Multiple Attack

How To : Defend Yourself Against Multiple Attackers

How to fight multiple attackers with 5 simple Wing Chun techniques that will help survive a attack by a gang of multiple attackers. These are some of the best tactics on how to fight a group of people while staying safe. This video discusses how to control your position in a ...more

Hack Like a Pro : The Hacker Methodology

Welcome back, my neophyte hackers! Many newbie hackers seem to be confused regarding the process or methodology to employ a successful hack. Most want to simply go straight to the exploit without doing the due diligence to make certain that the hack will work and you won't ge ...more

How To : Protect Your PHP Website from SQL Injection Hacks

As a web developer, I often read articles about hackers (from the lowly to the knowledgeable) infiltrating websites via the dreaded 'SQL Injection' method and completely taking control, changing, gaining access, or destroying the owner's data. As a fellow web developer, I'm su ...more

A Symphony of Evil : Javi's Black Deck

My friend Javi (who will join this group eventually that lazy sack) is a masterful MTG player and deck-constructor. Hell, he's damn impressive nerd all around. One time he made a Black deck out of my cards, and it is pretty devestating despite the fact that I never really coll ...more

How To : Draw 3D wind flapping flags

Mark demonstrates how to draw flapping flags or scrolls. He starts with a paper in a binder but any paper will work. In this demonstration he uses a pencil to create his drawing but any pen or pencil will do. He draws the flagpole first starting on the left side of the page. H ...more

Tera Online : Emphasis on Gameplay

Is game play king? Or was it that graphics is king? or maybe the story? Arghhh... well, regardless from which school of thought you come from, Tera online has bet most of their chips on game play. Tera's game play separates this game from the rest. The ability to deal damage ...more

Tor vs. I2P : The Great Onion Debate

In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and m ...more

Dungeon Defenders : Heaven for Hardcore Gamers

Dungeon Defenders is the most exciting craft game on the Fall 2011 release schedule. I got a chance to play it at PAX in August and interviewed developers Trendy Entertainment last month. After more than a year of publishing difficulty and delay, the game finally came out on P ...more

WTFotos of the Day : 10 Less Than Helpful Textbooks

Besides Wikipedia and teachers (in that order), textbooks are the go-to source of information during our school years. Today, we take a look at what happens when the people writing these voluminous tomes get attacked by a sudden bout of ennui. Forward Fellow Feeling Frisky I ...more

News : Kick Ass Game 1st Impressions

Kiss Ass Game First Impressions Review of the game next week. Here are some quick impressions of the game and the first level  Kick ass character can fight. Heavy attacks are useful, light attacks are not. Light, heavy, and special attacks (3 types) for all character. Jump + a ...more

How To : Secure Your Computer with Norton DNS

There are so many hackers around these days, and they are becoming very smart. So smart that they have successfully taken down many government websites. The most recent attack was on the Department of Justice (DOJ). To read about the history of these hackers, check out Wikiped ...more

News : Alan Wake Episode 3 Gameplay & Musings

There are no spoilers in this writing, read without worry. Finished Episode 3 of Alan Wake yesterday, impressed by different reasons. I originally bought the game for the possibility of great story, dialogue, and voice acting. That part of the game has been disappointing. Wha ...more

News : Anonymity Networks. Don't use one, use all of them!

Introduction The 3 major anonymity networks on the Internet are Tor/Onionland, I2P and Freenet. If you feel confused on which one is the "best" one to use the answer is simple. Use all three! Each anonymity network is designed for a different specific purpose. One network al ...more

How To : Make Minecraft Potions

Sometimes mining and crafting gets boring. The thrill of hunting mobs, exploring strongholds, or the Nether is often much more satisfying and appeals to the RPG nerd in all of us. Well, Mojang took the hint and as part of the 1.9 release, there will be potions, more mobs, othe ...more

News : The Triangle Shirtwaist Fire

Their were many pedestrians in the scene as,they seen firefighters struggling with the horrifying disaster and they couldn't do much only continue to stare as bodies continued to drop.. Firefighters arrived at the Triangle Shirt Waist Company Fire minutes after the alarm was ...more

News : An Illuminated Glossary of Video Game Genres

Like the press covering film and many other specialized fields, video game journalists use all sorts of jargon to convey to their knowledgable readers as much information about a game as quickly as possible. For non or newbie gamers, this can be extremely confusing. Those of ...more

News : The Consequences of Hacking

Mostly all hackers like to have a laugh. We like to have fun! We like to troll. And maybe, even cause some havoc once in a while. But, while we do this, we must always stay in the line of the law. In the United States (Where I live), the government will get involved in almost ...more

How To : 4 Apps to Help Keep Your Android Device Secure

As of 2016, there are approximately 1.85 billion Android smartphones worldwide. This growing popularity has led to an increasing number hacks and cyber attacks against the OS. Unfortunately, Android users need more protection than what is offered by Google. The good thing is t ...more

How To : The 4 Best Password Managers for Android

Over the years, the internet has become a dangerous place. As its popularity has increased, it has attracted more hackers looking to make a quick buck. However, as our dependency on the web grows, it becomes increasingly difficult to sever all ties. This means we have to prote ...more

How To : Why & When to Evolve Your Pokémon in Pokémon GO

Like previous installments in the Pokémon series, as you progress through Pokémon GO you'll be able to evolve your Pokémon into more-powerful monsters with new and more-damaging attacks. However, unlike older entries in the series, your Pokémon won't simply evolve when they re ...more

How To : Fake Captive Portal with an Android Phone

Have you ever used an open wifi, which after you connect displays a website to enter your credentials to get internet? That website is called captive portal and widely used in airports, hotels, universities etc. Have you ever wondered what would happen if someone would set up ...more

How To : Use Traffic Analysis to Defeat TOR

As was mentioned by the great OTW last week, TOR, aka The Onion Router, has had its integrity attacked by the NSA. In an attempt to reduce the anonymity granted by the service, the NSA has opened a great many nodes of their own. The purpose is presumably to trace the origin of ...more

Prev Page
  • Hot
  • Latest