Rigorous Disclosure Search Results

How To: Recover deleted podcasts on iTunes

Veronica Belmont from Tekzilla shares a tip for finding lost podcasts without unsubscribing and resubscribing to the feed. To do this by a simple keyboard combo fist close the disclosure triangle so that the individual episodes are hidden, then hold down the 'Option key' in Mac or 'Shift' in Windows and toggle the disclosure triangle as shown. The iTunes feed will refresh and all the past episodes will reappear. Combine this with the "Get All" button to find lost podcasts.

How To: Hack websites with SQL injection

For Infinity Exists Full Disclosure's first Website Hacking episode, we demonstrate how to exploit a security vulnerability occurring in a website's database to extract password hashes. Sql (Structured Query Language) is a computer language designed for the retrieval and management of data in a system's database. The Attack, known as Sql Injection, manipulates Sql statements before they are sent to the Sql Server, allowing the Attacker to create, change, or retrieve data stored in the database.

How To: Hack MD5 passwords

This episode of Full Disclosure demonstrates how to hack/crack MD5 password hashes. MD5 (Message-Digest algorithm 5) is a hash function commonly used by websites to encrypt passwords. MD5 is a one-way hash; therefore, to crack the password you most try every possible dictionary word and if that does not work, every possible letter/number/symbol combination. The programs used to crack the passwords are Cain and MDCrack-NG.

How To: Perform warmup stretches for children's sports and activities

If your children are actively involved in things like gymnastics, cheerleading and dance, then they'll be dealing with a lot of rigorous movement, so stretching is key to prevent injuries. This video will show kids how they can do some great warmup stretches to increase flexibility for trampoline, gymnastics, dance, cheerleading, skating, ballet, tumbling and other children's sports.

How To: Kick start a new fitness routine with Kung Fu

In this video, we learn how to kick start a new fitness routine with Kung Fu. This exercise is a workout that you will not get bored of. You are always doing something new with Kung Fu and it burns a ton of calories. These workouts are rigorous and combine strength training, endurance training, and really work out your body. The classes start out with yoga, then they start getting your heart rate up by working out hard. If you can't get to a class, you can do this at home by doing loose kicks...

How To: Walk in high heels and look good

In this video, Becca explains and demonstrates how to walk in high heels. Becca is neither a model nor has been professionally trained. The tips and tricks shown in the video are her own techniques after rigorous practice and experience. She suggests to start with a very short pair of heels. She explains about the weight factor when walking on heels, which can affect the posture. She says that a lot of women go wrong when they try to walk on heels as if they were walking flat footed. She also...

How To: Tie the Clouser minnow in fly fishing

Clouser's approach to fly design begins and ends onstream, with a lot of time spent in between at the workbench. Careful observation of the behaviors, habitats, and physical features of the foods fish eat is essential to developing a fly that looks and acts like the real thing. But the pattern must also pass rigorous standards of durability, ease of casting, and most importantly, consistently catch fish before it can be called a winner.

How To: Increase strength with power yoga

Power yoga is the one of the more rigorous yoga workouts. Learn how to increase strength with Power yoga poses in this video clip. Take Action: gain strength, tone every muscle, and reach toward Divine. Cindy Mastry, the instructor of this how-to video, has practiced yoga since the age of eight, and also has a background in Jazz and Ballet. Active in the fitness industry for nearly twenty years, she teaches aerobics, kickboxing, and yoga at many fitness centers in the Tampa Bay area. Cindy tr...

How To: Hack websites using cross-site scripting (XSS)

In this episode of Full Disclosure we are explaining the website attack known as Cross-Site Scripting (XSS). Cross-Site Scripting is a type of security vulnerability that affects web applications that do not sanitize user input properly. This kind of vulnerability allows an "attacker" to inject HTML or client side script like JavaScript into the website. Cross-Site Scripting is most commonly used to steal cookies. Cookies are used for authenticating, tracking, and maintaining specific informa...

How To: Secure your data with an SSH Tunnel

This new episode of Full Disclosure shows you how to use a SSH Tunnel to secure your data when you are on an untrusted LAN (ex. Coffee Shop, School's network, or Defcon). Furthermore, you can use the SSH Tunnel to bypass the LAN's internet filters. The SSH tunnel protocol works by encapsulates your data into an encrypted payload and transmitting it to the SSH Server which is setup on a trusted LAN.

How To: Improve self disclosure

Self disclosure forms friendships with active listening and sharing, telling others about yourself, your thoughts, fears, and goals. Learn how to improve self disclosure and trust in this free communication video series.

How To: Exploit Remote File Inclusion to Get a Shell

A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website defacement to full-on code execution. For this reason, RFI can be a promising path to obtaining a shell.

How To: Timehop Breach Impacts Everyone Who's Ever Used the App — Here's How to Check What Info Leaked About You

Data breaches are all too common now, and the latest one you need to know about involves Timehop, a mobile app that makes it easy to reminisce over old photos. The breach, which took place on July 4, was revealed on Sunday, July 8. At the time, Timehop disclosed that 21 million users had been affected by the breach, but it now appears that all users were impacted in some way.

News: ODG's New R-7HL Are the First Rugged Smartglasses Made Specifically for the Industrial Workforce

Osterhout Design Group just announced the upcoming release of the newest addition to their smartglasses lineup, the R-7HL, short for R-7 Hazardous Location. ODG worked directly with customers who work in extreme environments to come up with a durable solution that fits their needs; These smartglasses can not only survive but function well in many areas that would otherwise be considered too harsh for augmented reality tech.

How To: Change Skin Tone in Photoshop

With Adobe Photoshop on your computer, it's super easy to change or adjust the skin tone of somebody in a digital photo. The process uses some basic selection and color adjustment tools, and it's a fun way to make a friend's face nauseously green or lessen the effects of overly strong, sometimes even orange, makeup.

Prev Page