Purchase Tokens Search Results

How To: Successfully Prestige in Call of Duty: Black Ops 2

The new Call of Duty: Black Ops 2 is the hottest game on the market right now, and there's no doubt it'll end up being the most unwrapped gaming gift come Christmas morning. The first-person shooter hopes to carry on the tradition of its many predecessors in bringing the most action-packed gaming modes, along with a high-replay value, to its legions of fans.

Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 6 (Gaining Access to Tokens)

Welcome back, my tenderfoot hackers! Hacker newbies have an inordinate fixation on password cracking. They believe that cracking the password is the only way to gain access to the target account and its privileges. If what we really want is access to a system or other resources, sometimes we can get it without a password. Good examples of this are replay attacks and MitM attacks. Neither requires us to have passwords to have access to the user's resources.

How To: Track a Target Using Canary Token Tracking Links

Canary tokens are customizable tracking links useful for learning about who is clicking on a link and where it's being shared. Thanks to the way many apps fetch a URL preview for links shared in private chats, canary tokens can even phone home when someone checks a private chat without clicking the link. Canary tokens come in several useful types and can be used even through URL shorteners.

How To: Find all hidden spiders on Doctor Octopus in Spider-Man: Shattered Dimensions

Spider-Man 2099, one of the four dimensions in Spider-Man: Shattered Dimensions, and quite possibly one of the coolest! If you're going for a full 100% completion of the game, you're going to want to get all the hidden spiders. In this video you will get a full walkthrough of each location in the Doctor Octopus level, where you will find the spider tokens as well as a great commentary for each area where you might be confused.

How To: Play dreidel

The dreidel, the small top that's among the most recognizable symbols of the Hanukkah season, is a fun game of chance to play with friends and family.

How To: Install Gitrob on Kali Linux to Mine GitHub for Credentials

GitHub is an extremely popular site that allows developers to store source code and interact with other users about their projects. Anyone can download public, open-source files on GitHub manually or with Git, and anyone can fork off someone's project to expand or improve it into its own project. It's a really great site for programmers, developers, and even inspiring hackers.

Hack Like a Pro: How to Use Metasploit's Psexec to Hack Without Leaving Evidence

Welcome back, my fledgling hackers! It's been awhile since we did a Metasploit tutorial, and several of you have pleaded with me for more. I couldn't be happier to oblige, as it's my favorite tool. For the next several weeks, I'll intersperse some new guides that'll help expand your Metasploit skills and keep you abreast of new developments in Metasploit, so look for them in the near future.

How To: Transfer Your Authy Account to a New Phone

One of the main reasons Authy was able to top our list of the best two-factor authentications apps was its ability to transfer access to a new device. This feature ensures that whenever you get a new phone, you don't lose all your tokens. However, if the process is done incorrectly, you can leave your account vulnerable.

How To: Use U2F Security Keys on Your Smartphone to Access Your Google Account with Advanced Protection

Security-minded users can reduce the risk of phishing by enabling Advanced Protection on important Google accounts, requiring a U2F security token to log in. Using these keys isn't intuitive on most popular smartphone platforms, and you can find yourself locked out if you don't plan ahead. You'll need to learn and practice using U2F keys on your device before enabling this layer of security.

How To: Search Public Posts on Facebook

The newer Graph Search in Facebook can help you find friends in specific cities, photos of a particular subject, restaurants that your friends liked, and a whole lot more. One thing it can't help you with just yet is searching public posts on Facebook, which you could do in the previous search version. Actually, some users do have the option to search public posts with Graph Search, but it's very limited and doesn't include me. If you're like me and don't have access yet, there is a workaroun...

How To: Make a dye-sensitized solar cell with titanium dioxide and anthocyanin

Discover the power of raspberries! Literally. In this NurdRage science video, learn how some crushed raspberries and some titanium dioxide (TiO2) can create a powered dye-sensitized solar cell. Inside a raspberry is something called anthocyanin, which is a flavonoid pigment. Commercially purchased solar cells are way more powerful than this DIY solar cell, but with a little improvement, who knows. Nurd Rage also lets you know how this works.

How To: The Easiest Way to Unlock the Bootloader on Your HTC EVO 4G LTE or Other HTC Smartphone

Nearly two years ago, Peter Chou, CEO of HTC, confirmed that the company would no longer be locking bootloaders. Whether or not they've actually lived up to this claim is debatable. Any phone bought from a wireless carrier comes locked. Only the new HTC One Developer Edition ships with an unlocked bootloader, and it does not have any carrier add-on software installed.

How To: Purchase WGT credits in World Golf Tour

In this video we learn how to purchase WGT credits in World Golf Tour. You can purchase credits or you can win them by placing in the top percents of tournaments. You can upgrade your equipment with the credits and out of the crowded free tournaments. In the Pro Shop, you can also buy new golf balls, gear, and clubs. Like in real life, having the right drive or putter can give you the advantage in tournaments. To see how many credits you have, go to the WGT website and go to your account. Fro...

How To: Craft a cute Christmas elf girl from polymer clay

Christmas means decorating trees with store-purchased ornaments and tinsel, decorating stairwells with store-purchased garlands, and decorating the exterior of your house with store-purchased lights. These days everything you need can be puchased pre-made somewhere, and while that saves us time, what happened to the good ol' days when we crafted ornaments out of popsicle sticks and strung cranberries on a string?

How To: Authorize and deauthorize computers in iTunes

Authorization allows you to copy your music store purchases to other computers and burn them to CD and protects the artists. Each computer you use to play your purchase must be authorized using your music store account. You can authorize up to 5 computers; yours is automatically authorized.

How To: Manipulate User Credentials with a CSRF Attack

Web 2.0 technology has provided a convenient way to post videos online, keep up with old friends on social media, and even bank from the comfort of your web browser. But when applications are poorly designed or incorrectly configured, certain flaws can be exploited. One such flaw, known as CSRF, allows an attacker to use a legitimate user's session to execute unauthorized requests to the server.

How To: Buy the right jumper cables and jump your car

In this video tutorial, viewers learn how to jump start a car. When purchasing a jumper cable, don't purchase the cheapest set. It is also not necessary to purchase the most expensive. Begin by connecting the black cable on the negative terminal of the healthy car. Then connect the positive side of the red cable to the positive terminal of the healthy car. On the dead car, connect end of the cable to the positive side of the battery again, except this time you connect the negative end to a so...

Prev Page