In this tutorial, Peter John teaches us how to palm read: Crosses & islands on the main lines. Lines in the hand show how a person makes a change. When there is an island on the hand, this means the person needs to slow down and be careful. This could also mean their work is g ...more
Peter John teaches us how to palm read: The squares on the palm in this tutorial, Squares come in all sizes all around the palm of the hand. If they come on the lifeline, this will mean that a person has a certain amount of protection in their life. If they have boxes that are ...more
A short life line on someone's palm doesn't necessarily mean your subject is going to have a short life. Palmistry guru Peter John explains the relationship between a short life line and the mount of Venus when giving a palm reading.
Palmistry expert Peter John lays out in four lessons the key to understanding the double head line when giving a palm reading. Learn what it means when the head line connects to the life line or heart line, or how to tell an ambitious person from an intuitive one by looking at ...more
In this video, we learn how to palm read the straight heart line and head line. If the thumb is farther away from the hand this means they like to spend money a lot and don't hold onto it. The line across the top of the hand that is straight is very rare. Islands on this line ...more
A rough definition of standard deviation is that it is a measure of expressing the observed variations about the average in statistical data i.e. by how much do the observed values vary from the mean. This video continues from the previous solved example and demonstrates the m ...more
What happens when the subject of your palm reading has a broken head, heart or life line? Peter John, an expert in the art of palmistry, explains this difficult question for palm readers and how to interpret what this means for your subject.
This video tells us the method of interpreting derivatives of marginal cost and revenue. If C(x) is the cost of producing x units of a product, C(400) would be the cost to produce 400 units. Now marginal cost is the cost of producing one unit which is equal to the derivative o ...more
In this Spirituality video tutorial you will learn how to palm read; crosses and islands on the main lines. These very often come on the main lines and sometimes they show a lot of changes in the person's life. If there is a cross on the heart line, it implies an emotional cha ...more
Knowing how to read someone’s body language is like having your own personal lie-detector test. So start sussing out the truth today.
In this video, Peter John teaches us how to palm read the right hand and changes. The square hand is usually the practical side of the person. Where the thumb comes out from the side of the hand shows a person of extravagance. When the thumb is closer to the hand it shows a pe ...more
In this video, Peter John teaches us how to palm read the heart and head line on the palm. When you see the heart line come across the mounds of Jupiter, you will be able to tell if someone is going to be wealthy. If the heart line is broken up, this shows the person has extra ...more
Astrologist and palmist Peter John demonstrates the basics of a palm reading in this how-to video. The deeper meaning behind hand shape, strength, and even the way they carry their hands, reveal deeper meanings about their personality. Watch this video palmistry tutorial from ...more
You don't have to be a body language expert to know when a person is displeased or uninterested, even if the person is smiling and nodding at everything you're saying. Subtle clues like slight downward grimaces in the lips or hunched shoulders are immediate giveaways of a pers ...more
If you're giving a palm reading to someone who has short lines on their hand (the head line, the heart line and the life line), or looking to expand your knowledge of palmistry, Peter John explains what the appearance of these short lines mean.
From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Internet, it's easier than ever to follow in their footsteps (or just finish your homework or study for that next ...more
Lawrence Perez, from Saddleback College, and his assistant Charlie, give this pre-algebra lesson on adding negative numbers together. You'll learn the easiest way to do it, and maybe even freshen up on your subtracting skills. Don't waste your time in summer school, learn it h ...more
Want to know what he's really thinking? Watch Love U to learn the language of man speak! This will save you time and heartache.
An ultrasound is the first photograph of your baby, but sometimes it can be difficult to understand. This video shows you what an ultrasound is, how you can interpret the photgraph and what you can expect when you go in for yours.
Dreams don't have a one-size-fits-all meaning. But here are the broad interpretations of the most common ones, as well as tips for deciphering your quirkier journeys. All you need are dreams & a pen and paper. Did you know? The average person has 5 dreams a night.
Want to know how to use Google Data? This clip will show you how it's done. It's easy! So easy, in fact, that this handy home-computing how-to from the folks at Tekzilla can present a complete overview of the process in about two minutes' time. For more information, including ...more
YouTube user NotesCollegeAlgebra teaches you how to interpret a graph. You will learn how to read it and extract information. You go to the graph to see that f(-4)=-2. f(1.5)=2, so it's positive. You then have the question: For what x-values is f(x)<0? You go to the graph and ...more
Before attacking any website, a hacker or penetration tester will first compile a list of target surfaces. After they've used some good recon and found the right places to point their scope at, they'll use a web server scanning tool such as Nikto for hunting down vulnerabiliti ...more
Cracking the password for WPA2 networks has been roughly the same for many years, but a newer attack requires less interaction and info than previous techniques and has the added advantage of being able to target access points with no one connected. The latest attack against t ...more
Hello partners, first of all I would like to thank all those who have sent me positive feedback about my posts, to say that I'm always willing to learn and teach. I'm also open to answer the appropriate questions. Second i want to say sorry for the series i left in stand by m ...more
A powered-off MacBook can be compromised in less than three minutes. With just a few commands, it's possible for a hacker to extract a target's password hash and crack it without their knowledge. The goal in this article is to acquire a target's .plist file which contains the ...more
Apple's iOS 13 has been available for beta testing since June, and the stable release pushed out to everyone on Thursday, Sept. 19. To help you make the most out of iOS 13 for iPhone, we've rounded up everything you'll want to know, whether a colossal feature, small settings c ...more
Android has a single text file named build.prop that determines tons of various system-wide settings on your device. You need root access to edit this file, since it's stored on the system partition—but the various lines of codes it contains are actually fairly easy to interpr ...more
Withstanding an attack from a motivated hacker is one of the most important responsibilities a system administrator must undertake. This is especially true for websites that may contain sensitive customer information and a high volume of users. So it's important for a sysadmin ...more
On April 7, 2017, residents in Dallas, Texas, woke to the sound of emergency sirens blaring all over the city. No one could shut them off, and after repeated efforts to contain the situation, the city had to shut down the entire system. While the media reported a sophisticated ...more
Featured on MTV's Catfish TV series, in season 7, episode 8, Grabify is a tracking link generator that makes it easy to catch an online catfish in a lie. With the ability to identify the IP address, location, make, and model of any device that opens on a cleverly disguised tra ...more
Welcome back, my tenderfoot hackers! Well, the first season of Mr. Robot just ended and Elliot and fsociety successfully took down Evil Corp! They have effectively destroyed over 70% of the world's consumer and student debt! Free at last! Free at last! Of course, global finan ...more
Surveying a target's Wi-Fi infrastructure is the first step to understanding the wireless attack surface you have to work with. Wardriving has been around since the '90s and combines GPS data and Wi-Fi signal data to create accurate, in-depth maps of any nearby Wi-Fi networks ...more
Samsung created quite a buzz when it debuted a built-in heart rate sensor on the Galaxy S5 back in 2014, but amazingly, not many other manufacturers decided to follow suit. It's really a shame, too, since data from a heart rate sensor would go perfectly hand in hand with the i ...more
Welcome back, my rookie hackers! The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked sources for information is the Simple Network Management Protocol (SNMP). Many roo ...more
Auditing websites and discovering vulnerabilities can be a challenge. With RapidScan and UserLAnd combined, anyone with an unrooted Android phone can start hacking websites with a few simple commands. RapidScan does an excellent job of automating the deployment of vulnerabili ...more
Coinhive, a JavaScript cryptocurrency miner, was reportedly discovered on the BlackBerry Mobile website. It was placed there by hackers who exploited a vulnerability in the site's e-commerce software that allowed them to anonymously mine cryptocurrency every time the website w ...more
Welcome back, my novice hackers! I've written a couple of articles on reconnaissance and its importance, and as I've said before, a good hacker will spend 3 to 4 more times doing reconnaissance than actually exploiting the system. If your recon isn't good, you'll likely fail, ...more
Sometimes, you just don't want to hit the Power button to turn your screen off. In the current age of touchscreens, you've got to wonder why we even have physical keys anymore. There are actually plenty alternatives to using the Power button on your Samsung Galaxy S3. You cou ...more
Having an efficient workflow is an integral part of any craft, but it's especially important when it comes to probing apps for vulnerabilities. While Metasploit is considered the de facto standard when it comes to exploitation, it also contains modules for other activities, su ...more
The more we use our smartphones, the more storage space becomes occupied—it's an inescapable fact. But as the data accumulates and chokes off our storage, it can become difficult to identify exactly which files are occupying the most space. So the development team at Nexrad S ...more
Palm reading can be complicated because chirognomy, the study of the mounts of the hand, sometimes contradicts chiromancy, the study of the lines of the hand. For that reason, it's best to do a reading as a whole. In this particular video palmistry tutorial, Peter John explain ...more
MacOS isn't known as an ideal operating system for hacking without customization, but it includes native tools that allow easy control of the Wi-Fi radio for packet sniffing. Changing channels, scanning for access points, and even capturing packets all can be done from the com ...more
Just days after Google released the official Android 11 update, Samsung already had a pre-beta build of One UI 3.0 available for developers to test their apps on. So this year's main OS upgrade is likely hitting Galaxy phones even earlier than we thought. Some features in the ...more
The pictures we upload online are something we tend to think of as self-expression, but these very images can carry code to steal our passwords and data. Profile pictures, avatars, and image galleries are used all over the internet. While all images carry digital picture data ...more
Connecting to your headless Raspberry Pi on the go typically requires a network connection or carrying around bulky peripheral hardware like a screen and keyboard. With the help of an old-school connecting standard, though, you can log into your Pi from any computer using a si ...more
Palm reading can be complicated because chirognomy, the study of the mounts of the hand, sometimes contradicts chiromancy, the study of the lines of the hand. For that reason, it's best to do a reading as a whole. In this particular video palmistry tutorial, Peter John explain ...more
Bash scripting is a convenient way to automate things on any Linux system, and we're going to use it here to automate certain tasks we use all the time. Bash is a simple language for stringing together several different Linux utilities. Its simplicity makes it easy for beginn ...more
Everyone from first responders to hotel cleaning staff use radios operating in the sub-megahertz range to communicate, often without even encoding the transmission. While encoding and encryption are increasingly used in radio communication, an RTL-SDR adapter and smartphone ar ...more
What if you could easily visualize which access point every Wi-Fi device nearby is connected to in a matter of seconds? While programs like Airodump-ng can intercept this wireless information, making it easy for hackers to use and understand is another challenge. Fortunately, ...more
Video game makers have never had great name recognition amongst the American public. Shigeru Miyamoto, Cliff Bleszinski, and Will Wright are names most Americans can't be bothered to remember, whatever their contribution to games have been. Most people are familiar with their ...more
It only takes a few commands to manipulate a MacBook's secure HTTPS traffic and pluck login passwords out of the encrypted data. Let's take Facebook and Gmail hacking to the next level by intercepting Safari and Google Chrome web traffic in real time. Both Facebook and Gmail ...more
So much information exists online that it's easy to get lost in data while researching. Understanding the bigger picture can take a lot of time and energy, but narrowing the question to one that's easy to answer is the first step of any investigation. That's why analysts use o ...more
In my previous article, we learned how to generate a vulnerable virtual machine using SecGen to safely and legally practice hacking. In this tutorial, we will put it all together, and learn how to actually hack our practice VM. This will provide some insight into the methodolo ...more
Hello my anxious hackers, the week has started and here we begin a new series that I think will help many here and not only, for those that have the opportunity to follow our tutorials but they are not yet part of the community. Don't be a script-kid? what do you mean? In pro ...more
If you need a tiny, flexible attack platform for raining down human-interface-device (HID) attacks on unattended computers, the USB Rubber Ducky is the most popular tool for the job. By loading the Ducky with custom firmware, you can design new attacks to be effective against ...more
Hate slogging through pages and pages of weighty books and lengthy work documents? You may not be able to depend on speed-reading apps, but with the right font, you can increase the number of words you scan each second, speeding up your reading pace exponentially. Familiar Is ...more
Palm reading can be complicated because chirognomy, the study of the mounts of the hand, sometimes contradicts chiromancy, the study of the lines of the hand. For that reason, it's best to do a reading as a whole. In this particular video palmistry tutorial, Peter John explain ...more
There's a feature in the Gboard keyboard that enables people who cannot talk, type, or swipe normally to still have a way to communicate in the digital age on their smartphones. While it's mainly an accessibility feature for those who actually need it, it's a good way for anyo ...more
A friend of mine has a crazy amount of Reddit karma and gold, and yesterday he let me in on his secret. This person, who will remain unnamed for obvious reasons, created a Python script called Reddit Karma Crawler that finds rising posts before they get too popular. Every goo ...more