Unique Type Search Results

Hack Like a Pro: Finding Potential SUID/SGID Vulnerabilities on Linux & Unix Systems

Welcome back, my nascent hackers! We have spent a lot of time in previous tutorials focused on hacking the ubiquitous Windows systems, but the vast majority of "heavy iron" around the world are Linux or Unix systems. Linux and Unix dominate the world of Internet web servers with over 60% of the market. In addition, Linux and Unix servers are the operating system of choice for major international corporations (including almost all the major banks) throughout the world.

How To: Monitor System Usage Stats in Your Mac OS X Menu Bar

Like a car, your Mac needs to be monitored and cared for to keep it running as smoothly as possible. While your vehicle comes with a ton of gauges to keep track of your oil, temperature, and in some cases, even tire pressure, your Mac has no easy way to watch for low memory or high disk usage. Normally you would have to open up Activity Monitor to take a look at your usage stats, but now there is something better.

How To: Run Any Android App on Your Mac

One of the best features of Android is the fact that it's open-source, giving developers the ability to use it on pretty much any device they can think of, like on a Windows PC using Andy. That's what drove the creators behind the Android-x86 project to port over the mobile OS to any computer running an Intel processor.

How To: Crash Apps in Mountain Lion with 8 Characters (Plus Fix iMessage If Someone Pranks You with Them)

If you have a Mac running Mountain Lion, I'm sorry to tell you that all it takes to crash almost any app on it is eight little characters. This strange bug seems to only affect Mountain Lion and doesn't cause your computer any harm. Apparently, it even crashes the error reporter. On its own, the bug doesn't really pose a threat—just don't type it.

How To: Enable the Hidden Facebook Chat and Notifications Feature in Firefox 17's Toolbar

As enjoyable as Facebook can be at times, it can also be a great distraction and even better deterrent of getting work done. A quick "Oh, let me check my notifications" can turn into hours and hours of Facebooking, and before you know it, you're already on your 7th Wikipedia page, all thanks to that status your friend posted. The reason I mention this is because Firefox's new 17.0 update includes many features, but the one that's been making the rounds online is the integration of Facebook Me...

How To: Search for Photos on Your Computer by Exact Dimensions

As a technology writer, phone screenshots can pile up on your computer in no time. Testing out different apps, showing buggy software, and doing step-by-steps can lead to a plethora of mobile screenshots piling up on your computer's desktop. The problem with my screenshots is that they save as photo.png or photo.jpeg, as do many of my other photos. If I haven't finished a project or article, I tend to move them to different folders to save them for later. After a while, the screenshots begin ...

How To: Find Out Who's Trying to Unlock Your Samsung Galaxy S III with the Hidden Eye Android App

With the Samsung Galaxy S III being a hot commodity, it's no surprise that your friends might try unlocking your fancy password-protected phone. While some friends have good intentions when using your phone, there are those certain friends who get into the phone to do this... The worst scenario might be that you leave the phone around a group of friends, come back and find that all of your social media accounts have been hacked. When you yell out to your friends asking who did it, no one make...

How to Hack Like a Pro: Getting Started with Metasploit

This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing professionals. There are hundreds of tools out there, but I will focus and those that meet four key criteria:

How To: Stretch your ears by taping

In this video, we learn how to stretch your ears by taping. When you get to a certain size, taping is the only thing you can do, which is also very easy. To do this, you will need to have Teflon tape, which is a light and flimsy type of material that isn't sticky. You will need to wrap the tape around your plug until it's all the way around, not pulling it too tight so there isn't too much pressure. Do this several times, depending on how much you want to stretch it, then you will be done and...

How To: Make silly putty from scratch

In this video, we learn how to make silly putty from scratch. You will first need to take some flour and mix it with warm water in a small plastic container. After you mix this together and it turns into a putty type of shape, you will then add in some food coloring to the container as well. Add in some borax to this and continue to mix until it's completely finished mixing together. When done, you will be able to play with this and make other colors to mix together. This is a great project f...

How To: Connect to XBox Live with a modem and router

this video first shows a type of modem that can be used to connect Xbox Live along with a router. It is shown that you must already have an internet provider and router for connecting more then one device into your modem. An Xbox live account is also required to gain access to Xbox Live. A DSL cable is then connect from the Xbox into the router which is then connect to your internet providers modem. You must then select connect in the Xbox Live access menu. After the Xbox has been connected y...

How To: Play the Dead Ops Arcade game in Call of Duty: Black Ops for Xbox 360

Call of Duty: Black Ops has a great Easter egg on the main menu which allows you shoot and kill tons of Nazi zombies! And it's really easy to find. Basically, from the main menu, look down at your restraints and start tapping LT and RT to break free. This will give you the "Just Ask Me Nicely" achievement. Next, go to the computer and type in DOA, which will unlock Dead Ops Arcade. When you start playing the game, you'll earn the "Insert Coin" achievement. That's it!

How To: Understand music notation when reading sheet music

In this video, we learn how to understand music notation when reading sheet music. To help you read sheet music wherever you are, it's an easy process. You can learn how to read sheet music within just a few minutes and practice. You can be great at reading any type of sheet music so you can play with a band or just by yourself. Music notation is a big part of sheet music, so you must understand this before you can read sheet music by yourself. Once you get this, you will be able to play musi...

How To: Complement your skinny jeans outfit

In this tutorial, we learn how to complement your skinny jeans outfit. The skinny jeans are a hot look right now in fashion and in the stores. With the skinny jeans, you can wear a top that is bigger or loose on you. Since the jeans are so tight, this will transition nicely with the different looks. Get a longer top as well, that at least hits your hips. A loose fit will work with this, especially if you have a larger body type. For the shoes, you can wear a slouch boot, because this will com...

How To: Block a website without software

In this video, we learn how to block a website without software. First, open up 'my computer' and then double click on the local disk. After this, open up the 'windows' folder and then locate the 'system 32' folder, open this. Next, open the 'drivers' folder and then open the 'etc' folder. From here, double click 'host' file and then open it with a notepad. Now, after the last text type in "127.0.0.1 (website to block)". After this, save the file and then clean all the temporary internet file...

How To: Block websites on Windows Vista

In this tutorial, we learn how to block websites on Windows Vista. First, you will right click on the notepad and then run as admin. From here, you will click "file open". Then, go to the C drive and open up windows. Then, you will go to the system and find the drivers, then click on the host file. From here, go to the second local host and press enter twice. Then, type in "127.0.0.1" and press tab. Then insert all the directories that you want to block. From here, you will be finished blocki...

How To: Make court-bouillon poached prawns and king crab legs

In this video we learn how to make court-bouillon poached prawns and king crab legs. First, boil some pickling spice, wine, celery, and onions then let this simmer for an hour. After this simmers, you will grab your prawns and dump them inside of the pot. Let these boil until they have cooked, then take them out. After this, grab your crab legs and cook them with melted butter that has been seasoned with your favorite types of seasonings. Score the sides of the legs so the flavor can get thro...

How To: Negotiate a pay raise with game theory

In this video, we learn how to negotiate a pay raise with game theory. You first need to take into account how much money you are getting an hour with how much you are worth. Make a chart with your boss on there and the other player is you. You will then see if you want to play soft, medium, or hardball with them to negotiate. Think about how your boss will respond to different types of negotiations. When you are finally confident in approaching your boss, you will get respect and get the pay...