Welcome back, my aspiring hackers! Domain Name System (DNS) is one of those things we seldom think about unless it doesn't work. Then, it can be very frustrating when we attempt to navigate to a website and we get that frustrating error message.
Welcome back, my novice hackers! I have tried to emphasize throughout this "Hack Like a Pro" series that good reconnaissance is critical to effective hacking. As you have seen in many of these hacks, the techniques that we use are VERY specific to the:
Welcome back, my budding hackers! In previous tutorials, we've looked at some of the basic commands and concepts for using Linux. Along the way, I realized that I've failed to provide you with some basic background material on the stdin, stdout, and stderror.
Welcome back, my budding hackers! As you know, I firmly believe that to be a true professional hacker, you need to be proficient in Linux. This is for a number of good reasons.
Welcome back, my hackers apprentices! To own a network and retrieve the key data, we only need to find ONE weak link in the network. It makes little sense to beat our heads against heavily fortified systems like the file and database server when we can take advantage of the biggest weak link of all—humans.
KitKats? Toast? Sorry if that headline made you hungry, but no I'm not talking about Nestlé's chocolatey wafer treat, nor the crunchy slices of bread you have with your eggs in the morning.
Welcome back, my fledgling hackers! Awhile back, I demonstrated one of my favorite little tools, netcat, which enables us to create a connection between any two machines and transfer files or spawn a command shell for "owning" the system. Despite the beauty and elegance of this little tool, it has one major drawback—the transfers between the computers can be detected by security devices such as firewalls and an intrusion detection system (IDS).
When it comes to the user interface, you're pretty much limited to the stock one that comes on your Samsung Galaxy Gear smartwatch—a carousel of large black and white icons representing the features and applications on the watch.
With the Samsung Galaxy Gear smartwatch only several weeks old, the extent as to what you can do with it is limited since there are only about 70 apps in the Gear Store right now, and a lot of those need the full app installed on your Samsung Galaxy Note 3 in order to function properly.
Welcome back, my fledgling hackers! It's been awhile since we did a Metasploit tutorial, and several of you have pleaded with me for more. I couldn't be happier to oblige, as it's my favorite tool. For the next several weeks, I'll intersperse some new guides that'll help expand your Metasploit skills and keep you abreast of new developments in Metasploit, so look for them in the near future.
Welcome back, my fledgling hackers! The database is the hacker's "pot-of-gold," as it contains information that is very valuable to both the business and the hacker. In this, the second of my series on hacking databases, we're on the "hunt" for Microsoft's SQL Server. Although far from the most commonly used database (Oracle hold's that title), Microsoft's SQL Server is very often found in small-to-medium sized businesses. Even a few big businesses use it.
Most smartphone manufacturers focus on megapixels when it comes to cameras, but HTC took a different direction with the HTC One. Instead of trying to compete with the 13MP camera on the Samsung Galaxy S4, or the 20MP camera on the Sony Xperia Z1, or even the newer iPhone's 8MP, they decided on a simple 4MP camera. At first, you might think that 4MP is terrible, but not so fast. There are many advantages to your HTC One's camera that other phones just don't have.
Welcome back, my aspiring hackers! As mentioned several times in previous Linux tutorials, nearly everything in Linux is a file, and very often they are text files. For instance, all of the configuration files in Linux are text files. To reconfigure an application in Linux, we simply need to open the configuration file, change the text file, re-save, and then restart the application and our reconfiguration is applied.
If you're a Twitter user, it's a safe bet to assume that you've used a hashtag. On all social networking sites that have the capability, such as Instagram, Facebook, and Google+, the pound (#) symbol is used to mark and designate specific keywords or topics in order to make it effortless for users to connect with one another.
Welcome, my hacker novitiates! As part of my series on hacking Wi-Fi, I want to demonstrate another excellent piece of hacking software for cracking WPA2-PSK passwords. In my last post, we cracked WPA2 using aircrack-ng. In this tutorial, we'll use a piece of software developed by wireless security researcher Joshua Wright called cowpatty (often stylized as coWPAtty). This app simplifies and speeds up the dictionary/hybrid attack against WPA2 passwords, so let's get to it!
Welcome back, my greenhorn hackers! Continuing with my Wi-Fi hacking series, this article will focus on creating an invisible rogue access point, which is an access point that's not authorized by the information technology staff and may be a significant security vulnerability for any particular firm.
A spare key is one of those things that never seems like a huge deal until you need it. If you've ever lost your keys, had them stolen, or locked yourself out of your house or car, you know how difficult and embarrassing it can be trying to get your door open.
Welcome back, my hacker apprentices! In recent weeks, the revelation that the NSA has been spying on all of us has many people up in arms. I guess I take it all in stride as I just assume that the NSA is spying on all of us—all of the time. Don't get me wrong, I don't condone it, but I know the NSA.
Welcome back, my novice hackers! Most of my tutorials up until this point have addressed how to exploit a target assuming that we already know some basic information about their system. These include their IP address, operating system, open ports, services running, and so on.
Welcome back, my neophyte hackers! Several of you have written me asking how to crack passwords. The answer, in part, depends upon whether you have physical access to the computer, what operating system you are running, and how strong the passwords are.
One of the most frustrating things on the Internet are sites that make you register just to view content. I'm not talking about paywalls—I mean the sites that make you give them personal information to look at free articles or forum threads. Most people are uncomfortable with this because a lot of these sites either spam you themselves, or sell your information to someone else who will.
Remote Desktop gives you access to your Windows 8 PC or device from wherever you are to run your applications and access your files remotely.
Having trouble finding the right foundation for your makeup creations? The trick is, you need to know about them first, and know about your skin type, in order to get the perfect match. This video will help you decipher your foundation makeup issues and find the perfect one. Visit Hoppy's Makeup for more information.
Kai Shu is the most modern type of Chinese calligraphy. This video demonstrates how to draw some simple, unrelated characters with style, grace, and a brush. It goes on to show some more printed examples of this type of calligraphy. Work slowly, practice, and you can master this ancient painting art for yourself.
So you don’t need to have a full on conversation but you do want to relay some information to someone. A text message the perfect option to get a short message across using your cell phone or even just to say hi.
This will hack speed on Typing Maniac. Sometimes slowing down the process is the only way you'll win. If that's the case, then use Cheat Engine to slow down time and become the ultimate typer.
Cheat your way to the top of Typing Maniac with Cheat Engine. Cheat Engine solves all of your playing woes by doing all of the work for you.
In these videos on raising farm animals, learn some of the basic facts about sheep. Our expert naturalist will discuss the major characteristics of this bovine species, including different types of sheep, types and colors of wool, eating habits and digestion (it is a ruminant animal), how to raise and handle a sheep, how to go about buying a sheep of your own, signs of disease, when to shear, how to tell a ewe and a ram apart, and how to breed sheep.
In this video you will see how to upload image content types on your Drupal CMS system
In these instructional videos you’ll learn what to expect during typical 30 to 60 minute lymphatic drainage massage session. Expert massage therapist Patricia Coffman offers tips and advice on the benefits of lymphatic drainage massage and the frequency with which you should receive treatment.
Using makeup is the best and fastest way to get rid of undereye circles. In this tutorial, learn how to erase a late night in the morning with the right type of makeup for your skin type. This process is quick and looks great. You don't need to wear a lot, just the right type. So, check out this tutorial and look fresh faced everyday.
Slow that freaking game down! In order to score big in Typing Maniac, you need to slow down! And the only way to slow down the game is to use Cheat Engine.
In this tutorial, we learn how to password protect any folder on your desktop in Windows. First, right click on your desktop, then go to "new", then "compressed zipped folder" and name it whatever you want. Next, put what you want inside of the folder. After you've done this, open the folder then go to "file" and then "add a password". Pick a password that you will remember and type it into the text box, after you do this, click on "ok". Now your folder will be password protected and you will...
In this tutorial, we learn how to make your own maternity jeans. First, you will take you favorite jeans, then cut the panel all around, including where the button goes. After this, use any type of shirt and sew it onto the jeans. This will go onto your stomach and under your breasts while you are pregnant. You won't be able to tell that you made these, and they will look great. Remember you can use any type of shirt you want to make the panel, just make sure you don't want to wear it again. ...
In this video, we learn how to get past WebSense. First, download a file called UltraSurf. Another way to get past WebSense is to go to Google and type in http://junkblender.com. When you get on the website, go to the link that says "cakebird". After this, type in what website you want to go to and you should be able to go to it. These are both free and easy ways to get past WebSense within only a few minutes or less, including download time. This is great for schools or employers that block ...
This video is a useful one to restore sound in our PC. If the audio or sound systems does not functions in your system this video will surely help. This video has many solution to the problem and any of these solutions will certainly help you to rectify the problem. First this video instructs us to check whether the service for sound is enabled or not. Then it describes about the drivers needed for the sound. Some of the drivers may be outdated so that type of drivers must be updated for the ...
In this tutorial, we learn how to find your computer's IP address. An IP address is used to know the exact location of someone using a computer with internet access is located at. First, turn your computer on and go to your main desktop. Then, click on "start", (which is located on the lower left hand side of the tool bar at the bottom), then click "run" and once that opens up, type "cmd" into the white empty space. Hit "ok" and when this comes up, type in "IPConfig" and hit "enter". Your com...
In this video, we learn how to put a LinkedIn Badge on a Facebook profile. First, go to the top right hand corner search box in Facebook. Type in, "my LinkedIn profile" and click "search". Once you do this, results will show and click on the correct one. Once you are on the page, click to become a fan and click on "application". It will now ask your permission for the application to show up on your Facebook. Now, type in your profile URL and click "add to profile". Once you do this, the badge...
This video shows you how to make a footnote in MS Word 2007. 1. Click on the last letter of the word where the footnote refers to. 3. Click on the References tab. 4. Click Insert Footnote. 5. A tiny number will appear beside the word where you clicked and a footnote number with a line on top will also appear on the last part of the page. 6. Type in the words or the notes. 7. You may now continue typing your work.