This is the best how-to's website that I've ever seen, and I wanted to join it. It taught me a lot, but, because I'm here to learn too, please correct me if I'm wrong. You probably know that Ettercap is a very powerful tool for man in the middle attacks. You probably know tha ...more
When you're out and about in the dangerous world of Wi-Fi, it's hard for the average computer user to stay protected, or even know what being protected entails. Little do most people know, Windows 7 has a built-in security that few people take advantage of: a VPN (Virtual Priv ...more
The Play Store hasn't been the most secure place for apps lately. A quick Google search for "Play Store malware" will give you a taste of some of the malicious apps that snuck their way onto Android's official app store. Google is aware of the problem and they're tying to fix ...more
Nearly every connection to the internet is dependent on the Domain Name System. DNS, as it's more commonly called, translates domain names like gadgethacks.com into IP addresses, which is what network devices use to route data. The problem with DNS servers is that they don't h ...more
to stay secure, you dont just need Tor, and a VPN. You need good browsing habits. What are Browsing Habits You Ask? Let me tell explain. Its basically how you behave on the internet, what websites you click, your language pattern (how you speak), what websites you are regist ...more
Welcome back, my budding hackers! In my continuing series on Linux basics for aspiring hackers, I now want to address Loadable kernel modules (LKMs), which are key to the Linux administrator because they provide us the capability to add functionality to the kernel without hav ...more
Welcome back, my budding hackers! One of the most time-consuming, but necessary, activities in hacking is reconnaissance. Before we can hack a system, we need to know what operating system it's running, what ports are open, what services are running, and hopefully, what appli ...more
I have had a lot of people ask me, "How does my neighbor keep getting into my wireless?!". Chances are, these people are all using WEP, a deprecated wireless encryption protocol. Either that, or you are using one weak WPA passphrase. If someone can access your wireless networ ...more
If you've spotted an unintended Ethernet connection and wondered what you could do with all of the information coursing through those wires, there's an easy way to hack into it and find out. Let's say there's a router that we need to know the password for, and we have physica ...more
If it has an internet connection, it's got a huge attack surface for hackers. But what makes your phone even more dangerous is its portability and the collection of sensors it houses that can be just as good at tracking you as the camera and mic. That is why one of the first ...more
It's a myth that regular users only need the protection of a virtual private network when on a public Wi-Fi connection. First, almost all network connections can be accessed without the proper permissions. Second, ethical hackers also need to think about using a VPN as one ste ...more
After reviewing the international plans for major US wireless carriers, it became obvious they're all pretty bad. Your data is heavily restricted, requiring a daily fee which can cost an extra $100+ on a seven-day vacation. That's when I learned about Google Fi, and how for mo ...more
With a tiny computer, hackers can see every website you visit, exploit services on the network, and break into your Wi-Fi router's gateway to manipulate sensitive settings. These attacks can be performed from anywhere once the attacker's computer has been connected to the rout ...more
Microsoft.com is one of the most extensive domains on the internet with thousands of registered subdomains. Windows 10 will ping these subdomains hundreds of times an hour, making it challenging to firewall and monitor all of the requests made by the operating system. An attac ...more
When you want to install a new tool or game on your iPhone, you go straight to the App Store to do so — but it's not the only place you can get apps from. Some developers use back alleys to get their apps to you, while others can trick you into installing them without giving i ...more
It's been a while when the major web browsers first introduced HTTP Strict Transport Security, which made it more difficult to carry Man In The Middle (MITM) attacks (except IE, as always, which will support HSTS since Windows 10, surprised?). SSLStrip and the HSTS Chronicles ...more
With a simple web-based tool, you can hide secret messages for family, friends, and fellow spies inside of plain text communications, and anyone that intercepts the messages will be none the wiser. Steganography is the art of hiding secret messages comprised of text, code, au ...more
The dark web is an intimidating place for a newbie hacker, but it's a powerful tool once you've learned to navigate it safely. To help you out with that, this guide will cover some need-to-know information for traversing the dark corners of the internet while keeping your iden ...more
Identifying vulnerable devices and services on a target router can be difficult without leaving logs and other traces of an active attacker on the network. However, there is a way to covertly decrypt and view Wi-Fi activity without ever connecting to the wireless network. Whe ...more
While iOS 11.3 doesn't have as many new features as iOS 11.2, there's still a lot to love about Apple's latest update for iPad, iPhone, and iPod touch, even if some of the best features we were expecting didn't make the cut. Apple released the iOS 11.3 beta on Jan. 24, and ju ...more
Have you ever used an open wifi, which after you connect displays a website to enter your credentials to get internet? That website is called captive portal and widely used in airports, hotels, universities etc. Have you ever wondered what would happen if someone would set up ...more
When it comes to cybersecurity, one layer isn't enough. A complex password (or one created with a password manager) does a good job of protecting your data, but it can still be cracked. Two-factor authentication strengthens this by adding a second layer of security, giving you ...more
For the uninitiated, it can be difficult to buy that special hacker in your life a perfect holiday gift. That's why we've taken out the guesswork and curated a list of the top 20 most popular items our readers are buying. Whether you're buying a gift for a friend or have been ...more
Smartphones and laptops are constantly sending Wi-Fi radio signals, and many of these signals can be used to track us. In this guide, we'll program a cheap IoT device in Arduino to create hundreds of fake networks with common names; This will cause nearby devices to reveal the ...more
Privacy is a growing concern in the tech industry, but Apple has fallen behind many of its peers when it comes to email security. Fortunately, iOS 15 changes that. Your email address is the key to a vast amount of personal information, not to mention a stepping stone into your ...more
Malevolent hackers can divert your incoming calls and texts to any number they want, and they don't need to be a criminal mastermind to do it. Even friends and family members can reroute your incoming calls and messages so that they know exactly who's trying to reach you, and ...more
You should feel relatively safe to watch and post videos on TikTok, but like with any online service, you're always at the mercy of hackers. It's unfortunate, but anyone can become a target for arbitrary reasons. Maybe your TikTok videos are controversial. Maybe someone has a ...more
Your iPhone's Messages app has some impressive new features and changes with iOS 17, and you've probably already noticed some of them just by using the updated app. But there are less apparent features, even hidden ones, that have likely eluded you that you're going to want to ...more
Apple just released its iOS 16.6 update for iPhone on July 24. When you install the new software, it may look like there's not much to it since Apple doesn't include any features in the release notes beyond "important bug fixes and security updates," but a few new features are ...more
Your social security number, credit card information, and medical history can fall into the wrong hands if you're not careful about how and where you share your data online. If you really care about your data, there are tools and techniques you can utilize to protect yourself ...more
Apple just released its biggest update to iOS 17 yet, and there are 60 exciting new changes for your iPhone. With iOS 17.2, you get a brand new app, more Apple Music enhancements, upgrades in Messages, and a new security feature that was announced last year, as well as changes ...more
The best way to fish is with live bait, but buying bait can be expensive and it isn't always guaranteed fresh. Once you learn how to cast your own bait you will be able to catch large amounts of bait fish on your own, and cut out the middle man. Happy fishing! Cast netting liv ...more
You should encrypt everything. These are what you need: BackTrack 4,0, modify IP tables, Python and ARPspoofing. Program the PC to flip to forwarding mode. Adjust the programming in the IP tables. You are convincing the host and the client that the man (PC) in the middle is th ...more
Grandmaster Alexandra Kosteniuk teaches you how to... you guessed it, play a game of chess. This chess video tutorial will show you how to take the initiative in a chess game to win. This chess problem is from the game Danielian vs Kosteniuk, in the European Team Championship ...more
If you're a musician in need of some lessons, there's no better way to learn than with MusicRadar's so-called "Tuition" instructions. Although the title tuition is misleading, this video class is anything but costly, because it's free, right here. Whether you're looking for he ...more
In this chess lesson, you'll learn how to do Greco's Attack in the Giuoco Piano, in an Italian Game. Everyone chess master should learn this, because you're middle game isn't getting any stronger.
Set up a large maze in a field. However, there are no walls to the maze, just outlines on the ground. The prank is in that the bikes are rigged with the same devices that prevent people from stealing shopping carts. So essentially instead of hitting a wall in a regular maze, ...more
In this video, we learn how to unlock the You Have My Sympathies achievement in AvP. During the beginning, you will need to shoot a bunch of aliens while you are waiting for the rest of the action to happen in the game. As you are walking around, you will see a large tree in t ...more
This video is demonstrated completely through visual movement and accompanied with a brief written description. A young man speeds down the soccer field with a ball and scores a goal. His signature move leading up to the goal is broken down into very specific methods of moveme ...more
Recording home movies is quite a joy - how else would you remember that time your son shot milk out of his nose from laughing too hard, or when your shih tzu did a headstand? But it's often a pain transfering all your film files from your video camera to your computer. Make m ...more
Middle-aged man shows how to fit a door handle into a door. Video lists the steps into sequential numbers and has subtitles for every step and tool required to make for a very helpful video. Fit a door handle. Click through to watch this video on videojug.com
Middle-aged man shows how to hang a door properly. Very thorough explanation and subtitled steps makeup this informative video. The importance of sanding the door to fit properly are covered in this video. Hang a door properly on its hinges. Click through to watch this video o ...more
Middle-aged man shows how to mount a door knocker onto a door. Door knockers help for a better looking front door and prevent people from knocking on a door with their hands. Watch video for best results. Fit a door knocker onto a door. Click through to watch this video on vid ...more
Middle-aged man instructs how to mount a rack bolt onto a door to strengthen the security of the door. Great video using subtitles and clear demonstration of how to use a drill when mounting the rack bolt kit. Fit a rack bolt onto a door. Click through to watch this video on v ...more
Middle-aged man shows how to paint your home walls properly. Subtitles and numbered steps such as measuring the dimensions of the room, masking the room, using primer, and using the roller properly make this video extremely useful. Paint a wall properly. Click through to watch ...more
Middle-aged man goes through the tools and process to install a security chain to a door. Tools include a door chain, screwgun, hammer, chisel and other listed tools. Step-by-step video explains thoroughly how to accomplish the chain installation. Mount a security chain to a d ...more
Middle-aged man shows how to build a peephole into a front door. Step 1 is to have a peep hole, drill bits, tape measure and other tools. Following the laid out instructions of this video, putting the peephole will take no time. Build a peephole into a door. Click through to w ...more
Middle-aged man demonstrates how to attach door numbers to a front door. Video uses minimal tools such as a drill, screwdriver, tape measure, pencil and the numbers themselves. Watch video for best results. Attach door numbers. Click through to watch this video on videojug.com
Bitcoin is a new currency built off "Satoshi Nakamoto's" (alias) 2008 Bitcoin white-paper. Bitcoin provides its users with a way to make peer-to-peer (P2P) transactions without having to use a bank as a mediator. There is no middle man, no corporation backing it, and no one ha ...more
In order to transition from the Running Man to the Melbourne Shuffle and the Melbourne Shuffle to the Running man, you need to remember that the 3rd step of one and the middle step of the other are the exact same step. This is the transition step. Start out in the Running Man ...more
Kameron Kay teaches us how to make a floating flower crystal toe ring in this tutorial. You will need: stretch cord, large crimp bead, flat nosed pliers, flat backed crystal flower, glue, and small scissors to make this. First, cut out your chord to the exact size that you nee ...more
In its heyday the Atari gaming console was the Playstation of the 80s. Sure, you could download some wannabe emulator, but why not go a step further and purchase an actual Atari. They're still floating around and just think how cool it'll be to play pong in hi-definition. Cla ...more
Mujaddara has always been considered poor man's dish throughout the ages in the Middle East but currently it is considered a very healthy dish that provides a balanced healthy meal , with healthy fat, protein and carbohydrates. This dish is a very flavorful dish too. This dis ...more
As far as new artists go, 2010 more or less belonged to this 23-year-old Nashville native, who released her hit debut, "Animal," in January, then followed it up last month with a nine-track mini-album, "Cannibal." With three songs on Billboard's year-end Hot 100, and 1.1 mill ...more
A U.S. soldier's shooting of more than a dozen Afghan civilians deepened questions on Sunday about what the United States can accomplish in Afghanistan before it withdraws, as Washington rushed to contain the damage from the startling rogue attack. President Barack Obama and ...more
There is a new interface for customizing your farmer! Just click on them on your farm and you can change their look. There will also be a small icon on the left of a face in a duck costume you can click. This new layout was added to help showcase the new costumes and clothes! ...more
Here it is, the final battle for Black Suit Spidey against his greatest nemesis: Carnage in Spider-Man: Shattered Dimensions. Spidey goes to Triskelion to try to get help from Nick Fury, and winds up in the middle of hell on earth among the Carnage symbiote. In this video you ...more
Water Purification Device Prompts TSA to Close Down Minneapolis Airport In another stupendous incident of comical over-reaction, the TSA ordered the evacuation of two airport terminals in Minneapolis after a water purification device was found in a woman’s luggage. Obama Mul ...more
If you can't beat Silitha in the Xbox 360 video game Darksiders, then perhaps you should check out this video on accomplishing just that. Silitha is a gigantic and ugly spider-like creature that dwarfs War. She can teleport around the arena and likes to appear directly above W ...more
A bounty hunt is simple: Go to the wanted board in your ranch or city and look for a wanted poster. Look at the bill and if it's to your liking, accept the bounty. Once you get to the gang hideout, take the boss alive for more money and fame, or just kill him and bring back e ...more