Person Beneath Search Results

How To: Social Engineering - Total Guide

Good day to everyone, today I will present some basic and advanced concepts that targets sophisticated attacks on the social basis, also I will write about some steps that can prevent this attacks from occuring, basically we will examine Social Engineering from the angle of attacker and victim, some people who are interested in security and work for middle-sized companys can learn and use something interesting from this post.

News: Many Lookup Engines

Hello I have now asked for help a few times, so I figured I should contribute with what I can offer as of right now, which is many valuable sites if you need to look someone up.

How To: Dox Anyone

Doxing is the act of finding one's personal information through research and discovery, with little to no information to start with. You may have seen doxing in the news, for instance when not so long ago, hacker team Anonymous doxed and reported thousands of twitter accounts related to ISIS. Doxing can be useful for finding the address of a coworker, or simply investigating people on the internet. The tutorial I will provide to you now will teach you the basics of doxing and how you can prot...

How To: 5 Weird & Easy Ways to Water Your Christmas Tree

Christmas trees, once decorated and brightly lit, are the penultimate holiday decoration, but authentic pines lose their brilliance fast without any nourishment. Plus, they are major fire hazards without regular hydration. But watering one requires a lot of sliding around on the floor, and it can be hard to tell how much water is in the bowl beneath the dark, prickly branches. These five hacks can help!

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 1 (Getting Started)

Welcome back, my hacker trainees! A number of you have written me regarding which operating system is best for hacking. I'll start by saying that nearly every professional and expert hacker uses Linux or Unix. Although some hacks can be done with Windows and Mac OS, nearly all of the hacking tools are developed specifically for Linux. There are some exceptions, though, including software like Cain and Abel, Havij, Zenmap, and Metasploit that are developed or ported for Windows.

How To: Hack Your Mini-Fridge into a Vending Machine to Take Care of Freeloading Friends at Your Next Party

It always sounds like a good idea to throw a party... until the party gets there. Next thing you know, you're running around hiding anything breakable, and once everyone leaves, you're stuck cleaning up the mess. But the worst part is footing the bill for everything, and if you don't charge at the door, your chances of getting anyone to chip in are slim to none once the party starts.

How To: Use LinkedIn to find a new job

Step1. Determine the type of job you want. Make sure that you have a detailed and complete profile on ‘linkedin’. You must also have a number of connections. Then decide which job you are looking for and the typical functions and titles. Also choose which type of industry you would like to work in and also choose what locations. You also need to write down specific names of organizations that you want to work for and who are they.

How To: Mingle

Learn how to mingle. If the idea of walking into a room full of strangers strikes fear into your heart… welcome to the club. But there are ways to overcome this common social phobia.

How to Spy on Tweeters: Viewing Someone Else's Twitter Timeline with TwtRoulette

In today's world of social media, there's really only two powerhouses—Facebook and Twitter. And those of you with Twitter accounts know the power of a Tweet. Getting more followers means reaching more people, but the vast majority of Tweeters are following only a handful of Twitterers themselves. Do you ever wonder why them? What's so special about these selected followed users? Is it worth it to follow them, too? That's up to you, but if you're searching for more people to follow, then it's ...

How To: Knit a fake joke condom

If you know someone who would appreciate being given a condom made out of yarn, you've come to the right place. This video will teach you how to knit a joke / prank condom that will make that special condom-loving person in your life very happy.

How To: Palm read your subject's left hand

The left hand indicates what your subject has inherited from their family. Giving a reading on the left hand is different than the right, even for the same person. Peter John lays out a few palmistry principles if you want to give someone a palm reading on their left hand.

How To: Avoid being too forward when flirting with someone you like

Learn how to avoid being to forward or pushy when getting flirty with the person you fancy. As a general rule, when flirting with someone, it's important that you be confident and natural. But, if you're feeling nervy, there's little shame in doing a little prep work with silly videos like this one. For more information, and to get started using this tip for yourself, take a look.

How To: Initiate a flirtatious conversation with a person you like

In this quick clip, you'll learn how to start a conversation with someone you fancy. As a general rule, when flirting with someone, it's important that you be confident and natural. But, if you're feeling nervy, there's little shame in doing a little prep work with silly videos like this one. For more information, and to get started using this tip for yourself, take a look.

How To: Control your body language when flirting with someone

In this clip, you'll learn how to monitor your posture and maintain positive body language when flirting with a person you fancy. As a general rule, when flirting with someone, it's important that you be confident and natural. But, if you're feeling nervy, there's little shame in doing a little prep work with silly videos like this one. For more information, and to get started using this tip for yourself, take a look.

How To: Make a mini pumpkin teapot for a dollhouse

The person in this video is teaching us how to make toys with the help of polymer clay. As you can see the video you can say that the person there is a girl. This lady is teaching to make a teapot to her daughter. Her hand is focusing the camera. First she makes a little ball with the help of polymer clay. Then she made few lines on that ball and press that ball slightly on the top. Then she takes another piece of clay and presses it but that one is too small. Then she use another on quit big...

How To: Access Facebook at school using 3rd party software

For all you Facebook-addicts out there (or anybody else that needs to access blocked websites anywhere they want), this is a video that you will want to watch. In just a minute and thirty seconds, any ordinary person can learn how you can access any website they want anywhere they want, bypassing any blocks and firewalls that the network administrator has put up to stop users from getting to their desired website without using complex computer commands or other complicated methods.

How To: Pick a lock using household items

If you are into lockpicking but don't have a ton of supplies, check out this video to learn how to lockpick with merely a bobby pin and a pen. With a bit of pressure you should be able to get all of the pins up and open the lock. If you don't get it as fast as the person in the video, keep at it. It may take longer depending on the lock!