Wood Logs Search Results

How To: Use SELinux Targeted Policy to Secure Your Hosts

Hackers often rely on lazy system admins and unpatched vulnerabilities to get access to a host. Keeping intruders off of our machines requires us to update daily, only run the services we need, and read the code, among other things, but we can still make mistakes. Luckily for us, we can limit the damage caused by those mistakes by running SELinux.

Hacking Pranks: How to Flip Photos, Change Images & Inject Messages into Friends' Browsers on Your Wi-Fi Network

Networking is built largely on trust. Most devices do not verify that another device is what it identifies itself to be, so long as it functions as expected. In the case of a man-in-the-middle attack, we can abuse this trust by impersonating a wireless access point, allowing us to intercept and modify network data. This can be dangerous for private data, but also be fun for pranking your friends.

How To: Your Phone's Biggest Security Weakness Is Its Data Connection — Here's How to Lock It Down

After numerous scandals like the Equifax data breach and the 2016 US election, cybersecurity has become a significant issue for Americans. Unfortunately, anytime we use our devices, we're open to a cyber attack — especially when we browse the web. However, there are ways that we can make it harder for hackers and data miners.

How To: Use Private Encrypted Messaging Over Tor

Tor is an excellent obfuscation network for web traffic, and while instant messaging over the network is very useful, it can be relatively difficult to configure. In this guide, we'll look at two synchronous communications platforms (instant messengers) which can be routed over the Tor network, Ricochet and XMPP.

Hack Like a Pro: Snort IDS for the Aspiring Hacker, Part 3 (Sending Intrusion Alerts to MySQL)

Welcome back, my hacker novitiates! If you have been following this new Snort series, you know that Snort is the world's most widely used intrusion detection/protection system. Now a part of the world's largest network equipment company, Cisco, it is likely to be found everywhere in one form or another. This makes a compelling argument for learning how to use it, as it will likely be a necessity in any security-related position.

How To: Build a Stealth Port Scanner with Scapy and Python

As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance. The issue with port scanning is that is makes a lot of noise. Every connection to every port will be logged. This is where stealth scanning comes in. Also known as SYN or half-open scanning, stealth port scanning is a bit quieter, and is l...

How To: Linux Basics for the Aspiring Hacker: Configuring Apache

Welcome back, my hacker novitiates! In an earlier Linux Basics tutorial, I had demonstrated the basics of the Apache web server. Since Apache is the world's most widely used web server on the Internet (as of July 2015, Apache was 38%, IIS was 26%, and Nginx is 15%), the more you know about it and understand it, the more success you are likely to have hacking it.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 8 (More Windows Registry Forensics)

Welcome back, my fledgling hackers! Let's continue to expand our knowledge of digital forensics, to provide you the skills necessary to be a digital forensic analyst or investigator, as well make you a better hacker overall. In your attempts to enter a system or network undetected, it is key to understand what a skilled forensic investigator can learn about you, the alleged hacker.

Food Tool Friday: Meet the Big Green Egg—The Ultimate Cookout Machine

At first glance, the Big Green Egg looks like it was created by Dr. Seuss or some other whimsy-driven being, like Zooey Deschanel. And while this earthenware cooker may look cute, it produces serious results that can rival the best barbecue or grill. In fact, it's got quite a large cult following. Entrepreneur and former Navy serviceman Ed Fisher fell in love with the taste of food cooked in kamodos (traditional domed, covered earthenware vessels in Japan) and began to import them for sale in...

How To: Why Does a Wooden Spoon Stop Pasta from Boiling Over?

You've undoubtedly seen this trick on the internet or from your beloved Italian nonna: balance a wooden spoon across a pot of cooking pasta to prevent the water from boiling over and creating an unsightly, sticky mess all over your stovetop. It's almost magical, that's how easy it is. The most popularly held belief is that the wooden spoon prevents heat from building up too much at the center of the pot, thus preventing the liquid from boiling too high—but this is not true.

How To: Holy String Art, Batman! 6 of the Coolest Thread Art Projects Ever

You may remember string art from your elementary school days. If so, it probably makes you think of the 2D geometrical designs that took every ounce of patience you had as a kid. Or those laborious curve stitch drawings, which string art was actually birthed from. But thanks to some innovative modern artists, string art has gotten a lot more interesting. Here are some of the most creative applications so far.

How To: Choose the Right Color?

Welcome! Today I would like to share a few hints about picking the right color. So, if you do not know what color your today's outfit should be or your or which color you should choose for your room walls, please follow my suggestions.

How To: Build your own hovercraft

How a Hovercraft can be build.Brittany is demonstrating how to make a Hovercraft. Since hovercraft needs a base she is using plywood for it. She takes square plywood of 48*48 and finds out its center to cut plywood in circle. Don’t forget to wear safety goggle while cutting the plywood. Then she takes a square plastic to make it an air cushion so that the hovercraft should float. In order to secure plastic to the wood she used screws and a plastic top. Then cut the vent hole and plastic by si...

How To: Use a belt sander

In this do-it-yourself video series, learn how to use a belt sander. This power tool allows you to complete large woodworking projects in minutes instead of hours, saving you the back-breaking effort of smoothing out large areas of rough wood by hand. Our expert will give you easy-to-follow shop safety tips, as well as how to care for and maintain your sander, how to operate the trigger system, and what types of wood to use.

How To: Use a reciprocating saw

In this instructional video series, learn the proper, safe way to use a reciprocating saw. Our expert will give you tips and techniques for doing metal and wood cutting work in a variety of settings. Demonstrations include important safety guidelines for saw use, choosing the reciprocating saw blade that is right for the job, ripping, how to replace a blade, and how to cut wood and metal.

How To: Experiment with circular motion

This video shows various experiments with circular motion. In Dr. Carlson's Science theater he uses water, a lit candle, and a piece of paper to show the ways that circular motion causes gravitational pull. The water in a glass doesn't spill as it is spun around 360 degrees in a circle, even upside down. The flame on the candle was pulled toward the center when spun around. The piece of paper becomes a paper saw and was able to cut wood when spun. He not only demonstrates centrifugal force wi...

How To: Make a wooden spear from scratch

Making a wooden spear requires a between medium and small thick stick, a rectangular piece of board, a hatchet and a wood clipper. The branches off the stick is removed and thrown away. The stick is clipped at the smaller end. It is then placed on the board and the larger end is cut off with the hatchet, while the stick rotates in a circular motion on the board to remove the outer skin. Closer attention is paid the shaping and cutting of the point of that larger side to get it in formation. T...