Service Wishes Search Results

How To: Hack SSL passwords with ARP poisoning

Are you serious about becoming a bonafide hacker? Then you simply must learn how to hack SSL passwords using ARP poisoning. ARP poisoning, also known as ARP spoofing, involves attacking an ethernet wireless network by looking at the data frames on a LAN (local area network). Resultingly, you can sniff plaintext passwords, SSL passwords, and even manufacture denial-of-service attacks.

How To: Carve fruit centerpieces

In this great video clip series our expert, Karen Weisman, shows us a few great centerpiece ideas that are easy to make without costing an arm and a leg. All you need are a few melons, some extra fruit and a little bit of time and you will have a delightful centerpiece that accents the rest of the table and the food that is on it. She shows you how to make complex pieces like a peacock and a wishing well but also throws in some simpler ideas like a swan. Take these ideas, run with them and ma...

How To: Voice dial your iPhone

An easy way to use a voice command to dial your iPhone is by downloading an ap that enables you to do just that. Without a built in voice dialing system, you will have to turn to external solutions if you wish to have this ability.

How To: Make a decorative wooden bucket

This tutorial teaches you how to make a decorative wooden bucket. This project is suitable for a use as a planter or inside a wishing well. You will need a piece of plywood, a couple of strips of wood, a piece of rod for the handle, two copper straps, nails, and staples. Watch this step by step how to video and make a decorative wooden bucket for your garden.

How To: Use the biblical Greek lexicon

The lexicon of a language is its vocabulary, including its words and expressions. In this language tutorial you will learn to use the biblical Greek (Koine) lexicon or dictionary. This is a perfect lesson for those who wish to study this ancient language. Listen and repeat the words in this language tutorial and you will be speaking biblical Greek in no time.

How To: Collapse IE7 favorites folders

In Internet Explorer 7 when you wish to add a link to favorites, the drop down folder list is expanded. This can make it difficult to add a favorite to the correct Folder/subfolder. This video shows a different way to do this with the folders collapsed.

How To: Find Passwords in Exposed Log Files with Google Dorks

You may not have thought of dorks as powerful, but with the right dorks, you can hack devices just by Googling the password to log in. Because Google is fantastic at indexing everything connected to the internet, it's possible to find files that are exposed accidentally and contain critical information for anyone to see.

News: Google Is Taking on Apple's iMessage with RCS — Here's How Android's New Texting Experience Stacks Up

You've probably heard of RCS messaging. The new standard has been promoted by Google as their answer to iMessage and is the backbone behind the new "Chat" features in Android Messages. With RCS, Android phones will now enjoy enhanced messaging like iPhone users have had for years — but is it really the same?

How To: Invite People to Messenger Group Chats with a Link So They Can Join Right Away or Wait on Approval

While some of our group chats should probably remain private and closed off, others will only get better with more people. Whether you're organizing an event and need a headcount or you want to share a funny YouTube video with a large crowd, you can add all the friends you wish to on Facebook Messenger by sending them a unique link.

The Hacks of Mr. Robot: How to Use the Shodan API with Python to Automate Scans for Vulnerable Devices

Shodan calls itself "the search engine for internet-connected devices." With so many devices connected to the internet featuring varying levels of security, the special capabilities of this search engine mean it can provide a list of devices to test and attack. In this tutorial, we'll use Python to target specific software vulnerabilities and extract vulnerable target IP addresses from Shodan.

How To: Remove Bloatware on Your LG V30 — No Root Needed

With the V30, LG has really delivered an amazing smartphone that hits all the major features consumers want. Amazing camera, beautiful edge-to-edge display, great battery life, water resistance, and smooth performance — there isn't much not to like about the LG V30. Unfortunately, it does suffer from heavy bloatware thanks to the carriers. The good thing is, unlike in the past, you are not stuck with it.

How To: Your Phone's Biggest Security Weakness Is Its Data Connection — Here's How to Lock It Down

After numerous scandals like the Equifax data breach and the 2016 US election, cybersecurity has become a significant issue for Americans. Unfortunately, anytime we use our devices, we're open to a cyber attack — especially when we browse the web. However, there are ways that we can make it harder for hackers and data miners.

How To: Simulate a RAT on Your Network with ShinoBOT

A remote administration tool, or RAT, is a piece of software used for remotely controlling machines. They are commonly used by tech support to gain remote access for troubleshooting purposes, but RATs are also an important part of a hacker's advanced persistent threat (APT) toolkit. Unlike standard administration RATs, these tools are designed to be delivered stealthily and operate undetected.

How To: Security-Oriented C Tutorial 0x01 - Hello, World!

Welcome back, reader! In this tutorial, we will be covering our first program! So let's get to it. We all know the unspoken tradition of the first program when learning a language and of course, here we will respect and complete it. Fire up your favorite text editor (be it vim, emacs, gedit, it's all the same to me, no h8) and try to keep up.

Tutorial: Password Profiling with CUPP

Greetings all. I'm back with another informational review of the diversity of utilities for use in the sphere of hacking at your disposal. Today we are going to cover the insides of CUPP (Common User Passwords Profiler) in its entirety. The tool is very basic in nature, as there is little to no configuration needed to get cracking (worst pun ever). So let's get started, shall we?

How To: Lasagna Soup, Plus Other Yummy Ways to Use Lasagna Noodles

Lasagna, that layered, creamy baked pasta dish, is a lovely comfort food that's great for a crowd. But if you've ever made it, then you know you're usually left with some leftover lasagna noodles. (Although that's always better than the frustration of running out of the noodles while you're still making a traditional lasagna.) Still, what do you do when you're still left with a bowlful of the wide ribbons?