Install Window Tints

How To : Secure your home from the inside

Do you live in a dangerous neighborhood? Even if your area isn't known to be dangerous, it could still be a target of home burglaries. Don't let the thieves have the upper hand. Make sure the only thing they're stealing is grass. To properly secure your home from external thre ...more

How To : Install vertical blinds

First measure the window to decide if you would like the blinds inside the frame or outside on the casing. In most cases inside looks the best plus it gives you the added feature of adding curtains. In the package you will find a set of clips, screws and the pieces to hold th ...more

How To : Mount an ISO image file with Daemon Tools

First of all, download and install Daemon Tools Lite. After the install, open Daemon Tools and a red icon will appear on your taskbar; right-click on it and go to Virtual Drive and search for an option that changes the number of drives to 1. This will make Daemon Tools create ...more

How To : Block ads on Firefox

This video demonstrates how to surf the web without ads. The first step is to download Mozilla Firefox. Go to Get Firefox and click on 'free Mozilla download'. Do not select on e-bay or campus edition. Download the file and install the program successfully. Go to Get Firefox o ...more

How To : Bypass Megavideo & Veoh's viewing time limits

In order to bypass Megavideo and Veoh's viewing time limits you will first need Mozilla Firefox. To download Mozilla Firefox then go to Firefox and download the Mozilla Firefox browser. After downloading the browser you will need to install the add-ons. Go to the website Illum ...more

How To : Get the Galaxy S5's Toolbox Feature on Any Android

Granting seamless access to your favorite or most utilized apps with just a tap, the Galaxy S5's "Toolbox" feature is one that plenty of other Android users wish they had. Instead of holding your breath for your manufacturer to implement something similar, or hoping that Samsu ...more

How To : Take Control of Sonos IoT Devices with Python

Many popular IoT devices have terrible security. For instance, a hacker who's on the same Wi-Fi network as a Sonos speaker can assume direct control over the device's behavior. If an IoT device doesn't secure the messages used to control it over a network, it's easy for somebo ...more

How To : Take Control of the Mouse & Keyboard in Python

While hackers adore the command line, working with the GUI (graphical user interface) of an operating system has some advantages. This is especially true when it comes to post-exploitation. When we can control the mouse and keyboard of a remote computer, we can truly say we ha ...more

How To : Map Wardriving Data with Jupyter Notebook

With the Wigle WiFi app running on an Android phone, a hacker can discover and map any nearby network, including those created by printers and other insecure devices. The default tools to analyze the resulting data can fall short of what a hacker needs, but by importing wardri ...more

How To : Mine Twitter for Targeted Information with Twint

Open-source intelligence researchers and hackers alike love social media for reconnaissance. Websites like Twitter offer vast, searchable databases updated in real time by millions of users, but it can be incredibly time-consuming to sift through manually. Thankfully, tools li ...more

How To : Phish Social Media Sites with SocialFish

Phishing is the easiest way to get your password stolen, as it only takes one mistake to log in to the wrong website. A convincing phishing site is key to a successful attempt, and tools to create them have become intuitive and more sophisticated. SocialFish allows a hacker to ...more

How To : Use Photon Scanner to Scrape Web OSINT Data

Gathering information on an online target can be a time-consuming activity, especially if you only need specific pieces of information about a target with a lot of subdomains. We can use a web crawler designed for OSINT called Photon to do the heavy lifting, sifting through UR ...more

How To : Set Up the Meta 2 Head-Mounted Display

So after being teased last Christmas with an email promising that the Meta 2 was shipping, nearly a year later, we finally have one of the units that we ordered. Without a moment's hesitation, I tore the package open, set the device up, and started working with it. To me, the ...more

How To : Root the Nexus Player

UPDATE NOVEMBER 2015: The root process has changed for the Nexus Player now that the device is running Android 6.0 Marhsmallow. I've updated this article with detailed instructions on the new root process, but the video below still depicts the old process for Android Lollipop ...more

How To : Crack WPA & WPA2 Wi-Fi Passwords with Pyrit

Pyrit is one of the most powerful WPA/WPA2 cracking tools in a hacker's arsenal, with the ability to benchmark a computer's CPU speeds, analyze capture files for crackable handshakes, and even tap into GPU password-cracking power. To demonstrate how quickly it can hack a WPA/W ...more

How To : Conduct Recon on a Web Target with Python Tools

Reconnaissance is one of the most important and often the most time consuming, part of planning an attack against a target. Thanks to a pair of recon tools coded in Python, it takes just seconds to research how a website or server might be vulnerable. No matter what platform ...more

  • Hot
  • Latest