Promo Codes Search Results

How To: Make a JComboBox for Java programming

Want to program your own Java games and applications but don't know beans about object-oriented programming? Never you fear. This free video tutorial from TheNewBostonian will have you coding your own Java apps in no time flat. Specifically, this lesson discusses how to work with JComboBox dropdown lists to create GUI drop-down lists when writing code in the Java programming language. For more information, including detailed, step-by-step instructions, watch this helpful programmer's guide.

How To: Pass arrays into methods for Java programming

Want to program your own Java games and applications but don't know beans about object-oriented programming? Never you fear. This free video tutorial from TheNewBostonian will have you coding your own Java apps in no time flat. Specifically, this lesson discusses how to pass an array into a method when writing code in the Java programming language. For more information, including detailed, step-by-step instructions, watch this helpful programmer's guide.

How To: Write a "Hello, World" program using Java

Want to program your own Java games and applications but don't know beans about object-oriented programming? Never you fear. This free video tutorial from TheNewBostonian will have you coding your own Java apps in no time flat. Specifically, this lesson discusses how to build and compile a simple "Hello, World" program writing code in the Java programming language. For more information, including detailed, step-by-step instructions, watch this helpful programmer's guide.

How To: Create & add custom HTML on Facebook fan pages

To create custom HTML elements to your facebook fan page or business page, first create a new fan page, and then click on the "boxes" tab. Now, right on the top of the page there's a grey bar, click on the button that says "fbml". Search for the application called "static fbml" and add it to your page. Go back to the homepage of your fan page, and click on "edit page" Find the fbml application and click edit. You'll now have a section where you can put html codes in to create custom web pages...

How To: Map Wardriving Data with Jupyter Notebook

With the Wigle WiFi app running on an Android phone, a hacker can discover and map any nearby network, including those created by printers and other insecure devices. The default tools to analyze the resulting data can fall short of what a hacker needs, but by importing wardriving data into Jupyter Notebook, we can map all Wi-Fi devices we encounter and slice through the data with ease.

How To: Get Root Filesystem Access via Samba Symlink Traversal

Samba can be configured to allow any user with write access the ability to create a link to the root filesystem. Once an attacker has this level of access, it's only a matter of time before the system gets owned. Although this configuration isn't that common in the wild, it does happen, and Metasploit has a module to easily exploit this security flaw.

How To: Enumerate SMB with Enum4linux & Smbclient

SMB (Server Message Block) is a protocol that allows resources on the same network to share files, browse the network, and print over the network. It was initially used on Windows, but Unix systems can use SMB through Samba. Today, we will be using a tool called Enum4linux to extract information from a target, as well as smbclient to connect to an SMB share and transfer files.

How To: Get Started Writing Your Own NSE Scripts for Nmap

The road to becoming a skilled white hat is paved with many milestones, one of those being learning how to perform a simple Nmap scan. A little further down that road lies more advanced scanning, along with utilizing a powerful feature of Nmap called the Nmap Scripting Engine. Even further down the road is learning how to modify and write scripts for NSE, which is what we'll be doing today.

How To: Exploit Remote File Inclusion to Get a Shell

A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website defacement to full-on code execution. For this reason, RFI can be a promising path to obtaining a shell.

How To: Perform Local Privilege Escalation Using a Linux Kernel Exploit

Getting root is considered the Holy Grail in the world of Linux exploitation. Much like SYSTEM on Windows, the root account provides full administrative access to the operating system. Sometimes even a successful exploit will only give a low-level shell; In that case, a technique called privilege escalation can be used to gain access to more powerful accounts and completely own the system.

How To: The Easiest Way to Share a Wi-Fi Password from Your iPhone to an Android Device

An awesome new feature appeared in iOS 11 that lets you easily share your Wi-Fi password to anyone else with iOS 11 or higher just by tapping "Share Password" on your iPhone when they try to connect to the same network. However, if your friend is using Android or another mobile OS, this feature doesn't help at all — but there's still an easier way than dealing with long, complicated passwords.

IFTTT 101: Secure Your Automations with 2-Step Verification

If you want to automate tasks with your smartphone, IFTTT is a great app. It does a tremendous job of helping you find applets or creating your own from scratch, so it's easy to connect your favorite online services and make them react to each other. With all this personal information, though, you should ensure that your data is secure by enabling two-step verification.

How To: Easily Detect CVEs with Nmap Scripts

Nmap is possibly the most widely used security scanner of its kind, in part because of its appearances in films such as The Matrix Reloaded and Live Free or Die Hard. Still, most of Nmap's best features are under-appreciated by hackers and pentesters, one of which will improve one's abilities to quickly identify exploits and vulnerabilities when scanning servers.

How To: Create a Reusable Burner OS with Docker, Part 1: Making an Ubuntu Hacking Container

Containers are isolated software instances representing applications, servers, and even operating systems—complete with all of their dependencies, libraries configuration files, etc.—and they're taking over the corporate world. The ephemeral, portable nature of containers help them stay current and speedy, and they can work on pretty much any computer, virtual machine, and cloud.

How To: Order an Uber Ride Without a Smartphone

Taxi drivers and cab companies across the globe are in an uproar over Uber, and for good reason, too—you just can't compete with the low fares and ease of use that Uber brings to the table. The only downside is that the groundbreaking ride share service usually requires a smartphone—but that shouldn't be an issue anymore with one simple tip that I'll outline below.

CES 2015: The ZTE ZMAX May Be the Best Android Phone You Can Get for Under $200

Sometimes specs aren't everything, especially if you prefer value over the bleeding-edge. Enter the ZTE ZMAX, an Android phone that you can get right now for less than $200—cheaper than even the Nexus 5 or OnePlus One. If you're looking for a cheap high-end phone, it's hard to go wrong with one that sports a 5.7-inch display, expandable storage, and a massive 3400mAh battery that'll easily get you through a full day of use.

How To: Fold Kirigami with the Craft ROBO

The Craft ROBO is a machine that lets you cut and score paper with precision and repetition. This is really handy if you're into scrapbooking or want to make shipping boxes, envelopes or promos for your Etsy shop. Perhaps you want to take it to the next level to create unique paper sculptures, pop-up books or custom vinyl stickers.

How To: Improve the quaity of your YouTube video playback

You can improve the quality of the video you watch on YouTube. Sometimes when you watch the video in YouTube, probably you will have notice that the video is little blurry or text which is being shown in that video is blurry like low quality video. So you can improve it by just adding a little code in the url of that video. So put that code "&fmt=18" in the end of the url of that video and press the enter key and that's it. Now you can see the difference between before and now. The video qual...

How To: Put a search box in Thesis theme navigation bar

First go to your word press admin and click on "custom file editor" in thesis options. Select custom_function.php in file selected menu and click on "edit selected file". Because of warning, we need to do it via ftp. So go to that ftp path which is showing in the video and open up the launch.php. Now copy that code which is showing in the video and past it in there, close and save the file. Now to change the style of your search box, go to your custom file editor, select the custom.css and cl...