Kali Linux is known as being the de facto penetration-testing Linux distribution but can be a pain to use as an everyday OS — even more of a pain if that means carrying around a second laptop or the constant frustration of using the finicky Wi-Fi on virtual machines. But there ...more
Welcome back, my novice hackers! More and more, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only using smartphones for voice communication, but also web services, email, SMS, chatting, social networking, photogr ...more
Mac OS X has finally added a way to use two apps side by side in full screen mode, à la Microsoft's Windows Snap. But since it's only available in 10.11 El Capitan right now, those of us with older systems will have to wait until the El Capitan Public Preview or final build is ...more
Have you ever wondered how to create an invisible folder? I mean an invisible folder, not a hidden folder. Nowadays, we are facing lots and lots of problems requiring us to keep our data safe and secure. There are millions of hackers all around the world that are trying to ste ...more
Ah, the fabled dark mode. In the past, many users were delighted to find the existence of something called Royale Noir, a dark theme option that was available for Windows XP. Yet for reasons unknown, Microsoft had kept knowledge of Royale Noir a secret until some bright minds ...more
PowerShell Empire is a post-exploitation framework for computers and servers running Microsoft Windows, Windows Server operating systems, or both. In these tutorials, we will be exploring everything from how to install Powershell Empire to how to snoop around a target's comput ...more
Microsoft's Windows 10 has proven to be a solid release by Microsoft, with faster adoption rates than its predecessor builds. The seamless integration of cloud services and tweaks both major and minor make using Windows easier than ever now. And it's almost enough to forget yo ...more
Need help figuring out how to troubleshoot and resolve an 0x7A stop error on a Microsoft Windows desktop computer or laptop? This clip will teach you everything you'll need to know. It's easy! So easy, in fact, that this home-computing how-to from the folks at Britec can prese ...more
No need to figure out the 20th puzzle, entitled "The Origin of the Species", in Assassin's Creed 2. Here's the answers! Puzzle wheel: Start by turning the fifth ring right ten times, then turn the fourth ring left twice. Then rotate the third (and first) rings right twice, the ...more
Imagine this scenario: You exploited a system using metasploit and you want to install a backdoor. You have a few options; Use the meterpreter persistence command. Use the meterpreter metsvc command. Use netcat to listen on a port continuously. You have already tried option ...more
Hundreds of Windows 10, macOS, and Linux vulnerabilities are disclosed every single week, many of which elude mainstream attention. Most users aren't even aware that newly found exploits and vulnerabilities exist, nor that CVEs can be located by anyone in just a few clicks fro ...more
You may not know what HTTP is exactly, but you definitely know that every single website you visit starts with it. Without the Hypertext Transfer Protocol, there'd be no easy way to view all the text, media, and data that you're able to see online. However, all communication b ...more
Ports allow network and internet-connected devices to interact using specified channels. While servers with dedicated IP addresses can connect directly to the internet and make ports publicly available, a system behind a router on a local network may not be open to the rest of ...more
The 18th puzzle is called "Synapses". See how to solve it in Assassin's Creed 2. Code wheel puzzle: Your first clue is to line up 5 with a single tree-looking symbol. The key here is the weird-looking equation on the left, which offers a hint as to the progression of the symbo ...more
At last, what you all finally waited for! Hi! Fire Crackers, Welcome to my 7th post (Part-3), this tutorial will explain about some situations and how to make the Victim's Life like Hell! And fill his system with Malware. #1 Situation: After Exploiting... Go ahead and explo ...more
PowerShell Empire is an amazing framework that is widely used by penetration testers for exploiting Microsoft Windows hosts. In our previous guide, we discussed why and when it's important to use, as well as some general info on listeners, stagers, agents, and modules. Now, we ...more
Get all of the info on the 15th puzzle, entitled "Guardians", in Assassin's Creed 2. Puzzle wheel: Seemingly every other ring is linked here, so we’ll cut straight to the chase: Turn the third (and fourth) rings right twice, the fifth (and first) right four times, the fourth ( ...more
OpenBSD implements security in its development in a way that no other operating system on the planet does. Learning to use the Unix-like operating system can help a hacker understand secure development, create better servers, and improve their understanding of the BSD operatin ...more
Figure out the 10th puzzle, Apollo, in Assassin's Creed 2. Image 1: Highlight the lunar lander just down and to the left of the moon. Puzzle wheel: Another linked-ring rotation puzzle. Your job here is to align all the channels; do this by moving the fifth ring to the left six ...more
Apple's codec for photos and videos in iOS 11, HEVC (High-Efficiency Video Coding), as well as the container, HEIF (High-Efficiency Image File Format), result in a reduction in size for pictures and movies without sacrificing quality. Seems like a win-win situation, but Window ...more
It's like magic. Creating a .LOG file has never been easier. And all you need is Notepad on your Windows PC. After creating this LOG file, Notepad automatically inserts the current date and time after the last line. Check it out. If you've ever wondered about LOG file types, t ...more
See the key to the sixth puzzle "Brothers" in Assassin's Creed 2. This is where things start to get tricky; while the first batch of ring puzzles were simple, these link some of their rings together, so that you can’t move one without moving another. For more info, watch the w ...more
This is the 12th puzzle, entitled "Titans of Industry", in Assassin's Creed 2. Code wheel puzzle 1: The key here is in the “4=1” on the blueprint at the left of the screen. Line up the red 4 over the gray 1 and input the following code: 917240. Image 1: This one’s the opposite ...more
Figure out the 17th puzzle, entitled "The Bunker", in Assassin's Creed 2. Code wheel puzzle: Here’s a tricky one; your clues are “<” and “2,” and the only advice you’ll get from your handlers is that maybe there’s “something we can count” on the strange symbols. In this case t ...more
The purpose of this article is to discuss how you can change your Windows 7 logon screen. This post will explain how to require a user to enter a username and password by default like the classic version of Windows. I recommend advanced computer users carry out this task. It ...more
Want to share Internet connectivity between two computers without a wireless network but have an extra CAT5 ethernet cable? You're in luck. This home networking how-to will show you what to do to get your machines talking not only to one another but the web at large. Internet ...more
Windows 10 definitely has a sleek and modern look to it, but some of these visual changes have been made at the expense of functionality. For instance, the slider that appears when you click the volume icon in your notification tray now sports a completely minimalist look that ...more
Welcome back, my aspiring hackers! As I mentioned in earlier posts, the best hackers (or at least those not behind bars) have a keen understanding of digital forensics. If I am tasked to intrude upon an enemy's file server to retrieve war plans, such as in this tutorial, it i ...more
Microsoft released a preview version of Windows 8.1 today, notably adding an updated Start screen, the ability to run several Windows 8 apps side by side in a number of configurations, fully integrated search, better HiDPI support for multiple monitors, and for those who miss ...more
Here's the answers to the 19th puzzle, titled "The Fourth Day", in Assassin's Creed 2. Image set: What used to be worshipped by every primitive culture under the…? That’s right, the sun. Pick the five images that focus on it. Image: Find the tiny image of Earth in the lower-le ...more
New to Audacity? Audacity is a free, open source software for recording and editing sounds. It is available for Mac OS X, Microsoft Windows, GNU/Linux, and other operating systems. This video tutorial will show you how to filter noise from an audio clip with Audacity. Removin ...more
Social engineering is described as the clever manipulation of the natural tendency of human trust. All of the passwords, locks, and encryption in the entire world are useless against a good social engineer who can charm or trick you into giving it up. But what once started as ...more
Visitazione's Secret: This is Tomb number 6. The grave of all graves. The entrance to the tomb is on top of the first level of the building's roof. You can pretty easily climb the building on the eastern face and then shimmy around to the north face and continue up. There's a ...more
The coming year promises to be a good one for those of us watching the augmented and mixed reality world. And the Consumer Electronics Show (CES), starting Jan. 5 in Las Vegas, Nevada, for its 50th year, is bringing 2017 in with a bang—we're expecting a ton of great announceme ...more
For me, the idea of a smartphone with internet access was overkill for a cell phone. Wasn't that what my computer was for? Do I really need immediate access to the web? Must I update my Facebook every hour, from the palm of my hand? Do I need turn-by-turn directions from Googl ...more
In this clip, you'll learn how to rip the Microsoft Windows XP Recovery Console to a bootable USB thumb drive. It's easy! So easy, in fact, that this home-computing how-to from the folks at Britec can present a complete overview of the process in just over five minutes. For mo ...more
Solve the challenging 13th puzzle, entitled "I Am Become Death, the Destroyer of Worlds", in Assassin's Creed 2. Code wheel puzzle: This one’s even trickier than the last one; starting with the hint that 9 (next to the tower) equals “triangle” (up and to the left from the bomb ...more
The 14th puzzle, entitled "Bloodlines", isn't really that hard in Assassin's Creed 2. Set 1: Highlight the images that depict women and gods in amorous entanglements (especially if those gods are disguised as animals). For more info, watch the whole gameplay. This is an Assas ...more
In Boca Al Lupo: The end is almost here. This is the last mission you will need to complete. Talk to Mario and he'll send you on your final mission, to assassinate Rodrigo Boriga in the Vatican in Rome. The mission is more linear than any other you've done up to this point, an ...more
The Play Store hasn't been the most secure place for apps lately. A quick Google search for "Play Store malware" will give you a taste of some of the malicious apps that snuck their way onto Android's official app store. Google is aware of the problem and they're tying to fix ...more
For those needing to replace old controller hardware on cutting mills, those into native retro gaming, or for those who want to see what all the fuss was about in the 1980's, or for those who just want a play with old but great technology, this tutorial shows you step-by-step ...more
This is a LEGO Indiana Jones walkthrough on how to unlock the secret level. What you basically need are most of the characters and at least one level in each chapter having 10/10 artifacts. You might not need all of the artifacts to play the Young Indy and Ancient City level, ...more
Steps adopted to bypass Windows Genuine Advantage Notification in Windows NT are:1. Open my computer2. Open the Local Disk (Where the Operating system is currently installed).3. Open windows folder and enter into the folder, system 32.(Shortcut: My Computer>Local Disk C>System ...more
Welcome back, my novice hackers! In this series, we have been exploring how a forensic investigator can find evidence of illegal or illicit activity. Among other things, we have examined the registry and prefetch files for artifacts and have done some rudimentary forensic ana ...more
As many of you know, I firmly believe that hacking is THE skill of the future. Although the term "hacking" often conjures up the image of a pimple-faced script kiddie in their mother's basement transfixed by a computer screen, the modern image of the hacker in 2015 is that of ...more
Archive files are great for portability and saving space, but a lot of people don't know they can also be encrypted. There are a lot of archiver programs out there, but most of them can open a file that's been encrypted using other software, as long as you're using a recent ve ...more
Need help figuring out how to get rid of a bad service or device driver that's stopping your Microsoft Windows PC from starting up? It's easy! So easy, in fact, that this home-computing how-to from the folks at Britec can present a complete overview of the process in just over ...more
In this video tutorial, viewers learn how to get a Windows 98 theme on Microsoft Windows 7. The Windows 98 themes need to be downloaded from the link in the video description. The Windows 98 themes are: Baseball, Jungle, Mystery and Travel. When opened, the background changes ...more
Disney's animated film Toy Story 3 beat all expectations at the box office, and is now the highest-grossing movie of 2010 in North America and second worldwide. Can Disney Interactive Studio's Toy Story 3: The Video Game match the success? Who knows, but no matter how successf ...more
This one's pretty easy. Here's the solution to the 16th puzzle, entitled "The Cavalry", in Assassin's Creed 2. Image 1: Just move the cursor to the word “Tunguska.” Image 2: Move the cursor onto the staff and drag it onto Tesla’s photo. For more info, watch the whole gameplay. ...more
Welcome back, my fledgling hackers! Let's continue to expand our knowledge of digital forensics, to provide you the skills necessary to be a digital forensic analyst or investigator, as well make you a better hacker overall. In your attempts to enter a system or network undet ...more
It's currently 2011, but when you fire up your game console, put your hands on the controller and play the new Dead Space 2 video game, you're warped into the future— into the year 2511— just 3 years after the events that took place in the first Dead Space. And it's sure to be ...more
Throughout this NR50 series, we have talked about the incredible growth the augmented and mixed reality space has seen in the last year. More devices, software, developers, and use-cases seem to arrive daily. For this growth to have occurred, it took the work of many people, f ...more
San Marco's Secret: Tomb 5 is not easy, so be careful. Getting into the Basilica without the use of Leonardo's flying machine is tricky. However, chances are that you've already penetrated the massive building's defenses in the mission If at First You Don't Succeed.... But if ...more
Use Microsoft Windows 7? Miss the old Ctrl-Alt-Delete log-in prompt? It's easy to restore. So easy, in fact, that this home computing how-to from the folks at CNET TV can present a complete overview of the restoration process in just over a minute's time. For more information, ...more
Want to mod your HTC HD2 Microsoft Windows smartphone to use wireless charging—without breaking your warantee in the process? It can be done! And quite easily at that. For complete details, and to get started modding your own HD2 phone to work with wireless chargers, watch thi ...more
In this video tutorial, viewers learn how to set the language on a Microsoft Windows XP computer. This process is very fast, simple and easy to do. Begin by clicking on the Start menu and select Control Panel. Now double-click on the Regional and Language Options. Go to the La ...more
Password protect your files and folders in Microsoft Windows XP or Vista. This free video tutorial from CNET TV will show you how. Thwart would-be snoopers with this home cryptography guide, which presents easy-to-follow, step-by-step instructions on how to protect your privac ...more
Hi all, Pro Hackers/Crackers, Let's see how we can use batch for our own Protection instead of exploiting someone with it. And this tutorial is going to explain the same. #1 Protection, PC Security: I will tell you how to add another level of security to your PC, instead of j ...more
Don't let L4D2 get the best of you. Take control by checking out this video on Campaign 2: Dark Carnival - Concert. Grab your guns and go out the door. There is really only one path to follow, so move right around the venue until you reach the stage. Feel free to use up your a ...more