Unflavored Types Search Results

How To: Everything You Need to Know About iOS 8 Beta 2 for iPhone, iPad, & iPod Touch

Apple has released the 2nd beta of iOS 8, exactly fifteen days after the first version was unveiled at WWDC and subsequently released to developers. I've already shown you some of the new features of iOS 8, like location-based app alerts, randomized MAC addresses, hidden Safari tricks, and a slew of new things in the Messages app. But if you've had the chance the explore iOS 8, let's go through some of the changes that Apple has made to the latest iteration of its mobile operating system.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 3 (Recovering Deleted Files)

Welcome back, my tenderfoot hackers! I recently began a new series on digital forensics to help tenderfoot hackers from being detected and ultimately, incarcerated. In this installment of that series, we will look at recovering deleted files. This is important to hackers because you need to know that even when you delete files on your computer or on the victim's computer, a forensic investigator can usually recover them.

Hack Like a Pro: How to Create a Nearly Undetectable Backdoor with Cryptcat

Welcome back, my fledgling hackers! Awhile back, I demonstrated one of my favorite little tools, netcat, which enables us to create a connection between any two machines and transfer files or spawn a command shell for "owning" the system. Despite the beauty and elegance of this little tool, it has one major drawback—the transfers between the computers can be detected by security devices such as firewalls and an intrusion detection system (IDS).

Hack Like a Pro: How to Use Metasploit's Psexec to Hack Without Leaving Evidence

Welcome back, my fledgling hackers! It's been awhile since we did a Metasploit tutorial, and several of you have pleaded with me for more. I couldn't be happier to oblige, as it's my favorite tool. For the next several weeks, I'll intersperse some new guides that'll help expand your Metasploit skills and keep you abreast of new developments in Metasploit, so look for them in the near future.

How to Hack Databases: Hunting for Microsoft's SQL Server

Welcome back, my fledgling hackers! The database is the hacker's "pot-of-gold," as it contains information that is very valuable to both the business and the hacker. In this, the second of my series on hacking databases, we're on the "hunt" for Microsoft's SQL Server. Although far from the most commonly used database (Oracle hold's that title), Microsoft's SQL Server is very often found in small-to-medium sized businesses. Even a few big businesses use it.

How To: What Every HTC One Owner Should Know About the UltraPixel Camera to Never Miss a Shot

Most smartphone manufacturers focus on megapixels when it comes to cameras, but HTC took a different direction with the HTC One. Instead of trying to compete with the 13MP camera on the Samsung Galaxy S4, or the 20MP camera on the Sony Xperia Z1, or even the newer iPhone's 8MP, they decided on a simple 4MP camera. At first, you might think that 4MP is terrible, but not so fast. There are many advantages to your HTC One's camera that other phones just don't have.

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 10 (Manipulating Text)

Welcome back, my aspiring hackers! As mentioned several times in previous Linux tutorials, nearly everything in Linux is a file, and very often they are text files. For instance, all of the configuration files in Linux are text files. To reconfigure an application in Linux, we simply need to open the configuration file, change the text file, re-save, and then restart the application and our reconfiguration is applied.

How to Hack Wi-Fi: Cracking WPA2-PSK Passwords with Cowpatty

Welcome, my hacker novitiates! As part of my series on hacking Wi-Fi, I want to demonstrate another excellent piece of hacking software for cracking WPA2-PSK passwords. In my last post, we cracked WPA2 using aircrack-ng. In this tutorial, we'll use a piece of software developed by wireless security researcher Joshua Wright called cowpatty (often stylized as coWPAtty). This app simplifies and speeds up the dictionary/hybrid attack against WPA2 passwords, so let's get to it!

How To: 6 Ways to Access Members-Only Websites and Forums Without Giving Up Your Real Info

One of the most frustrating things on the Internet are sites that make you register just to view content. I'm not talking about paywalls—I mean the sites that make you give them personal information to look at free articles or forum threads. Most people are uncomfortable with this because a lot of these sites either spam you themselves, or sell your information to someone else who will.

How To: Get the perfect foundation for your face's skin type

Having trouble finding the right foundation for your makeup creations? The trick is, you need to know about them first, and know about your skin type, in order to get the perfect match. This video will help you decipher your foundation makeup issues and find the perfect one. Visit Hoppy's Makeup for more information.

How To: Raise sheep on a farm

In these videos on raising farm animals, learn some of the basic facts about sheep. Our expert naturalist will discuss the major characteristics of this bovine species, including different types of sheep, types and colors of wool, eating habits and digestion (it is a ruminant animal), how to raise and handle a sheep, how to go about buying a sheep of your own, signs of disease, when to shear, how to tell a ewe and a ram apart, and how to breed sheep.

How To: Jailbreak an iPhone step by step

In this video from faintstarlite we learn how to jailbreak an iPhone 3GS step by step for beginners! Your iTunes needs to be running 3.0 and you must use a windows computer. Plug in your iPhone to your computer. Go to purplera1n.com and download the program. Your iPhone will now reboot and it will load up with the Purple Rain icon. Now click on the Freeze icon and install Cydia which then allows you to download programs on your iPhone. You will need this to download ultrasnow which unlocks yo...

How To: Tie the "Asheley's flower knot" flower knot variation

In this how-to video from the TyingItAllTogether Channel, learn how to tie Clifford W. Ashley's flower knot. Ashley is the author and illustrator of a book he wrote about tying various types knots, including ones that he created himself. In his book, Ashley shows how to tie this knot, but does not show in his illustrations how to actually hold and tie the knot in one's hand. This video tutorial seeks to clarify those steps. You will need to begin with a piece of rope folding it in half to eff...

How To: Cook a deboned turkey in a small oven

In this tutorial, we learn how to cook a deboned turkey in a small oven. First, take out the sack of guts and the turkey neck from the turkey and place in a large pot full of water. When finished, cut the turkey open with a sharp knife, then remove the breast plate and ribs. Then, remove all the bones and parts you can find on the inside of the turkey by cutting gently and pulling the good meat gently away. Once you have cut all of the bones out of the chicken, you can start to cook the turke...

How To: Solve a Rubik's Cube in 5 minutes

To solve a Rubik's cube, you will need to begin by keeping in mind the 7 steps. To learn about the cube itself, you will need to take it apart. The cube has 3 types of pieces. The center pieces do not move. They are actually fixed. Every piece is unique, and every piece has a unique place.