Be Successful When P

How To : Increase the Number of Push Ups You Can Do

Consistently used in many forms of physical training, the push up has been considered one of the best physical tests of muscular fitness and endurance. Namely known for its use in the military as well as other physically demanding activities such as boxing and the martial arts ...more

How To : Escape Restricted Shell Environments on Linux

The moment arrives when you finally pop a shell on the web server you've been working on, only you find yourself in a strange environment with limited functionality. Restricted shells are often used as an additional line of defense and can be frustrating for an attacker to stu ...more

How To : Unbrick Your OnePlus 6T When All Else Fails

When flashing files through TWRP, ADB, or Fastboot, there's a slight chance for things to go wrong. Whether it's user error related or something else entirely, it's always good to have a backup plan. In most cases, you'll be dealing with a semi-brick or soft-brick, which can u ...more

Cydia 101 : How to Re-Enable a Semi-Tethered Jailbreak

Unlike fully untethered jailbreaks such as Yalu's iOS 10.2 method, semi-tethered jailbreaks require users to re-enable the mod each time their device is turned off. Fortunately, the process of kickstarting a jailbreak is easy to do, since it's already embedded in your iPhone's ...more

How To : Construct a metal shader in Maya 7

This Maya 7 video tutorial teaches you how to construct a metal shader in Maya 7 from Autodesk. This video is from the "Game Lighting and Color" course. Shaders alone do a lot to give a realistic feel to various materials, and adding textures to the mix gives them even more ...more

How To : Fix or Retrieve Data From A Bad Hard Drive

This is an intermediate guide on how to easily fix or retrieve data from a bad hard drive. What we're trying to do: 1. Fix a hard drive with a corruption problem (i.e., blue screen) or that is full of viruses to the point of being inoperable. 2. Retrieve data from a hard dr ...more

Android Basics : How to Connect to a Bluetooth Device

One of the coolest features in modern smartphones is their Bluetooth connectivity. This is how two digital devices can communicate with one another—sending data like your phone call audio or your favorite song—all while using up minimal battery life. Don't Miss: Android Basic ...more

How To : Dump a MacOS User's Chrome Passwords with EvilOSX

Barrow's article on Pupy made me wish for a RAT that could target an OS frequently used by gatekeepers at startups, tech companies, and creative firms: macOS. Once run, a RAT can do severe damage by dumping a user's stored credentials for many accounts. The best loot lives in ...more

How To : Build a Stealth Port Scanner with Scapy and Python

As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance. The issue with port ...more

Vidify : The Best Automatic Video Editor App for the iPhone

There’s a race on to see who'll be the Instagram of moving pictures. This makes sense, since many of our phones are clogged with video that, so far, no one is going to see. Wouldn’t it be great if there were a simple app that could take our video content, edit it for us, and t ...more

How To : Change the spark plugs on a 4.7L V8 Jeep engine

A spark plug is a device that fits into the cylinder head of an engine and ignites compressed fuel with an electrical spark. This video tutorial demonstrates how to change the spark plugs on a 4.7L V8 Jeep engine. When changing spark plugs, wait until the engine has cooled dow ...more

How To : Clone Taco Bell's Doritos Locos Tacos at Home

Doritos Locos Tacos were the brilliant concoction of a man named Todd Mills who never worked for Taco Bell, and never made any money from his creation. He originally pitched the idea to Frito-Lay, and when they said no, he took matters into his own hands by creating a Facebook ...more

How To : Pronounce the English word "entrepreneur"

Today's word is "entrepreneur". This is a noun which means someone who owns and manages a business, taking on financial risks to do so. For example, you can say, "There are hundreds of successful technology entrepreneurs in the Silicon Valley."

How To : Enumerate MySQL Databases with Metasploit

It's been said time and time again: reconnaissance is perhaps the most critical phase of an attack. It's especially important when preparing an attack against a database since one wrong move can destroy every last bit of data, which usually isn't the desired outcome. Metasploi ...more

How To : Increase World of Warcraft's (WoW) graphics

No one can deny that World of Warcraft is the biggest, most popular game to come out since, well, ever. Boasting 12 million players and still going strong since its premiere in 2004, a combination of incredible, intense gameplay, comraderie building with guilds, and awesome-lo ...more

How To : Find & Exploit SUID Binaries with SUID3NUM

File permissions can get tricky on Linux and can be a valuable avenue of attack during privilege escalation if things aren't configured correctly. SUID binaries can often be an easy path to root, but sifting through all of the defaults can be a massive waste of time. Luckily, ...more

How To : Things to Do on WonderHowTo (04/04 - 04/10)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more

How To : Get Android's Smart Lock Feature on Your iPhone

As great as passcode and biometric security features like Face ID are for preventing unwanted access, they aren't needed 100% of the time. When you're at home with a locked door between you and anyone you wouldn't trust with your phone, they really only serve to slow you down. ...more

How To : Set up a wireless microphone for sound recording

Check out this film and theater video tutorial on how to set up a wireless microphone for sound recording. Confused about wireless and what's involved? Learn the proper set-up of a wireless microphone. Knowing these few tips will provide successful results and great audio rec ...more

How To : Cheat on the Minesweeper game

The most successful video game packaged with almost all Windows PC's is probably Minesweeper, so it was just a matter of time before someone figured out how to beat the system and detect all of those mines without getting blown to smithereens. This video shows you the trick to ...more

Raspberry Pi : Physical Backdoor Part 1

This tutorial is one technique to use the full functionality of your Pi. The small size makes it ideal for inside hacks, but still has the capabilities of a average desktop or computer. I should mention that a tutorial that OTW has done, but I'm gonna take it a step further. O ...more

How To : Build a storage box for your deck

Building a storage box for your deck is a smart way to add extra storage to an area usually not known for having storage. The great thing about using wood than plastic, is that is adds to the feeling of being outside and can be stained to match the look of your deck. This thre ...more

How To : Understand & Use IPv4 to Navigate a Network

You may not know it, but the IPv4 address of your computer contains tons of useful information about whatever Wi-Fi network you're on. By knowing what your IPv4 address and subnet mask are telling you, you can easily scan the whole network range, locate the router, and discove ...more

How To : Conduct a Pentest Like a Pro in 6 Phases

Penetration testing, or pentesting, is the process of probing a network or system by simulating an attack, which is used to find vulnerabilities that could be exploited by a malicious actor. The main goal of a pentest is to identify security holes and weaknesses so that the or ...more

How To : Hide Your IP Address with a Proxy Server

Proxies can be quicker to use than a VPN for specific applications, like web browsers or torrent clients. Both services will hide your true IP address, but a VPN is slowed down because it encrypts all data through a VPN network, while a proxy just acts as a middleman for fetch ...more

  • Hot
  • Latest