Using Hydra, Ncrack, and other brute-forcing tools to crack passwords for the first time can be frustrating and confusing. To ease into the process, let's discuss automating and optimizing brute-force attacks for potentially vulnerable services such as SMTP, SSH, IMAP, and FTP ...more
A Ford Puma is used to instruct some cool moves. Learn the handbrake turn, 90 degree turn, reverse flip, Scandinavian flick with liftoff oversteer (similar to power slides). It's like drifting.
The Windows 10 desktop and microphone can be livestreamed without using Remote Desktop Protocol (RDP) software and without opening any ports on the target computer. A hacker with low user privileges can monitor and exfiltrate a target's every move and private conversation in r ...more
If you are going to a toga party or just want to be prepared in case you need to improvise some clothing you will want to know how to tie a toga around yourself. This video will instruct on two ways you can tie a toga for men or for women. Step1 First, you will want to go to ...more
Many windows users, if not all, run into a virus infection once in a while. This is unavoidable when using Microsoft's operating system. Without digressing too much, the fact that Windows is such a popular OS with no controlled software sources makes it easy for viruses and ma ...more
Nmap is more powerful than you know. With a few scripts, we can extend its functionality beyond a simple port scanner and start to identify details about target servers sysadmins don't want us to know. Possibly the most popular and well-known reconnaissance tool currently ava ...more
It's possible to stream a MacBook's entire computer screen without using Apple's Screen Sharing application and without opening any ports on the target device. A hacker with low user privileges on the backdoored Mac may be able to view a victim's every move in real time no mat ...more
Here are the13 best articles on How to Build a Potato Gun. http://www.scribd.com/doc/15796837/To-Make-A-Spudgun-An-instructionally-informative-document-by-Enoctis Here was my process: I chose among combustion based guns. No pneumatics. As a curator of the video site, Won ...more
A convincing domain name is critical to the success of any phishing attack. With a single Python script, it's possible to find hundreds of available phishing domains and even identify phishing websites deployed by other hackers for purposes such as stealing user credentials. ...more
It's a common misconception that iPhones are impervious to cyberattacks and "more secure" than Android. And when an iPhone does get hacked, it's nearly impossible to tell that it happened. Vulnerabilities in iOS are common, and Apple tries to tackle them with each security up ...more
If you'd like to have a rose tree, or rose 'standard' as opposed to a rose bush, this video will show you what to do. You'll need some pruning shears and of course, a rose bush. This video is really helpful in instructing what to look for when you're trimming, and what branche ...more
It only takes a few commands to manipulate a MacBook's secure HTTPS traffic and pluck login passwords out of the encrypted data. Let's take Facebook and Gmail hacking to the next level by intercepting Safari and Google Chrome web traffic in real time. Both Facebook and Gmail ...more
While hackers have taken advantage of numerous vulnerabilities in Adobe's products to deliver payloads to Windows users via PDF files, a malicious PDF file can also wreak havoc on a Mac that's using the default Preview app. So think twice before double-clicking a PDF open on y ...more
What appears to be an ordinary MP4 may have been designed by an attacker to compromise your Linux Mint operating system. Opening the file will indeed play the intended video, but it will also silently create a connection to the attacker's system. Understanding the Attack Whi ...more
Sometimes your pattern will instruct you to CAST ON AT THE END OF A ROW. CASTING ON AT THE END OF A ROW is quite easy. Here's how to do it: When you come to the end of the row, turn the work as to purl. Cast on, in the usual way, the number of stitches needed. Purl all the ...more
Maybe it is narcissistic to take selfies, but it has become a socially accepted norm, no matter how stupid you might look doing it. Since so many people are seemingly in love with themselves and mobile photography, I thought it was about time to show you how to step up your se ...more
Throwing a party means making sure everyone has fun, but that pursuit can quickly get out-of-hand. Before you know it, you're once laid back get-together has received so many RSVPs that it becomes obvious you're throwing the party of the century. With an over-abundance of beer ...more
LIFE magazine has posted a gallery of bizarrely wonderful old school scientific models. Don't miss the giant fetus or massive colon (double ew). Behold, science education before computers ruled our world. A girl scout leans in to take a closer look at an enclosed model of the ...more
Bad news, guys. The shelf life for liquor leftovers does not apply to your two-buck chuck. While an opened bottle of your favorite whiskey will stay respectable for ages thanks to its high ABV (which makes it inhospitable to outside elements), an opened bottle of merlot will s ...more
With the macOS stager created and the attacker's system hosting the Empire listener, the malicious AppleScript can be designed and disguised to appear as a legitimate PDF using a few Unicode and icon manipulation tricks. A real PDF is required for the attack to work. Files ov ...more
Google, Amazon, and Facebook are always listening. But what's worse? Hackers are listening, too. Windows PCs are particularly vulnerable, but with a few simple commands, a remote attacker can even take over the microphone on someone's Mac computer, streaming audio and listenin ...more
This moped maintenance tutorial shows you how to change the oil on a Honda Ruckus scooter. Remember to check the oil levels so you have enough oil after doing the Ruckus oil change, as the video instructs.
Ryan instructs you how to post pictures on Facebook. 1. Go to groups and choose which groups you want to post pictures. 2. Scroll down to photos (right above link section). 3. Click on add photos. 4. Add photos from your profile or upload pictures directly from your comput ...more
Unless you have a newer iPhone 6S or 6S Plus, the front-facing "FaceTime" camera on your iPhone has a pretty weak, low-res sensor, which means unflattering selfies. You could use the rear "iSight" camera to take a high-res selfie, but framing your mug properly and hitting the ...more
The USB Rubber Ducky and the Digispark board both suffer from the same issue when attacking macOS computers: a keyboard profiler pop-up which tries to identify any non-Apple USB keyboards. While it's an annoying setback, the solution is a simple modification that allows Mac co ...more
It has not been a good year for Apple, as far as software scandals are concerned. From autocorrect nuisances to secret slowdowns of aging iPhones, Apple has had a lot to answer for. iOS users now have another issue to worry about — it's being called "chaiOS," and it's wrecking ...more
In the lead up to the Magic Leap One launch, Magic Leap has been coy about what the actual field of view (FoV) is for its first commercial product. Now, a developer noticed that the client-side source code of the FoV documentation (published last month as a placeholder with t ...more
Have you ever seen an image on social media, somebody's blog, or a news website that shows an iPhone or iPad screenshot with an actual iPhone or iPad model framed around it? You can do that too, and it's really easy to accomplish with a third-party app — but you can do the sam ...more
Deleted bank statements and private photos are still within an attacker's grasp, so don't think that emptying your recycling bin is enough to keep your files from coming back to life. It's possible for a hacker to recover compromising files and images from a backdoored compute ...more
In the previous article in this short series, we learned how to find our neighbor's name using publicly accessible information and how to monitor device activity on their home network. With this information at our disposal, it's time to get into installing and configuring the ...more
Configuring onion services for the first time can be tricky. A surprising number of system administrators make seemingly trivial mistakes that ultimately lead to catastrophic cases of de-anonymizing supposedly anonymous sites on the dark web. OnionScan is a tool designed to id ...more
This is my fourth (and final) installment on SCRABBLE adverts. I'm sure there's a lot I haven't found, but that's for another day. But this post features all of the remaining SCRABBLE advertisements (prints and posters) that haven't already been listed in my previous posts: O ...more
In most macOS hacks, a non-root terminal is used to create a backdoor into the device. A lot of damage can be done as a low-privileged user, but it has its limitations. Think twice before granting a file permission to execute — an attacker might be able to convert your harmles ...more
The newest version of macOS has arrived. While everyone's mind is being blown by Mojave's groundbreaking new Dark Mode, we'll be taking advantage of its insecure file permissions to establish a persistent backdoor with a self-destructing payload that leaves little evidence for ...more
The camera system on the iPhone has never been better. Apple's iPhone 11, 11 Pro, and 11 Pro Max sport some of the best shooters on the market. But no level of quality makes up for the fact that shady apps can access your cameras for nefarious reasons. You can take control of ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Few summertime drinks are as sweet, tart, and refreshing as lemonade. It can cool off even the hottest day and help you relax poolside, on the beach, or just sitting around the house. Don't Miss: Add a Burst of Flavor to Your Drinks with Fruity Ice Cubes Although basic lemo ...more
For those of you who have never viewed an actual child birth, be forewarned. It is a miracle. It is not pretty. This public domain tutorial has plenty of shock, but its intention is to instruct, not offend. Officer Bob North is played by real life Dr. Heinrich Beernink, MD of ...more
Simon Leach is an online pottery instruction legend, and in this three-part video, he instructs us in a procedure somewhat outside his normal area of expertise by creating a homemade plaster bat, which is basically a flat plaster block used for drying wet clay. For the hardcor ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Learn how to do the Whoop Rico official dance. Choreography taught by Young SuperStarz Ladii Suppah Star, Ladii Phresh and Ladii Glam Rock. Watch as these cute kids expertly instruct how to do the Whoop Rico hip hop dance. Show Stoppas - Whoop Rico
Passwords and data stored in web browsers are extremely valuable to hackers. If not for financial gain, black hat hackers may still leak your passwords and personal information for amusement. Never undervalue what you're worth to a hacker. While I'm definitely no black hat, d ...more
Themadcowmoo continues to show us how to create a shatter & disintegration effect in Adobe After Effects. In the second part of his two part video series he begins by getting rid of the extrusion depth in the shadow by changing the value to 0 (0.00). He then instructs on how t ...more
Sometimes, when it comes to Halloween costumes, the easiest ones to make are the best. They require little effort, but can pack a punch and look even more authentic than complex character replications. Recreating Agatha's look from Wes Anderson's The Grand Budapest Hotel is p ...more
Ever wish you can have your own custom stickers? Well its not that hard and you can find everything you need at many major supplies stores. This video will show you exactly how to make professional vinyl stickers to stick anywhere! This is a step-by-step on how to make lamina ...more
Deadly rat lungworm parasites have found their way into Florida. The parasitic worm relies on snails and rats to complete its life cycle, but don't let this nematode's name fool you. This worm can cause meningitis and death in humans who inadvertently consume snails, frogs, or ...more
This video instructs on how to deliver a baby in a hospital setting.
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
It's very easy to get your hands on a good cake. These days, a store-bought cake or even one made from boxed cake mix will usually be pretty good. Heck, make the first simple recipe you find on the internet, and it's likely to taste fine. Don't Miss: The Secret to Making Del ...more
This video instructs nurses how to do minor sutures on deep and large lacerations which can not be drawn together by butterfly strips.
Birds can be taught to perform tricks, just like dogs. This video tutorial shows techniques for how instruct a pet cockatiel to follow simple commands. Learn how to train a Cockatiel to do tricks by watching a professional parrot trainer show you step-by-step how he taught his ...more
Ice skating is a fundamental skill in playing ice hockey. Learn ice hockey skills and moves in this sports video on how to ice skate. Take action: transfer weight from one leg to other, keep knees bent, and pivot as you shift your weight. Angie, the instructor in this how-to v ...more
Have you recently tried to type the words "it" or "is" on your iPhone only to have the Apple keyboard attempt to autocorrect them to "I.T." or "I.S.?" If so, you're not alone. Reportedly hundreds of users have complained across messages boards and Twitter about this autocorre ...more
Alright BlackBerry users, it's time to wipe all that information before you sell, or pass on your BB to someone else. This simple how-to video will let you wipe it all, simply and easily. If you desire you can also choose to leave in your sim card and wipe the contents of that ...more
This video by Mschanda instructs viewers on how to 'French braid with or without extensions'. The instructor uses a mannequin to show how to french braid actually how to corn row. Extensions are fake loose hair (either synthetic or human) used in this case to make the hair app ...more
Leon Rainbow demonstrates the basics of Graffiti. Leon Rainbow is a graffiti artist here to instruct on the history and basic techniques & skills of graffiti. If you are new to graffiti, this is a good introductory video.
The Android Megaminxer is mind-bogglingly elaborate, impressively combining multiple geeky mediums to solve an incredibly complex puzzle. ARM, the genius behind the stunt, uses LEGOs (a Mindstorms NXT kit to be exact) to build a robot responsible for the mechanics; they then e ...more
Brooke Burk with Modern Mom instructs this video on how to do a quick ab work out. Lay down on your back on a yoga mat. Start with 20 basic crunches with your hands behind your head. If you feel it start to hurt your neck, rest your head against your hands. Now do a bicycle mo ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Time to confess a personal bias: I love Gmail. I think it's the best thing since sliced bread. I try to be impartial when I write about software and online services, but seriously -- of all the free email services out there, why would you use anything else? A quick point of o ...more