"my Brute"

News : The Hacking of Blackhat, the Movie

A while back, I wrote review of my favorite hacking movies of all time. Two of my key criteria were; (1) how realistic was the hacking, and (2) are the hackers portrayed as the "good guys." This past winter, a new hacker movie was released, appropriately named Blackhat starrin ...more

My OS : Bugtraq II Black Widow

Welcome back my precious hackerians. Today i would like to promote an OS which i have been using for the past couple months. I'm not talking about Backtrack 5 or Kali Linux. Something even more promising: Bugtraq 2 Black Widow I'm not going to show you how to install it beca ...more

Introduction to Cryptography : Archaic Beginnings

Cryptography is a quintessential part of computer security in the modern world. Whenever you buy something on eBay or log into Facebook, that data is encrypted before it's sent to the server in order to prevent third parties from eavesdropping and stealing your sensitive infor ...more

How To : Perform Network-Based Attacks with an SBC Implant

With a tiny computer, hackers can see every website you visit, exploit services on the network, and break into your Wi-Fi router's gateway to manipulate sensitive settings. These attacks can be performed from anywhere once the attacker's computer has been connected to the rout ...more

How to Play Dead Space 2 : Achievement & Trophy Guide

It's currently 2011, but when you fire up your game console, put your hands on the controller and play the new Dead Space 2 video game, you're warped into the future— into the year 2511— just 3 years after the events that took place in the first Dead Space. And it's sure to be ...more

TypoGuy Explaining Anonymity : A Hackers Mindset

CEO's of IT companies doesn't know this because they are not a hacker. Only a true hacker can become a successful Security head officer. Head of Security: Well let me tell you something my good friend. Many companies we have today they are still getting attacked from hackers ...more

How To : Factor quadratic expressions using trial and error

Sometimes there's no better way to factor a quadratic equation than by simple brute-force trial and error. Watch this free video algebra lesson to see how it's done. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical mi ...more

How To : Make an origami sumo wrestling game for beginners

They say that it's the inside that counts, not the outside. But not when you're a sumo wrestler. In fact, when you live and die by how much belly fat you can throw onto your opponent's face to make him see stars like the foolish coyote chasing the rabbit in classic cartoons, y ...more

How To : OpenSSL Unique Encryption/Decryption Scripts

In this tutorial I will be explaining the purpose of unique encryption/decryption scripts ( I will be referring to these at "UEDS" for this tutorial). Then, I will show you how to make one. Finally I will talk about the downsides to the method I use. I will also provide links ...more

How To : Open a Beer Bottle with a Chainsaw

Watch as this guy uses his chainsaw to open a beer bottle. This is a classic bartender's trick on how to crack open a beer with a heavy duty power tool- the chain saw! Get the crowd going with the brute force of a chainsaw bottle opener! Video: .

How To : Fix a flat bike tire without tools

Simple instructions for doing a simple bike repair when you are on the road and don't have your tools. This vide shows how to take the tire off your bike rim without using tire levers. Our host demonstrates on a completely flat tire, and shows us how to leverage off the beads ...more

How To : Introduction to Modern Cryptography

Cryptography is the science of keeping secrets, or more specifically, the science of disguising them. As a point of fact, cryptography has progressed quite a bit farther and now encompasses file and message integrity, sender authentication, and pseudo-random number generators. ...more

Decrypting [Part 1] : How to Decrypt Caeser Encrypted Texts

In this Tutorial I will show you how you can use the frequency of letters to decrypt the famous Caesar cipher. I hope it is easy to understand and helpful for getting in touch with basic cryptanalysis. If you find any mistakes or have questions feel free to ask me. Finally I a ...more

How To : Factor trinomials by trial and error in algebra

Looking for a guide on how to factor trinomials the brute force way? See how it's done with this free video algebra lesson. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, tha ...more

News : 9 Ways iOS 12 Makes the iPhone X Even Better

While there is a lot to be excited about when it comes to iOS 12 in general, iPhone X users will not just get the same new features and tweaks that all other iPhones will get — they'll get a few unique ones that will make the device even more desirable to those who don't have ...more

How To : Lose the last few pounds with carb cycling

If you've got 20 pounds or more to lose, then this is not the video for you. But if you're on the cusp of reaching your goal weight (so think 2-5 pounds off) but you've hit a plateau and the fat won't slide off no matter what you do, then this video will teach you how to get t ...more

How To : Configure BIG-IP ASM L7 for DoS protection

See how to enable Layer 7 DoS and brute-force protection within DoS within BIG-IP ASM. Whether you're new to F5 Networks' popular network appliance or are a seasoned network administrator just looking to better acquaint yourself with BIG-IP, you're sure to benefit from this fr ...more

How To : Secure remote desktop

Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to secure re ...more

How To : Recognize Crowd Control - Part 2

In the first part we differentiated the two types of control, mental and physical. In part 2 we will dig deeper into Physical crowd control and analyze examples that are present today. Physical Crowd Control This is the easy one. Wikipedia says: Crowd control is the controll ...more

How To : Get a trauma look with makeup on a budget

Looking to get bloody on a budget? This makeup by Koren of EnKoreMakeup, shows how to create a look of trauma, great for next year's Halloween costume, on a budget! Materials used to get this look include Duo Lash Glue, Elmers Glue Stick, Fantabulous Gouache, Shaze Craze Gouac ...more

How To : Record a screencast in Linux

From brute force hardware-based solutions like pointing a camcorder at your monitor to more elegant, software-based solutions like (the free and open source) Xvidcap, there are no shortage of ways to create a screencast while running Linux. In this how-to from Linux Journal On ...more

  • Hot
  • Latest