Trusted Sources Search Results

How To: 4 Easy Steps to Keep Malware Off Your Android Phone

Because of the way Google Play works, Android has a "bad app" problem. Google allows any developer to upload an app to the Play Store, regardless of if it works, how it looks, or whether or not it can harm users. Malware scanning happens primarily after apps are uploaded, and though Google has recently taken steps to safeguard users with its Play Protect program, you don't have to depend on them.

Social Engineering: How to Use Persuasion to Compromise a Human Target

Social engineering makes headlines because human behavior is often the weakest link of even well-defended targets. Automated social engineering tools can help reclusive hackers touch these techniques, but the study of how to hack human interactions in person is often ignored. Today, we will examine how to use subtle, hard to detect persuasion techniques to compromise a human target.

How To: Install Gitrob on Kali Linux to Mine GitHub for Credentials

GitHub is an extremely popular site that allows developers to store source code and interact with other users about their projects. Anyone can download public, open-source files on GitHub manually or with Git, and anyone can fork off someone's project to expand or improve it into its own project. It's a really great site for programmers, developers, and even inspiring hackers.

Networking Foundations: Exploring UDP via Wireshark(Part 1)

Hello ladies and gentlemen, I'm back with another informative(hopefully) article for you all. Once again I would like to apologize for my absence for about a week or so. I have some stuff going on with my life and university and I haven't found enough time to make a fully in-depth article. In this article I'm going to walk you through one of the main networking protocols when it comes to communication across the Internet between programs, aka UDP(User Datagram Protocol).

How To: Make a Sequel to a Game

If your company has already released some popular and addictive game and you're thinking about creation a sequel, this article is just what you need. We gathered the main tips and advices that will be useful for the building a strategy and a sequel itself. Check out the following instructions and recommendations that can lend you a hand in making a sequel for your game.

SPLOIT: What to Expect in the Journey as Hackers

Greetings my fellow aspiring hackers, It's still Christmas and we have a lot of things and hugs and kisses and ... to share ( you know the things that you do ). I have never done this before but I just felt to encourage you on the quest for knowledge, security and defence, skills and a whole lot more that comes out as a result of pursuing hacking. What we mean by hacking on this forum is White hat Hacking and OTW has great articles on it and I don't need to explain myself on that one.

How To: Make Cheese Fondue Without a Fondue Pot

Fall is the time for comfort foods—and what is more comforting than crusty bread slathered in melted cheese? Owning a fondue pot is both convenient and wonderful, but not all of us have the luxury of space for nonessential kitchen appliances. However, there are plenty of ways to make an absolutely delicious, lump-free fondue without the traditional equipment.

Hack Like a Pro: How to Compile a New Hacking Tool in Kali

Welcome back, my newbie hackers! Recently, I "upgraded" to Kali as my hacking platform, despite my preference for BackTrack. I did this reluctantly, primarily because new readers here could no longer download BackTrack from their site. I want to point out here that we all must keep in mind that with any software—or for that matter, any product—that is newer is not necessarily better.

How To: Send Your Secret Spy Messages Wirelessly Through Light with This DIY Laser Audio Transmitter

Looking to transmit some super-secret audio communications to your other spy buddies? A laser is the perfect tool for getting your sounds heard from a small distance—without anyone intercepting them— even if it's just a cover of your favorite pop song. A laser audio transmitter uses light rather than radio waves to transmit sound. This is a much more secure way to send audio communications because the laser is a focused beam of light, whereas radio waves are not controlled, so they can be pic...

How To: Makea cute origami robot out of paper

Because who wants to mess with all those wires, programming and power sources? You can make your own origami robot out of paper or cardboard! Though it probably won't do as much as a real robot would, it's nevertheless a fun project to do! All you need are a few sheets of paper (you can also used cardstock or a thin cardboard, depending on how sturdy you want your robot to be). Then just follow the steps in this tutorial!

How To: Use GIMP to add a fake lip piercing to a photo

GIMP is the free alternative to Photoshop, and many of the things that you can do in Photoshop, you can also do in this open source software. Want to see how you'd look with a lip piercing, or want to touch up a photo and add one where there isn't? This tutorial shows you how to add a fake lip piercing to nearly any photo. It's not that difficult - as long as you're familiar with the basics of GIMP, you'll be able to make this work for you!

How To: Create professional looking business promotional video

In this video, we learn how to create professional looking business promotional video. To make your video more professional, you can first make your video shorter. The shorter the better, which will get your point across more quickly. Videos should be less than a minute and thirty seconds. If you're using a web cam, don't get too far away from it. If you're using a Flip camera, use a tripod and make sure the light source is coming from in front of you. Natural lighting is also nice. Make sure...

How To: Master technique when drawing hair

The first step in this video is to draw a rectangle on a piece of paper to gauge the length of the hair stokes. The artist then makes long pencil marks along the inside of the rectangle that are much less defined towards the middle. It is explained that you need to go in one direct with your pencil strokes as going back and forth gives an unrealistic final product. It is shown that you must begin at the beginning of the hair source and bring the strokes downwards for more realism. Four exampl...