Safe Server Search Results

How To: Optimize SQL performance

Gain insight into best practices for SQL Server optimization and ways to alleviate many root causes that can impact performance of your SQL Server database. Kevin also will discuss how to manage for planned and unplanned changes, speed time to implementation of your applications and ensure that your databases are running as they should.

How To: Use Command Injection to Pop a Reverse Shell on a Web Server

Command injection is a technique used by hackers to execute system commands on a server, usually via a web application or some kind of GUI. This can happen when an application provides some sort of functionality to the user involving the use of system commands. When the input is not properly sanitized, commands not originally intended to be run are allowed to be executed.

Networking Foundations: Dynamic Host Configuration Protocol

Hello ladies and gentlemen, PySec here coming at you with another informative(hopefully) article for you all. In the last tutorial, we finally finished our discussion about IP Addressing and I intentionally didn't mention a really important concept with which IP Addressing wouldn't be feasible without it. What I'm talking about is how our network device gets the IP Address in order to communicate with other devices on the network/Internet. There are many different ways for that to be accompli...

How To: Set Up an Eviltwin

When I tried to set up an eviltwin for a MitM-constelation in kali 2.0, I couldn't provide internet to the victim. The origin was the brctl bridging. I have read many tutorials but all of them where explained in backtrack and older versions of kali. So i was searching for a solution without using brctl and this solution will be explained now. This will just work on unencrypted wireless-environments.

News: Whitestar PVP Server Build Teaser

Still working on mega project builds. This one is going into my own PVP server which (will) contain 4 theme'd biomes inside of a 155m sphere - inside of a 255 meter containment sphere inside a 1000m+ void. The outer sphere acts as both artificial sunlight and a drop-death height of 50m. 4 more outer panels to go (water and lava) and it's ready for interior work and redstone - including command-block powered proximity traps that don't have any triggers marking them as well as hidden walls that...

Hack Like a Pro: How to Use Netcat, the Swiss Army Knife of Hacking Tools

For over 20 years, a tiny but mighty tool has been used by hackers for a wide range of activities. Although well known in hacking circles, Netcat is virtually unknown outside. It's so simple, powerful, and useful that many people within the IT community refer to it as the "Swiss Army knife of hacking tools." We'll look at the capabilities of Netcat and how the aspiring hacker can use it.

How To: Get Faster Download Speeds on Your Steam Games

Steam is an online platform that lets you download and play over 2,000 video games, from first-person shooters to RPGs, as well as a pretty long list of indie games. You can play on your PC, Mac, mobile device, or even your television, and it has a community of over 40 million gamers. Prices are different depending on the type of game and how new/popular it is, but they're generally about the same as what you'd pay for an Xbox or PlayStation version. They also have a decent list of free games...

How To: Find, download and use an FTP client

Select an FTP client that allows you to connect to the webserver. Download a free Core FTP Le software. Install the program. Use the site manager to name the internet site. Create a host/url, a user name, password and a connection. Connect to the web server. Create an index file to make files viewable. Open the Core FTP LE software. Drag files from the desktop (left side of the dialog box) to the internet server (right side of the dialog box.)

How To: Do the wrap dance move to start grinding with a girl

If you've ever wanted to take your dancing to the next level with a girl at a club (i.e. if you've ever wanted to start grinding pronto), then you know how frustrating it can be. If you move to fast to grinding the girl, she'll get freaked out and think you're a pervert. But if you take your time and only dance with her from a safe distance, she'll star to become disinterested and think that you are too.

How To: Replace the digitizer screen on an iPod Touch 2nd Gen

This is a video tutorial that is showing its audience how to replace the digitizer screen on a 2nd generation Ipod Touch. The first step is to remove the screen from the Ipod touch. Secondly use a safe pry tool and run it between the backing of the screen and the glass, this will release the necessary clips that are holding your screen in place. Next take the screen off. Next separate the digitizer from the mid section with the safe open pry tool again. Pry apart the digitizer and the mid sec...

How To: Remove annoying spyware on your PC in Windows XP

This is a Computers & Programming video tutorial where you will learn how to remove annoying spyware on your PC in Windows XP. Some spyware can be really nasty. This video shows how to remove spyware for free. Go to Download.com, and search for ‘ad aware’, download and install it. This video recommends Ad-Aware. While installing, select safe mode of scanning, otherwise some spyware may not be detected. Then, you need to update the definitions. Keep the definitions updated regularly. After upd...

How To: Use the Microsoft Windows Firewall

In order to keep your PC safe from annoying or potentially dangerous threats on the Internet, a properly-configured firewall is a crucial item in helping prevent your system from becoming compromised. The Windows Firewall in Windows Vista™ is the first line of defense in helping to keep your computer safe. By preventing your computer from being infected by malware, Windows Firewall is designed to be easy to use and is automatically enabled to protect your computer as soon as Windows starts. T...

How To: Fight against Enderman in Minecraft 1.8

Minecraft 1.8 has introduced Enderman to tons of blocky servers all over the world. If you're looking for ways to fight against Enderman or just avoid Enderman all together, take a look at this walkthrough on how to do both. Be sure to grab an Ender Pearl so that you can half their attack range!

How To: End shutter lag, improve WiFi performance and more

Find which airlines Google is providing free Wi-Fi on this holiday season, fix shutter lag on digital cameras, wipe your hard drive for free, improve your Wi-Fi router performance, adjust your television and monitor for accuracy, choose the best 1080p projector, use a single server that can handle OS X, Windows & Linux simultaneously, and use the best audio encoding system for Windows Media Center and Zune.

Make edible prop bodily fluids: poop, vomit, snot, and blood

The human body is full of different kinds of fluids, most of which are either gross or dangerous to remove from a person for use in one of your films. Fortunately, most of them are pretty easy to replicate using household materials. This video will show you how to make edible prop fake blood, feces, vomit, and snot. They all look great, are safe, and will make you movie much more realistic.

How To: Protect your Wordpress blog from hacker attacks

Google is one of the most powerful forces on the Internet, and their technology can be the key to helping you find success in whatever your online endeavor might be, from web design to filmmaking. This video is a part of their Google Webmaster Series, offering help to webmasters the world over on how to best utilize Google in their work. This video will show you how to ensure that your Wordpress blog is safe from the hacker attacks that are so common for Wordpress users.

How To: Install siding safely during residential construction

This video is dedicated to the residential construction workforce and focuses on how to safely install siding. It's intent is to help provide employees and employers with the tools to make the residential workplace productive and safe. It outlines a number of code requirements and will show how to work safely and how to meet all of the safety requirements during the siding phase of residential construction. The areas discussed in this safety video are job preparation, walk-around safety inspe...

How To: Use the Waveform Monitor in Final Cut Pro

Make sure your video projects are broadcast safe with color correction and the Waveform Monitor in Apple's Final Cut Pro. This free video tutorial presents a complete overview of how to use the Waveform Editor and FCP color correction tools for increased darker blacks and whiter whites while staying with broadcast specifications.

How To: Rip DVDs to build a movie jukebox home theater server

Want to play your video collection on any media extender, console or AppleTV? Step one is to get your movies off of the DVDs and onto your hard drive! If you're like most people you probably have a huge library of DVDs that you've bought and collected over the years. Unfortunately, it's an inconvenient format if you want to playback all that content anywhere around the house. So, learn how to rip and encode that stack of DVDs into a format that you can play on your Windows Media Extender, set...

How To: Install a Child Car Safety Seat

Car accidents are the leading cause of death of children in the United States. Follow the guidelines in this how-to video to give your child a safe ride. All you'll need is the kid's new car seat and the owner's manual to your vehicle. Proper installation is key, so check out this instructional video to learn where and how to put that car seat in safely and correctly.