Be Successful When P

SEToolkit : Metasploit's Best Friend

If you read my last tutorial on using SEToolkit, you probably know that SEToolkit is an effective way to make malicious actions look legitimate. But, that was only the beginning... the truth is, Metasploit and SEToolkit belong together, and help each other very well. Please d ...more

How To : Steal Form Data from Your Fake Website

Though you can use the Social Engineering Toolkit to clone websites, this way is much more customisable. For example, you could send the credentials your victim enters to a script that mails you notifying you of new data someone's just entered, or automatically store them in ...more

How To : Unlock and Root Your Google Nexus 7 Tablet

Google's Nexus 7 tablet has just been released, and for only $199, it seems like a great deal. Now, some of you are probably immediately thinking that you're going to want to root this thing as soon as possible to install all of your tweaks. Luckily, some clever hackers have a ...more

How To : Remove or reduce shadows in Adobe Photoshop

This Adobe Photoshop video tutorial teaches you how to remove or reduce shadows in Adobe Photoshop. This video is from the "Tiling Textures" course. See how to remove or reduce shadows in pictures. Sessions Online Tutorial Videos is the video channel of Sessions Online Schoo ...more

How To : Build a High Efficiency Enchanting Setup

Notes: My guides are setup like old Lego instruction booklets; picture intense/text lacking. Just remember you're building from the ground up, each step is a layer to go onto the previous layer. Any stone block can be replaced with blocks of your choice. Mycelium is used in ...more

How To : Foam a container for floral arrangements

The art of floral arrangement is a fun & valuable skill. Dana Plazyk lends useful tips and tricks on making simple flower arrangements. Making sure a container is well prepared to hold a floral is the very first important step in floral arranging. Learn how to glue floral foa ...more

How To : Why You Should Be Making Your Own Spices at Home

In my opinion, spices are the key to a successful kitchen. With a healthy array of spices and spice mixes, you have the foundation for nearly any dish that you want to make; the culinary world is your oyster. With a depleted cupboard of spices, however, nearly every recipe loo ...more

How To : Install TWRP Recovery on Your Pixel 4 or 4 XL

It took a while, but the premiere custom recovery for Android is now available for Google's Pixel 4 and Pixel 4 XL, so it's finally open season on root mods. TWRP custom recovery allows you to install Magisk and get root access in a few taps, and it can even save you from the ...more

How To : Grow Cold, Hardy Running Bamboo

Bamboo is easy to grow, but there are a few things you should know before starting. There are hundreds of species of bamboo and they can be roughly divided into either running or clumping bamboos. Almost all cold hardy bamboos are runners and almost all tropical bamboos are cl ...more

How To : Manipulate User Credentials with a CSRF Attack

Web 2.0 technology has provided a convenient way to post videos online, keep up with old friends on social media, and even bank from the comfort of your web browser. But when applications are poorly designed or incorrectly configured, certain flaws can be exploited. One such f ...more

How To : Make nitrogen dioxide in the lab

Love doing science experiments? Want to impress your friends with your science skills and look good? Then you must watch this video. This video is a tutorial witch helps you to make a very interesting experiment in your own lab. In this experiment you produce a Nitrogen Dioxi ...more

DIY Repair : How to Fix Your Broken Smartphone Like a Pro

In my days as a hardware tech, I often came across motivated do-it-yourselfers who watched a video or two on how to repair a phone and thought that they'd give it a go. More often than not, they failed miserably and damaged their phones (and wallets) even more in the process. ...more

Hack Logs and Linux Commands : What's Going On Here?

This morning, I received a message from a friend who was reading a hack log, and she had some questions about the commands used. This got me thinking, as Linux has a ton of commands and some can be archaic, yet useful. We are going to go over everything you need to know to rea ...more

How To : Tips & Tricks to Conquering Homemade Soufflés

At-home cooks tend to be scared of soufflés. Either they don't rise at all or they end up all sad and lopsided. However, when successful, the end product cannot be matched in impressing your guests. As a dinner party appetizer with a wow-factor, try a savory cheese soufflé. F ...more

How To : Do Email Spoofing Using Sharpmail.

Welcome, The Geeks!! This is my first article on email spoofing and hope everyone likes it. The article is short and easy. Social Engineering is the main key part of Hacking and everyone knows it. And one of the social engineering technique is email spoofing. So without wasti ...more

News : How Zero-Day Exploits Are Bought & Sold

Most of you already know that a zero-day exploit is an exploit that has not yet been revealed to the software vendor or the public. As a result, the vulnerability that enables the exploit hasn't been patched. This means that someone with a zero-day exploit can hack into any sy ...more

How To : Snag Prime Seats at an NBA Game

There is no fan experience in professional sports quite like watching an NBA game live. Partly, this can be attributed to the combination of fluid teamwork and jaw-dropping athleticism the players exude in the form of size, speed, jumping ability, grace, and strength. What tru ...more

How To : Make a Thanksgiving Turducken

Ah, turducken. The fondest of all portmanteau words and the tastiest of all Thanksgiving day meals. Turducken is a turkey stuffed with a duck stuffed with a chicken—three glorious poultry meats molded into one marvelous, boneless hunk of flesh that any sane carnivore wouldn't ...more

  • Hot
  • Latest