scientists have just discovered it contains an anti-HIVcompound more potent than AZT. AZT was the first drug approved to treat HIV, and is still used in HIV combination therapy today.

News: With Frenzy, You'll Online Shop Like You Never Have Before

With the massive popularity of online clothing brands like Missguided and Fashion Nova, it seems that shopping in-store is a thing of the past. I admit that I love browsing from the comfort of my own bed, but there's something to be said for actually going to a store, speaking to people with similar tastes and penchants for shopping. Fortunately, with Frenzy — Shopify's new app for iOS — you get all of the convenience of online shopping, plus the opportunity to interact with other users in pe...

How to Hack Radio Frequencies: Hijacking FM Radio with a Raspberry Pi & Wire

In our first part on software-defined radio and signals intelligence, we learned how to set up a radio listening station to find and decode hidden radio signals — just like the hackers who triggered the emergency siren system in Dallas, Texas, probably did. Now that we can hear in the radio spectrum, it's time to explore the possibilities of broadcasting in a radio-connected world.

News: HoloLens Can Give Tank Crews 360-Degree X-Ray Vision on Missions

As a commercial and potentially consumer product, one might assume it very unlikely to see the Microsoft HoloLens in the military marketplace. And that assumption would be completely wrong. One company from the Ukraine is currently working on using the mixed reality head-mounted computer for 360-degree vision inside armored tanks. If a tank crew could see the entire battlefield there are in, they would likely have a better chance of accomplishing their mission and avoiding damage. Tanks are l...

How To: Use the Bedtime Clock on Your iPhone to Make Sure You Always Get Enough Sleep

Since the days of flip clocks, alarms have always had one function—make a bunch of annoying racket early in the morning to ensure that you wake up in time. And this simple MO has stayed in place while technology advances at a breakneck pace, almost in spite of the fact that today's devices are capable of doing far more than beeping at 7 in the morning.

How To: Execute Remote Commands on a Disconnected Victim

Do you ever thought that you can't control an Internet disconnected system? I saw a funny video in Chema Alonso's youtube channel (A well-known hacker of my country and creator of Fingerprinting Organizations with Collected Archives among other security tools), and decided to post something similar.

How To: Hack TOR Hidden Services

A lot of people think that TOR services are unhackable because they are on a "secure environment", but the truth is that those services are exactly the same that run on any normal server, and can be hacked with the same tools (metasploit,hydra,sqlmap...), the only thing you have to do is launch a transparent proxy that pass all your packets through the TOR network to the hidden service.