How to Say Hello in Cherokee

Tor vs. I2P : The Great Onion Debate

In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and m ...more

News : Hacking MAC OS X

Warnings i cant be held responsible for any illegal act done by anyone but myself and there are copyrights so notise that taken the trademarks or copyrights are strigtly prohibeted by law and will be punshied by law and i or my partners cant be held responsible for sudo camma ...more

How To : Write and pronounce the Korean word for "Hello"

In this free video language lesson from Sunny Park of Mahalo, we learn how to say, pronounce and write the Korean word for "hello." For details, and to get started using this handy Korean phrase yourself, watch this guide for Korean language learners.

How To : Sing the "Happy Birthday" song in Cherokee

Check out this instructional language video to learn how to speak Cherokee! In this lesson, learn how to say Happy Birthday, and how to sing the Happy Birthday song in Cherokee! This video is spoken in the Eastern (Giduwa) dialect. This video is great for beginners who want to ...more

How To : Learn basic greetings and salutations in Arabic

This video Arabic lesson goes through a few basics of the Arabic languages. Kids will especially appreciate learning from an instructor their own language. Follow along with the instructor and learn how to say some of the essentials of Arabic, like "hello," "good bye," "thank ...more

How To : Bash (Shell) Scripting for Beginners

Bash (Shell) Scripting for Beginners Intro I am an occasional Linux user currently playing around in CrunchBang and loving it. Prior to this, I used to dual-boot Windows and xfce-buntu (or xubuntu) at work, and due to some unforeseen circumstances, my screen always went fuzz ...more

How To : Play "Learning To Breath" by Switchfoot on guitar

Learn how to play "Learning To Breath" by Switchfoot, an acoustic guitar tutorial. Follow along with this demonstration, lyrics here: Learning To Breath A Walk To Remember (A Walk To Remember) Hello, good morning, how you do? What makes your rising sun so new? I could use a ...more

News : Learn Tagalog Today Episode 1,Greetings!!

Learn Tagalog Today Episode 1 Greetings!! In this,the First of our lesson series,we will learn useful words and phrases for Greeting others in Tagalog. We'll learn words such as hello or good morning,good afternoon,good night,how are you and many others. We will also learn t ...more

News : Splish Splash, My Computer's Taking a Bath

Goodbye, point-and-click; hello, point-and-splash! This water-based touch screen by Japanese designer Taichi Inoue is more than just clever and ergonomic, it's downright summery. In his artist statement, Inoue writes, "It is difficult to say that the interface of mechanical m ...more

How To : Learn to speak Jamaican

UUNICEF Youth Adviser Joel takes lessons in Patois (the Jamaican language) from a young man. The language lesson includes how to say "hello, how are you?" "that girl is good-looking" and "see you later". For more information about UNICEF Youth Voice, visit our website: www.u ...more

How To : Use Very Basic AppleScript to Create a Fake Virus

AppleScript is quite an easy scripting language to use. In this guide, I will be showing you several commands. Near the end, I will show how these can be used to create a fake virus that actually does no harm. Of course, this is only one way to use these commands—use your ima ...more

News : Greetings and welcome

WonderDudes Mike and Ford say hello in this first of many Wonder Weekly video blogs. Each week we'll profile our most active members. We will go behind the scenes on people making amazing how-to videos. We will be exposing faux-to videos and hopefully spreading love and wonder ...more

How To : Hide Folder Names on Your iPhone for Good

I hate folder names, especially the one Apple shoves down our digital throats. On a computer, they make total sense, but on my iPhone, it's just more clutter on the home screen. You can tell what folder is what just by looking at the app icons within it, so why are we forced t ...more

How To : Execute Remote Commands on a Disconnected Victim

Do you ever thought that you can't control an Internet disconnected system? I saw a funny video in Chema Alonso's youtube channel (A well-known hacker of my country and creator of Fingerprinting Organizations with Collected Archives among other security tools), and decided to ...more

How To : Make Your PC Welcomes You

By using this trick, you can make your computer to welcomes you in computerized voice.You can make your computer to say: Welcome Username, Hello Dear, etc Make Windows Greet you with a Custom Voice Message at Startup To use this trick, follow the instructions given below:- S ...more

How To : Security-Oriented C Tutorial 0x01 - Hello, World!

Welcome back, reader! In this tutorial, we will be covering our first program! So let's get to it. We all know the unspoken tradition of the first program when learning a language and of course, here we will respect and complete it. Fire up your favorite text editor (be it vi ...more

How To : Set Up the Meta 2 Head-Mounted Display

So after being teased last Christmas with an email promising that the Meta 2 was shipping, nearly a year later, we finally have one of the units that we ordered. Without a moment's hesitation, I tore the package open, set the device up, and started working with it. To me, the ...more

How To : Social Engineering - Total Guide

Good day to everyone, today I will present some basic and advanced concepts that targets sophisticated attacks on the social basis, also I will write about some steps that can prevent this attacks from occuring, basically we will examine Social Engineering from the angle of at ...more

IRC Guide : Universal NickName

Hello fellow Nullbytiens, today we will be talking about IRC again (if you haven't read OTW's post about head over there now)and more specifically about using 1 nickname with multiple devices or IRC clients. IRC was a protocol that was developed in 1988 and doesn't support us ...more

How To : Make Your iPhone Tell You When It's Done Charging

Battery management is a never-ending struggle. To be on the safe side, you likely won't want to leave your home with less than 100% battery, but continually checking your charging iPhone is a hassle. Instead of continuously monitoring your battery's power level, have your iPho ...more

How to Java : E4 (Methods)

Welcome back to another episode of Java Tutorials, In today's tutorial, we'll be learning about what methods are, proper syntax when writing Methods, and why they are beneficial in a program's code. Lets dive in. -------------------------- What Is A Method A method is ess ...more

News : My Review on Kali 2.0

Hello guys, its been quite a while since my last post. (sorry for the lack of images) Well I guess I'm first up on the review board :P. So first thing to say: I ran USB persistence on Kali 1.10 by creating a persistence partition on my 16 GB drive. As for me, I had to delet ...more

How To : Create Backdoor on OSX

Hello, ladies and gents! Today I will be discussing the fun and excitement of backdoor on an OSX system. Note: A lot of what I am going to say is directly based off of this article by Patrick Mosca. Please give him your gratitude and leave mine at the door! Step 1: Reverse S ...more

How To : Create a MySQL Server BruteForce Tool with Python

Hello aspiring hackers, It's been a while since I wrote a tutorial, so I figured I might just share one of the tools that I have created to help the community grow. Scenario Let's say, that we have done all the recon(both passive and active) and we have scanned the web serve ...more

How To : Phreak (Basics)

Get some tinfoil hats and make a time machine because we are about to go back to the 90s and learn about some phreaking. Step 1: What Is Phreaking? Phreaking is the action of hacking into telecommunications systems, especially to obtain free calls. Phreaking was big in the 9 ...more

How To : Successfully Hack a Website in 2016!

Hello partners, first of all I would like to thank all those who have sent me positive feedback about my posts, to say that I'm always willing to learn and teach. I'm also open to answer the appropriate questions. Second i want to say sorry for the series i left in stand by m ...more

  • Hot
  • Latest