Root Rot Search Results

How To: Linux Basics for the Aspiring Hacker: Using Ship for Quick & Handy IP Address Information

Whether you're white hat, black hat, or some shade in-between, navigating through a network is a core part of hacking. To do that, we need to be able to explore a network to discover the addresses of gateways, interfaces, and other attached devices. When ifconfig just isn't enough, you can steer your way around a network with a convenient tool called Ship, the script for everything IP.

How To: Generate Private Encryption Keys with the Diffie-Hellman Key Exchange

When we are building programs that communicate over a network, how can we keep our data private? The last thing we want is some other lousy hacker sniffing our packets, so how do we stop them? The easy answer: encryption. However, this is a very wide-ranging answer. Today we're going to look specifically at how to encrypt data in Python with dynamically generated encryption keys using what is known as the Diffie-Hellman key exchange.

How To: Brute-Force WPA/WPA2 via GPU

Most of you lot would be aware what WPA/WPA2 is so I won't bang on about the encryption or protocols a great deal. In short WPA and WPA2 both have a maximum of 256bit encrypted with a maximum of 64 characters in the password. The encryption is really only 64bit but x 4 because of the way the authentication functions as a 4 way handshake.

How To: Tether Your Nexus 5 Without Your Carrier Knowing

It used to be easy to hack tethering—root your device and install a third-party or modded tethering app. But snuck in amongst the changes in Android 4.3, a new data-monitoring service of sorts made its debut. There used to be a time when your data connection was yours. You paid for it, so you were free to use it for whatever you wanted. Unfortunately, those days are long gone.

How To: Get the Most Out of Your Nexus 5's Camera

Google recently updated the camera software for the Nexus 5, and in doing so, made the app available to all devices running Android KitKat. This means that not only do we get a nice new camera interface on our phones, but we also get the benefit of an expanded development community.

How To: Dye your hair at home for blondes

In this tutorial, we learn how to dye your hair at home for blondes. First, purchase a couple boxes of hair dye that are the right colors for your hair. After you do this, take all of the products out of the boxes. Now, pour the small bottle into the large container and put the rubber gloves on. You don't need to use both containers, you can just use one if your hair isn't that thick. Snip the top off the container, then start to shake up the container until it's well mixed together. Now, sta...

How To: Use micro-misters for drip irrigation systems

Micro misters allow for low volume of water over a wide area. They give good moisture coverage. Systems can be pulled up, changed and made into what you need it to be. Keep potted plants separate from other plants. They should have their own system. There is a system to encourage growth of root systems of various plants. Shrubs get two emitters in case one clogs up, the plant still has moisture. Having the water at the base of the plant limits weed growth. There is a temporary system to get t...

How To: Use Trucha Bug Restorer to mod / hack your Wii

Trucha Bug Restorer is a powerful piece of homebrew software that you can use on your Wii to make sure that it is formatted properly in order to play burned games and use other hacks. This video will show you how to use it to set up an installation of cIOS on your Wii, which is the program that allows you to play burned backup copies of games.

How To: Make a Cajun pot roast in your Crock Pot

Cajun Cooking TV shows viewers how to make a Cajun pot roast in your crock pot. First chop up turnip roots, baby carrots, shallots and garlic. First, cut several holes into your steak and stick garlic into each hole. Now season the meat with all purpose season on all sides! Now, place your meat in the slow cooker with 1 tablespoon of olive oil. Now on top and on the side of the meat add in all of your vegetables! Put in about 1 cup of water into the slow cooker, you don't want to put too much...

How To: Identify problems with pecans & pruning grapevines

Master Gardener Rosamarie Maddox asks John White, Doña Ana County Extension Agent, about problems facing her pecans, grapevines, and native shrubs. An unidentified insect found on her pecan tree is identified by John White as a Twice Stabbed Ladybug. This ladybug is a useful insect that often over-winters on the tree and helps takes care of the aphid problems faced by pecans. Pink fuzzy coating on pecan nuts is also brought up. The coating is normal for pecan and contains bitter tannin. Too m...

How To: Grow a fig tree in southern New Mexico

In this segment of Southwest Yard and Garden, John White and Bill Alford are going to be talking about fruit production and how to harvest figs in southern New Mexico. Bill starts off by talking about his nine year old Black Turkey tree. He says he digs holes and arbor each spring, then uses half a cup of fertilizer per hole. The roots of a fig tree usually grow out past the outer parts of the tree so it's important to make sure you plant has adequate room to grow correctly. A person can mayb...

How To: Draw a dog house in Illustrator

This video shows you how to draw a dog house in Adobe Illustrator. In this video, first the scale is selected, and with the help of a air brush tool, a square is being made as a front of the house, then a top is drawn and then the back. Then the entrance is drawn. This is done by selecting this object, then select the paint bucket tool, select color and then this object is filled with color. Then secondly, using marquee tool, two large spots are made in the middle of the door object to make i...

How To: Find the geometric mean

It doesn’t matter how long ago your last geometry class was, you can still impress your friends by finding a geometric mean. The geometric mean can be used to find the average of numbers with out unusually high or low results effecting the result.

How To: Get side swept bangs

Your quick and easy guide to styling side swept bangs within 2 minutes. After blow drying your hair, take a round brush and roll your bangs up, under and to the side that you want your bangs to sit. Comb your bangs down over your forehead, then comb your bangs to the side. Using some styling product, such as molding gunk, paste or wax, take a small amount of product and rub between your hands to ensure even distribution. Using your fingers, work the product through your bangs, starting at the...

How To: Find Vulnerable Webcams Across the Globe Using Shodan

Search engines index websites on the web so you can find them more efficiently, and the same is true for internet-connected devices. Shodan indexes devices like webcams, printers, and even industrial controls into one easy-to-search database, giving hackers access to vulnerable devices online across the globe. And you can search its database via its website or command-line library.

How To: Get the Google Phone App with Spam Blocking & Business Search on Any Android Phone

The Google Phone app is one of the best dialers for Android today, especially with all of the unique and exciting features it brings to the table. Unfortunately, without owning a Pixel phone, you are unable to officially download the app, making a modified version your only option. However, this version of Google Phone is missing a few key features, such as spam protection and business search.

How To: Lower Vibration Feedback on Your Pixel 2 to Make Notifications Quieter

Haptic feedback and vibration of our smartphones have come a long way in recent years. These features are much more premium now than they once were, but most users are still unable to adjust the intensity for notifications or phone calls. Most higher-end devices make less noise on surfaces than in the past, but adjusting these values can still come in handy even today.

How To: Exploit Java Remote Method Invocation to Get Root

In the world of technology, there's often a trade-off between convenience and security. The Java Remote Method Invocation is a system where that trade-off is all too real. The ability for a program written in Java to communicate with another program remotely can greatly extend the usability of an app, but it can also open up critical vulnerabilities that allow it to be compromised by an attacker.