Targeted Traffic Search Results

How To: Begin your own blog and make money online

Have you always dreamed about quitting your day job to pursue your true passion in writing about tips on how to bake your famous cupcake pops? Stop dreaming and start doing! Thanks to the prevalence of the internet, blog writing is more popular than ever, and successful bloggers actually make quite a hefty chunk of change doing what they love.

How To: Send more traffic to your website or blog

Are you using your website or blog for exposure or business? If you would like more people on the web to notice your masterpiece, check out this clip. In it, you will get real, helpful tips on how to get people to your site, so they keep coming back. There are plenty of ways to promote yourself and you will learn all about them here. So, grab a pen and take some notes and get ready to become the next Internet superstar.

How To: Teach your child to ride a bike

In this tutorial, we learn how to teach your child how to ride a bike. Before you get them on the bike, make sure you pick a place that is fun and safe. Make sure there are no distractions and no traffic. Pavement is the best place to practice to ride a bike. Make sure the bike is ready for them before you teach them as well. When you teach them, place training wheels on and then when they are comfortable, take them off and start off with a slow ride. Let them walk and ride with the bike to s...

How To: Prefetch resources in order to make your website load faster for users

Google is the biggest and best search engine on Earth, and if you are a webmaster and want your website to be a big success it would really behoove you to know as much about how it works as possible. The Google Webmasters series of videos and website were created to teach webmasters, SEO professionals, and others how Google works by answering their questions and giving them insights into how they can best integrate and utilize Google's functionality to improve their business. This video will ...

How To: Use the XM NavTraffic feature in a 2010 Prius

In this video, we learn how to use the XM NavTraffic feature in a 2010 Toyota Prius. First, turn the system on and then use the plus button toe navigate to where you are on the map. Next, you will be able to see what is coming up in the next few miles and what road blocks or delays you can expect. You can also enter in the destination that you are headed to, and the system will give you directions on which way will get you there the fastest. You can mark different areas that you have been at ...

How To: Add Google Analytics to your site and monitor traffic

Wouldn't it be nice to know how many people actually visited your site each day, and how long they stayed there? Google Analytics is a great, free utility from Google that will tell you just that and so much more. In this clip, the Web Guru will show you how to use this program, generate and install an HTML code onto your site so that you can keep track of your visitors and demographics. This is a fantastic tool for advertising purposes and so you can see which content is working best for you...

How To: Hack UnrealIRCd Using Python Socket Programming

UnrealIRCd is an open-source IRC server that has been around since 1999 and is perhaps the most widely used one today. Version 3.2.8.1 was vulnerable to remote code execution due to a backdoor in the software. Today, we will be exploiting the vulnerability with Metasploit, examining the underlying code to understand it, and creating our own version of the exploit in Python.

How To: Use LinEnum to Identify Potential Privilege Escalation Vectors

The art of privilege escalation is a skill that any competent hacker should possess. It's an entire field unto itself, and while it's good to know how to perform the techniques involved manually, it's often more efficient to have a script automate the process. LinEnum is one such script that can be incredibly useful for privilege escalation on Linux systems.

How To: Use Metasploit's Timestomp to Modify File Attributes & Avoid Detection

It is said that the best way to avoid detection when hacking is to leave no trace, and often that means not touching the filesystem at all. But realistically, in most cases, it's impossible not to interact with the filesystem in one way or another. The next best thing to do to throw off any investigators is to change the file attributes to hide activity. We can do this with Metasploit's Timestomp.

How To: Change Resolution & Bit Rate in Filmic Pro for High-Quality Video Up to 4K at 100 Mbps

Filmic Pro harnesses the full native power of your iPhone or Android phone — and then some. If your smartphone shoots in 4K resolution, Filmic Pro will let you choose that resolution. However, it's not all about the pixels — bit rate is an essential factor in determining the overall quality of your 720p, 1080p, or 4K video, something Filmic Pro gives you full control over.

How To: Use Websploit to Scan Websites for Hidden Directories

Websites are often misconfigured in ways that allow an attacker to view directories that are not ordinarily meant to be seen. These directories can contain sensitive information such as private credentials or configuration files that can be used to devise an attack against the server. With a tool called Websploit, hackers can scan targets for these hidden directories without difficulty.

Hacking macOS: How to Perform Situational Awareness Attacks, Part 1 (Using System Profiler & ARP)

The first few minutes after gaining access to a MacBook are critical — but where do we begin? Using tools built into macOS, we can develop an in-depth understanding of running background processes, detect antivirus software, locate sensitive files, and fingerprint other devices on the network. All of this can be done without installing additional software or modifying any files.

Mac for Hackers: How to Set Up a MacOS System for Wi-Fi Packet Capturing

MacOS isn't known as an ideal operating system for hacking without customization, but it includes native tools that allow easy control of the Wi-Fi radio for packet sniffing. Changing channels, scanning for access points, and even capturing packets all can be done from the command line. We'll use aliasing to set some simple commands for easy native packet capture on a macOS system.

How To: Sand and save a wood floor

Over time, a wooden floor can sustain a heavy amount of damage thanks to the weather, heavy foot traffic, and things constanly falling on it. So, it's always a good idea to refinish a floor every few years or so to make sure that it will last longer. This tutorial will show you how to sand and save a wood floor. It's a difficult task, so make sure you have the time and patience to do it. Enjoy!

How To: Find the embedded player tool in Youtube

Are you a frequent Youtube poster? Then tracking which blogs and other sites have embedded you videos can be helpful in determining who is interested in your videos and increasing your number of views. When Youtube changed their site recently, they moved the Embedded Player tool that allows you to track that information and used to be under the Insight tab to a new place, causing mass confusion. This video shows you where to locate that tool in the new site layout, allowing you to track where...

How To: Rent bikes as a traveler in Paris

In this video tutorial, viewers learn how to rent bikes in Europe. The cost to rent a bike is about $15 and the cost decreases per day the longer you rent it. Bikes can easily be rented in towns in small rental shops. Europe has many bike paths with signs for tourists to travel along without any traffic. To find these paths, users should get information from the tourist information centers or bike rental shops. This video will benefit those viewers who will be visiting Europe and would like t...

How To: Crack a WPA encrypted wireless network

In this how to video, you will learn how to crack a WPA encrypted wireless network. To do this, you will need the Air Crack package for Linux. First, disable the wireless adapter and enable monitor mode. Next, identify the channel in the wireless network and Mac address. Once you have this, you can listen to the traffic coming to and from this point. Wait for the handshake or disconnect something in order to force it to reconnect. From here, you are ready to perform the attack. With any encry...

How To: Share music & video in iTunes 9 with Home Sharing

Brad Garland guides us through the process of sharing our media files so that they can be stored on a single computer in our home, and played on any computer that is connected to this computer with iTunes 9. Using this technique, he and his wife can not only play the music that's stored on the central computer via their laptops, but also copy the desired music and videos over to their laptops much like they would for an iPod. Brad explains that he does not include Podcasts in this process, be...