Package Search Results

How To: Install the Command Line Developer Tools Without Xcode

OS X is built upon a UNIX foundation, which grants you access to the benefits that UNIX offers, including the standard toolkit (make, gcc, clang, git, perl, svn, size, strings, id, and a lot more) via the command line developer tools, which are an essential if you're a developer. Aside from developers, the command line tools can offer benefits to normal users as well, like the ability to purge RAM for better performance.

How To: Download & Install the Null Byte Suite

Hello, everyone! If you haven't read the recent announcement on the official release of the Null Byte suite, I suggest you do so. This is going to be a quick tutorial on how to download and install the suite so you can see our communities genius. So, let's get started!

How To: Update Your OnePlus One to Lollipop Today

The vague 90-day release window for CyanogenMod 12 has done nothing to stop my craving for Lollipop on my OnePlus One. Luckily, there are other "unofficial" means of getting my hands on it. Since CyanogenMod still gives users a way of building their own variants of their ROM, we can install user-compiled versions of CM 12 pretty easily.

How To: Fix curling wallpaper seams

Some people hate wallpaper, but some people love it inside their homes. Those that do will eventually have to deal with wallpaper that will lose it's attachment. It will eventually bubble and curl. Curling wallpaper seams ruin the decorative effect of wallpaper. Eliminate the ugly signs of aging wallpaper with these steps.

How To: Make fried shrimp wontons

In this video tutorial, viewers learn how to make fried shrimp won-tons. The ingredients required for this recipe are: 1 package of won-ton wrapper, 2 cups of chopped shrimp, 1 cup of chopped cabbage, 1/2 tsp of salt, pinch of black pepper, 1 tbsp of corn or tapioca starch. Begin by mixing the copped cabbage, chopped shrimp, salt and black pepper together. Add 1/2 tsp of water to the mix. Users may also add one minced garlic clove. Wetting the won-ton wrap and add in 1/2 tsp of the stuffing. ...

How To: Play the "stack of chairs" kid's party game

Hello, my name is Nicole Valentine and on behalf of Expert Village, I'm here to talk to you about how to coordinate birthday games for a birthday party. Now let's talk about another group competition game. This game is known as stack the chair. You can easily get this at one of your local Mal-Mart's, K-Mart's, or Target. These chairs came in a package. Don't forget to divide the group of party guest in half. So let's say you have 20 guests, 10 in one group, 10 in the other and their goal is t...

How To: Turn Your Raspberry Pi into a Wireless Hotspot

When hacking into a network during a penetration test, it can sometimes be useful to create your own wireless AP simply by plugging a Pi into an available Ethernet port. With this setup, you have your own backdoor wireless connection to the network in a matter of seconds. Creating an AP is also helpful while traveling, or needing to share a connection with a group of people.

How To: Securely Sniff Wi-Fi Packets with Sniffglue

Sniffing packets over a network is an easy way for hackers to gather information on a target without needing to do much work. But doing so can be risky if sniffing packets on an untrusted network because a payload within the packets being captured could be executed on your system. To prevent that, Sniffglue sandboxes packet sniffing to provide an extra layer of security.

How To: Securely Sync Files Between Two Machines Using Syncthing

Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mitigate these risks, we'll use a secure, open source, and decentralized alternative.

How To: Make a Trojan Appear Legitimate

So, we all probably know that when you run a trojan made by Metasploit, nothing will appear to happen. This is a sign for me to immediately check my Task Manager, but for an unsuspecting victim, it will just seem like a broken file. It is likely that they will delete this "broken file" once they see that it "doesn't work." In order to prevent this, we need to disguise the trojan.