Man in the Middle Attack

How To : BeEF+Ettercap:Pwning Marriage

This is the best how-to's website that I've ever seen, and I wanted to join it. It taught me a lot, but, because I'm here to learn too, please correct me if I'm wrong. You probably know that Ettercap is a very powerful tool for man in the middle attacks. You probably know tha ...more

TypoGuy Explaining Anonymity : Secure Browsing Habits

to stay secure, you dont just need Tor, and a VPN. You need good browsing habits. What are Browsing Habits You Ask? Let me tell explain. Its basically how you behave on the internet, what websites you click, your language pattern (how you speak), what websites you are regist ...more

How To : Safeguard Your Data & Privacy with This Speedy VPN

It's a myth that regular users only need the protection of a virtual private network when on a public Wi-Fi connection. First, almost all network connections can be accessed without the proper permissions. Second, ethical hackers also need to think about using a VPN as one ste ...more

How To : Perform Network-Based Attacks with an SBC Implant

With a tiny computer, hackers can see every website you visit, exploit services on the network, and break into your Wi-Fi router's gateway to manipulate sensitive settings. These attacks can be performed from anywhere once the attacker's computer has been connected to the rout ...more

News : 24 Cool New Features in iOS 11.3 for iPhone

While iOS 11.3 doesn't have as many new features as iOS 11.2, there's still a lot to love about Apple's latest update for iPad, iPhone, and iPod touch, even if some of the best features we were expecting didn't make the cut. Apple released the iOS 11.3 beta on Jan. 24, and ju ...more

How To : Fake Captive Portal with an Android Phone

Have you ever used an open wifi, which after you connect displays a website to enter your credentials to get internet? That website is called captive portal and widely used in airports, hotels, universities etc. Have you ever wondered what would happen if someone would set up ...more

Buyer's Guide : Top 20 Hacker Holiday Gifts of 2018

For the uninitiated, it can be difficult to buy that special hacker in your life a perfect holiday gift. That's why we've taken out the guesswork and curated a list of the top 20 most popular items our readers are buying. Whether you're buying a gift for a friend or have been ...more

How To : 8 Ways Your iPhone Can Make Emailing More Secure

Privacy is a growing concern in the tech industry, but Apple has fallen behind many of its peers when it comes to email security. Fortunately, iOS 15 changes that. Your email address is the key to a vast amount of personal information, not to mention a stepping stone into your ...more

How To : Throw a cast net for live bait

The best way to fish is with live bait, but buying bait can be expensive and it isn't always guaranteed fresh. Once you learn how to cast your own bait you will be able to catch large amounts of bait fish on your own, and cut out the middle man. Happy fishing! Cast netting liv ...more

How To : Use SSLStrip to remove encryption from browser

You should encrypt everything. These are what you need: BackTrack 4,0, modify IP tables, Python and ARPspoofing. Program the PC to flip to forwarding mode. Adjust the programming in the IP tables. You are convincing the host and the client that the man (PC) in the middle is th ...more

How To : Take the initiative in a chess game to win

Grandmaster Alexandra Kosteniuk teaches you how to... you guessed it, play a game of chess. This chess video tutorial will show you how to take the initiative in a chess game to win. This chess problem is from the game Danielian vs Kosteniuk, in the European Team Championship ...more

News : BMX Maze of Destruction

Set up a large maze in a field. However, there are no walls to the maze, just outlines on the ground. The prank is in that the bikes are rigged with the same devices that prevent people from stealing shopping carts. So essentially instead of hitting a wall in a regular maze, ...more

How To : Record straight from a video camera to a computer

Recording home movies is quite a joy - how else would you remember that time your son shot milk out of his nose from laughing too hard, or when your shih tzu did a headstand? But it's often a pain transfering all your film files from your video camera to your computer. Make m ...more

How To : Fit a door handle

Middle-aged man shows how to fit a door handle into a door. Video lists the steps into sequential numbers and has subtitles for every step and tool required to make for a very helpful video. Fit a door handle. Click through to watch this video on videojug.com

How To : Hang a door properly on its hinges

Middle-aged man shows how to hang a door properly. Very thorough explanation and subtitled steps makeup this informative video. The importance of sanding the door to fit properly are covered in this video. Hang a door properly on its hinges. Click through to watch this video o ...more

How To : Fit a door knocker onto a door

Middle-aged man shows how to mount a door knocker onto a door. Door knockers help for a better looking front door and prevent people from knocking on a door with their hands. Watch video for best results. Fit a door knocker onto a door. Click through to watch this video on vid ...more

How To : Fit a rack bolt onto a door

Middle-aged man instructs how to mount a rack bolt onto a door to strengthen the security of the door. Great video using subtitles and clear demonstration of how to use a drill when mounting the rack bolt kit. Fit a rack bolt onto a door. Click through to watch this video on v ...more

How To : Paint a wall properly

Middle-aged man shows how to paint your home walls properly. Subtitles and numbered steps such as measuring the dimensions of the room, masking the room, using primer, and using the roller properly make this video extremely useful. Paint a wall properly. Click through to watch ...more

How To : Mount a security chain to a door

Middle-aged man goes through the tools and process to install a security chain to a door. Tools include a door chain, screwgun, hammer, chisel and other listed tools. Step-by-step video explains thoroughly how to accomplish the chain installation. Mount a security chain to a d ...more

How To : Build a peephole into a door

Middle-aged man shows how to build a peephole into a front door. Step 1 is to have a peep hole, drill bits, tape measure and other tools. Following the laid out instructions of this video, putting the peephole will take no time. Build a peephole into a door. Click through to w ...more

How To : Attach door numbers

Middle-aged man demonstrates how to attach door numbers to a front door. Video uses minimal tools such as a drill, screwdriver, tape measure, pencil and the numbers themselves. Watch video for best results. Attach door numbers. Click through to watch this video on videojug.com

How To : Mine Bitcoin and Make Money

Bitcoin is a new currency built off "Satoshi Nakamoto's" (alias) 2008 Bitcoin white-paper. Bitcoin provides its users with a way to make peer-to-peer (P2P) transactions without having to use a bank as a mediator. There is no middle man, no corporation backing it, and no one ha ...more

How To : Do Melbourne Shuffle transitions

In order to transition from the Running Man to the Melbourne Shuffle and the Melbourne Shuffle to the Running man, you need to remember that the 3rd step of one and the middle step of the other are the exact same step. This is the transition step. Start out in the Running Man ...more

How To : Make a floating flower, Swarovski crystal toe ring

Kameron Kay teaches us how to make a floating flower crystal toe ring in this tutorial. You will need: stretch cord, large crimp bead, flat nosed pliers, flat backed crystal flower, glue, and small scissors to make this. First, cut out your chord to the exact size that you nee ...more

How To : Purchase and hook up an Atari 2600

In its heyday the Atari gaming console was the Playstation of the 80s. Sure, you could download some wannabe emulator, but why not go a step further and purchase an actual Atari. They're still floating around and just think how cool it'll be to play pong in hi-definition. Cla ...more

How To : Cook mujaddara rice and lentils

Mujaddara has always been considered poor man's dish throughout the ages in the Middle East but currently it is considered a very healthy dish that provides a balanced healthy meal , with healthy fat, protein and carbohydrates. This dish is a very flavorful dish too. This dis ...more

News : Ka$hA TaKe$ ThE To0p

As far as new artists go, 2010 more or less belonged to this 23-year-old Nashville native, who released her hit debut, "Animal," in January, then followed it up last month with a nine-track mini-album, "Cannibal." With three songs on Billboard's year-end Hot 100, and 1.1 mill ...more

News : News Clips - June 4

Water Purification Device Prompts TSA to Close Down Minneapolis Airport In another stupendous incident of comical over-reaction, the TSA ordered the evacuation of two airport terminals in Minneapolis after a water purification device was found in a woman’s luggage. Obama Mul ...more

How to Walkthrough Darksiders : Iron Canopy - Fight Silitha

If you can't beat Silitha in the Xbox 360 video game Darksiders, then perhaps you should check out this video on accomplishing just that. Silitha is a gigantic and ugly spider-like creature that dwarfs War. She can teleport around the arena and likes to appear directly above W ...more

Red Dead Redemption : A bounty hunt

A bounty hunt is simple: Go to the wanted board in your ranch or city and look for a wanted poster. Look at the bill and if it's to your liking, accept the bounty. Once you get to the gang hideout, take the boss alive for more money and fame, or just kill him and bring back e ...more

  • Hot
  • Latest