Before you can start making awesome 3D games on your Linux computer using C++, then you're going to need to download and install these developer programs. This video lesson will show you how to download and set up OpenGL and GLUT for C++ on a computer running a Linux operating ...more
More password cracking action from Null Byte! Today we aren't going to be cracking passwords per se, rather, we are going to learn the basics of generating rainbow tables and how to use them. First, let's go over how passwords are stored and recovered. Passwords are normally ...more
This is the first of a multi-part series on steganography techniques. Steganography, the art of hiding things in plain sight, has existed for a long time, and in many forms. When you manipulate the alphabet to have your own cipher and decipher, this is considered steganography ...more
This video tutorial from iTouchMaster2 shows how to SSH to iPod or iPod Touch using FileZilla application. FileZilla is a freeware application working on Windows, Linux and Mac OS X. To start, download and install FileZilla from this web site: filezilla-project.org. Note, y ...more
If you like the way Compiz works, then you'll love this browser-based compositing windows manager for Firefox. It's an add-on you can install in any Firefox web browser, whether on Windows, Mac or Linux computers. If you are into eye-candy and are always looking for ways to i ...more
Python can be used for games, websites and operating system GUIs; and you can work with it on PCs, Macs or Linux machines. This tutorial shows you how to install the compiler and get started teaching yourself how to program in Python.
A multiboot cd created from SARDU which can be used to boot linux. It can even be used to install Windows. Force your old pc to boot on a usb using PLOP or clone a hd. Plus a lot more!
Zombies are coming and they're going to take over everything- including Minecraft 1.5_01 Beta. Watch this video to learn how to install Zombiecraft on your Mac. You'll need to download this first. Watch this video and you'll be in Zombie Minecraft heaven in no time.
It's so convenient to take a screengrab of one of your most favorite moments from your favorite movie or show, but sometimes you just can't. But you can actually take a snapshot of it. Check out this video tutorial on how to create screenshots from videos on Ubuntu Linux. Vid ...more
Want to access your Linux partition on your hard drive using Windows 7? With a little program called Vmware Player. So, check out this video tutorial to see how to see all of your Linux files on Windows 7 from your hard drive. Step 1: Install Ubuntu on a Vmware Player Step 2 ...more
SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, w ...more
This video tutorial from Michael Espinosa shows how to install and use File Zilla Ftp client on Windows XP operating system. To start, open internet browser. Use search engine and type file zilla. Click on FileZilla search result. On the main page click Download FileZilla cl ...more
I have had a lot of people ask me, "How does my neighbor keep getting into my wireless?!". Chances are, these people are all using WEP, a deprecated wireless encryption protocol. Either that, or you are using one weak WPA passphrase. If someone can access your wireless networ ...more
Many windows users, if not all, run into a virus infection once in a while. This is unavoidable when using Microsoft's operating system. Without digressing too much, the fact that Windows is such a popular OS with no controlled software sources makes it easy for viruses and ma ...more
DD-WRT is a Linux firmware available for many Linksys, NetGear, Belkin, D-Link, Fon, Dell, Asus and other vendor's wireless routers. DD-WRT is far more feature rich than the stock firmware that comes with most routers. This video covers the basics of installing and configuring ...more
Permanently deleting files is something that a lot of people aren't aware of. Actually, most people think that once a file is deleted, it is gone forever. This is not the case. Hard drives write to the disk via magnetic charges, positive and negative correlate to 1s and 0s for ...more
Many users of the virtualization software VirtualBox may have noticed that the USB system has been pretty buggy for quite a long time. I've had my USB randomly duck out on me way too many times to count. This can really be difficult to deal with when you require access to the ...more
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to update Nokia firmware via VirtualBox on Ubuntu Linux. 1. Install the Nokia PCSuite and Nokia Update Software on Windows ...more
Downgrade Firefox 5 to Firefox 4 or any earlier versions:[Windows users] 1. Visit Link 2. Select the version you want to Downgrade to and Download the version of the firefox. 3. Uninstall the current version of the Firefox 4. Install the downloaded firefox file Downgrade ...more
In this tutorial, we learn how to use Linux: Commandline Dependencies with gdebi. First, download a Deb file then use dpackage to install the package on the command line. If this fails, you will be able to use gdebi to install all the dependencies in command mode. This will sa ...more
Sharing a laptop's wireless Internet connection with other computers connected to its Ethernet port is a great skill to know. It can be good for a number of reasons; Your computer may not have proper hardware to have a standard setup, or you may have an awkward network topolog ...more
Sometimes mining and crafting gets boring. The thrill of hunting mobs, exploring strongholds, or the Nether is often much more satisfying and appeals to the RPG nerd in all of us. Well, Mojang took the hint and as part of the 1.9 release, there will be potions, more mobs, othe ...more
I spent hours writing a guide on how to record a screencast, or record what is on the desktop, and convert it. I then found out that this is much simpler & faster and doesn't even involve opening the commandline. In order to do this you need VLC and gtk-recordmydesktop. They ...more
Things You'll Need A fully working operating system that supports VirtualBox (Windows, OS X, Linux or Solaris) VirtualBox 4.0+ Tips VirtualBox for Windows / OS X / Solaris can be downloaded here. All Linux users hold your breath. There is a better way to install VirtualBox ...more
File Transfer Protocol, or FTP, is a network protocol made for transferring files in a client and host fashion over a Transmission Control Protocol (TCP) network, such as the internet. FTP is integrated into most browsers, and you have probably used it before. It is a common w ...more
Backing up your files is a requirement in today's world of tech. In an instant, your storage device can fail. This is an unacceptable situation that should never happen to anyone. Storage is cheap, and backups are easier than ever to perform. Most of the time, this can be comp ...more
Gamers who have their Xbox 360's firmware flashed may have recently noticed an inability to play backups, or even make backups of newer games that have come out, such as Gears of War 3 and Dead Island, to name a few. This is because Microsoft has come out with a new disc form ...more
Pygame! And what you can accomplish with it. Another python article... (Blame Alex for getting me hooked on yet another coding language...) This little article will cover "Pygame", the set of modules that were designed with game developers in mind. Specifically ones who code ...more
Want to know how to play MKV files with subtitles in Windows 7? You just need to download a few codecs to enable DVXA H.264 decoding for MKV files and subtitles working in Windows Media Player. Watch this video to see how. Step 1: Install K-lite Mega Codec Pack Step 2: Insta ...more
A minimap is a small inset box on your game screen that can show you the immediate area for your Minecraft island. This is a mod for your game, and the video shows you where to get it and how to install it.
Technically, INVedit is a program used to edit your inventory when playing MineCraft, and it only works on Windows machines. However, this tutorial shows you a good workaround for you to be able to install and run INVedit on your Mac.
Back in 1982, the Commodore 64 home computer was released by Commodore International for $595 (which would now be close to $1,300). It featured an 8-bit microprocessor, 16-color video microchip, awesome sound chip, parallel and serial capabilities, and a whopping 64 kilobytes ...more
When your computer first connects to a nework, it sends out a request on the network to lease an IP from the router. The router then leases your computer an unused IP address, which is used as a unique routing address for sending traffic that is meant for you, to you. As every ...more
Archiving and compression is a great way to store and prepare files for sending. You can reduce the size of a file, turn a group of files into a single file, and even encrypt and password the contents! Just take a look at this image to see how much it compressed a 28GB text fi ...more
You may have asked yourself, "How do hackers take my password, if the website owner can't?" The answer is simple. When a website stores your login password for the site, it is run through a cryptographic hash function before it enters the database (if the website isn't Sony). ...more
Minecraft has been out nearly two years now. Hard to believe, isn't it? Fans of the game have been spoiled with a lot of new content over that span from its creator Notch, as well as its modders. A couple months ago, Notch tortured the Minecraft community by tweeting some scre ...more
Your IP (Internet Protocol) address is your unique ID on the internet. It's synonymous with your home address. Anyone in the world can contact your computer through its IP address, and send a retrieve information with it. I'm sure at one time or another you've heard that hack ...more
Introduction PostgreSQL is a very popular Open-Source database management system. It competes heavily with many proprietary and commercial database management systems. More information on what it is and it's history can be found here and here. This article is intended to get ...more
A proxy is a server that lets a client to connect to it and forward its traffic. This enables a certain "layer" of protection by masking your IP. An IP address can be used to learn your location and track you on the Internet, thus eliminating any form of anonymity that you may ...more
Creating any object you want is as simple as point and click if you have a 3D printer at home. If you don't have one handy, there are a few companies that offer printing services online. But to help services realize your design in extruded plastic, you have to make a 3D comput ...more
When it comes to webcams these days, most people are using their laptops over desktops. The cameras are centered, integrated, and require no configuring. They're a cinch and usually have great resolution. So, then what do we do with all of those old wired desktop webcams that ...more
This article describes the very basics of compiling a program on Linux. It is targeted at the absolute beginner. Sometimes beginners search for programs on the web for their Linux systems, and is faced with the reality that they have to compile the program themselves, either b ...more
In this four-part video tutorial series, you'll learn how to compile a Linux kernel on a Debian-based system (e.g., Ubuntu). You'll learn two separate methods for kernel compilation, both (1) how to make the kernel into a Debian package, which can be handy if you're using a pa ...more
This video demonstrates how to install Webmin via SSH. Once you've downloaded the Webmin interface package, you'll want to install it onto your serve. In order to do that, you'll need to depackage it. If you're new to Linux or otherwise unclear about how to proceed, then watch ...more
This video shows how to encrypt files with OpenSSL in Debian Linux. First we check if open SSL is installed on the system. If not, install it using packet manager. Next create the file going to be encrypted. Now encrypt the file. In this case AES algorithm in ypher block chain ...more
Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm ...more
Software expert David Steinlage guides the viewer through the step-by-step process of installing VMware and Windows XP on a computer driven by Ubuntu Linux. The first step is to get a serial number, which can be obtained free by visiting the site www.vmware.com and filling out ...more
If you have Ubuntu Linux, if you don't already know, there's something called Advanced Desktop Effects, and once enabled, gives you multiple desktop effects for your Ubuntu system. This video show you how to install Advanced Desktop Effects and shows you all the goodies, and d ...more
Have you ever forgotten your password and didn't know how to get back on your computer? Or ever had an annoying roommate you wanted to play a trick on to teach them a lesson? Or perhaps overly religious parents who think the internet is of the devil and won't let you read onli ...more
In this how to video, you will learn how get VMWare Fusion on your Mac. This will allow you to install Windows and run them on the same computer. First, go to the mediafire page and download the files. Next, download and install Unarchiver to join the files together and extrac ...more
VNC stands for Virtual Network Computing. It is remote control software which allows you to view and fully interact with one computer desktop (the "VNC server") using a simple program (the "VNC viewer") on another computer desktop anywhere on the Internet. The two computers do ...more
Leaving your wireless router at its default settings is a bad idea. The sad thing is, most people still do it. Once they've penetrated your network, hackers will change your router settings so they'll have an easy way back in. This allows them to change your network into a she ...more
The internet is a scary place, and if you're like me, you don't want anyone tracking you or learning your search habits. It's a blatant invasion of privacy for companies to do this, but at least we have methods of fighting back—one of which is Tor. Tor stands for The Onion Ro ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! The server activity has actually been kinda slow while we wait to install the new 1.2.3 update, but that didn't stop any build progress! Everyone on the ser ...more
Wouldn't it be nice to just sit at your buddy's house, plug into his network, and see exactly what he's doing? What if it was as easy as that? What makes packet sniffers like Wireshark such potent tools is that a majority of local area networks (LANs) are based on the shared E ...more
The Ubuntu CD does not contain much in terms of software applications. So how can we incorporate other programs that would be made available after booting from a live CD? There is a program called Remastersys. This program creates an .ISO image of the Linux system installed ...more
There are several virtual machine managers present in the market. However, the main functionality of all VMs are the same. Most people like to get free VM managers, so that they can install as many operating systems as they like over the host operating systems. One of these fr ...more
Ok, now lets introduce myself i am also a newbie but conducted many pentests.This is the tutorial for customizing kali linux 1.Change desktop background by (Right click change desktop background) 2.change sources.lst file by running in terminal - "apt-get clean" "apt-get upd ...more
Kali Linux, by default, probably doesn't have everything you need to get you through day-to-day penetration testing with ease. With a few tips, tricks, and applications, we can quickly get started using Kali like a professional white hat. Most Linux distributions are highly c ...more
Welcome back, my hacker wannabees! Since nearly all hacker tools and platforms are developed in the Linux/Unix operating systems, this series of tutorials are for those of you who want to be hackers, but are unfamiliar with Linux. We've looked at numerous basic commands in th ...more