You may not know him by name, but Eric Leebow is the man we can all thank for inventing social networking. At least, that's what he thinks. Leebow is the man behind FreezeCrowd, a new website that's described as an interactive "college yearbook" with photo tagging and friends ...more
In the wake of the NSA controversy and its subsequent fallout, many dashed towards finding means of secure communication—using private internet browsing and encrypted text messaging applications—out of fear of being spied on. While the NSA's incredibly sophisticated surveilla ...more
Whether you are sharing an internet connection, working together or just playing group video games, you will need to network your computers. Check out this tutorial and learn just how easy it is to create a home network. You Will Need: * A broadband internet connection * A rou ...more
The iPhone and a computer are almost exactly the same thing, minus the size and how much more information a computer can hold. So why wouldn't they be able to help one another? In this video you'll see just that when you find out how to map a network drive from a Windows Vista ...more
In this episode we demonstrate how to sniff Voice Over IP (VOIP) conversations, which basically means how to tap an Internet phone.
With the globally rampant use of such social networking platforms as Facebook, Twitter, and Foursquare, the issue of privacy has become a prevalent concern for many. And for good reason—there's the violation of Facebook employing user names in ads, the Etsy slip-up, and of cou ...more
Since the days of Friendster and MySpace, social media platforms have taken leaps forward, revolutionizing how we live our lives by changing the way we communicate with others. Not only has social media become a catalyst for major uprisings around the world, but on a personal ...more
If you want to carry a variety of network adapters without looking suspicious, a perfect solution is accessing them through Airserv-ng. Tucked away in the Aircrack-ng suite, this tool allows a hacker to plug any number of network adapters into a Raspberry Pi and access them ov ...more
With a tiny computer, hackers can see every website you visit, exploit services on the network, and break into your Wi-Fi router's gateway to manipulate sensitive settings. These attacks can be performed from anywhere once the attacker's computer has been connected to the rout ...more
Norwegian designers Timo Armall, Jørn Knutsen, and Einar Sneve Martinussen visually capture invisible WiFi signals by light painting signal strength in long-exposure photographs. The trio set up a four-meter long WiFi-detecting rod with 80 LED bulbs to depict cross-sections th ...more
In this tutorial, we learn how to map network driers from a remote server. First, go to run on your start menu, then type in the id address or server name for what you want to access and press enter. Now, right click on the folder you want to map and click on map network drive ...more
If you hit the FN + F10 keys on your Nokia Booklet 3G, you'll see the available internet connections methods for your netbook including Bluetooth, wifi, and 3G. If you have a SIM card inserted into the computer with an active 3G connection, you can use this interface to provi ...more
A long-standing request for the iPhone has been a way to quickly browse and connect to available Wi-Fi networks and Bluetooth devices without having to dig through the Settings app. With iOS 13, Apple has finally built this essential feature into Control Center, giving you qui ...more
Linux comes with a powerful built-in firewall, although the interface can be a little intimidating. With this multipart GNU/Linux networking video tutorial, you'll master basic and not-so-basic IPTables functionality and create the perfect firewall for your home network. For d ...more
A macOS computer can reveal a lot of information about the owner, including which Wi-Fi network they have permission to access. With an Arduino-based attack, we'll use a five-dollar setup to inject a rogue Wi-Fi network and steal the list of trusted Wi-Fi networks, allowing us ...more
Network enumeration is one of the essential phases of an attack, but it can take a lot of time and effort depending on the size. We've all been spoiled by Nmap and similar tools, and while there is a learning curve involved, they are extremely useful. But there's also GoScan, ...more
Learn how to change your wireless network name on Verizon's FiOS Router. You'll see the easy steps on how to change your wireless network name and / or password for your MI424WR Verizon FiOS Router, manufactured by Actiontec Electronics, Inc.
How to use Cain & Abel software to intercept passwords from an unsecured network. Intercept network passwords with Cain & Abel. Click through to watch this video on tricklife.com
In this tutorial, we learn how to detect all computers connected to your Wi-Fi network. To begin, go to the website, http://msdn.microsoft.com/en-gb/netframework/aa569263.aspx. Once you are on this site, download and install the program. Once it's installed, open the program a ...more
As Google+ hums along, releasing new updates and unveiling new features every few days, Facebook seems to be in panic mode. Every week, they've been revealing new features that seem suspiciously similar to Google+. Facebook Updates Makes Facebook Look a Lot Like Google+ Let' ...more
You're sitting in your favorite café enjoying a hot cup of joe, then you open up your laptop or turn on your tablet computer to get to work, but as always you get sidetracked and head straight for Facebook. Someone just tagged you in a photo, so you check it out, then you see ...more
So you know how to setup a network in your home, but how do you go wireless? The Lab Rats, Andy Walker and Sean Carruthers show you how to setup a wireless (WIFI) network.
First you have to install program, called 'Cain and Abel'. Then, you will be automatically asked to install 'Win Pcap' and you should do that. After installation you have to click on 'Cain and Abel' program icon with right mouse button and start it as administrator. Then push ...more
A network security tutorial on using ping and tracert to show th IP of a webserver, your own IP, your ISP's IP, who they connect to, and what computers your request goes through before reaching a destination.
5G is here. Well, not everywhere. All three wireless carriers have turned on their 5G networks, but only in select markets. Like 4G, each carrier is doing things a bit differently, which means your 5G experience will not be the same across the board. With the 5G rollout being ...more
It seems like the EU is currently in the works of making "the production or sale of devices such as computer programs designed for cyber-attacks" illegal. So, if you're a network admin that uses WireShark or Metasploit, you better watch out! If you want to help combat this pr ...more
Many social networks have become a part of our daily routine. Checking Facebook or sending out a Tweet are things millions of people do every single day. So, one would think that having a great app offering for Windows 8 would be a no-brainer. But, and this is a huge but, ther ...more
This how-to is aimed at the uncynical, bright-eyed outsider who wants to become a television producer…the talented person who believes he or she has the ‘it’ to crack Hollywood. The ‘Sammy’ who just arrived in 90210. Hollywood is a land of dreams and riches. It is true that n ...more
This tutorial video will show you how to connect a wifi network in your Samsung Galaxy S5. This is very easy to employ. So please watch the video. Follow all the steps to do it yourself in your Samsung Galaxy S5 phone and enjoy a wifi environment. Video: .
This video will show you how to set up a connection with wifi network in your Samsung Galaxy S5. So please watch the video and follow all the steps carefully. Employ the technique in your Samsung Galaxy S5 phone and enjoy a wifi environment. Video: .
Hello y'all! I apologize if this question has been solved somewhere else, but I have looked around on Google, Yahoo, and Null Byte and have not been able to find any working solutions. I've been trying to set up my first ever virtualbox guest (Kali Linux 2.0), but I'm having ...more
Hello ladies and gentlemen, I'm back with another informative(hopefully) article for you all. Once again I would like to apologize for my absence for about a week or so. I have some stuff going on with my life and university and I haven't found enough time to make a fully in-d ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to turn a Fo ...more
Wireless can be a pain sometimes with video games on the Internet, with disconnections and signal losses, but why not revert back to a wired connection? This video will explain how to connect your Nintendo Wii to a wired network using Actiontec Powerline Networking technology. ...more
The Sony Dash is similar to an iPad and works like a PC without a keyboard. In this tutorial, learn how to connect your Dash to your home wireless Internet network so that you can go online and download updates. This clip comes straight from the pros at Sony and tells you ever ...more
InfoWorld has some expertise advice for the new Windows 7 operating system from Microsoft. Now that Microsoft has made the Windows 7 beta available for public download, many people are trying to figure out what's new and different. And many others not willing to risk their PC ...more
Social networks like Facebook and Google+ are great for staying connected with family, friends and coworkers—even fans. But sharing and communicating with practically anyone in the digital realm has alienated us from most of the flesh-and-blood beings we see everyday—our neigh ...more
In this clip, you'll learn how to use the VSN plug-in to encrypt email in Microsoft Outlook. It's easy! So easy, in fact, that this helpful how-to can present a complete overview of the app in just over five minutes. For more information, including detailed, step-by-step instr ...more
The Lab Rats, Andy Walker and Sean Carruthers, explain Media Access Control (MAC) addresses. Filtering MAC addresses allow you to very specifically control access to your wireless network.
Have an Xbox or Xbox 360 that you want to connect to the Internet and a notebook PC? With this gamer's guide, you'll learn how to connect an Xbox to Xbox Live via your laptop's wireless Internet connection — foregoing expensive wireless adapters. For complete instructions, wat ...more
If you need to use a file or two on your work computer from your home PC, Remote Desktop in Windows 7 makes it completely possible. You're no matter limited to laptops and flash drives. This video form Microsoft shows you the overall use of Remote Desktop. Remote Desktop conn ...more
This video shows you the method to find if someone else is using your Internet connection. There are two methods for this. The first method involves opening the start menu and click on 'Run'. Type cmd in the text box which opens as a result of clicking on 'Run'. Type NET VIEW ...more
How to get a Japanese PSN account to download Japanese games to your PS3.
In this Food Network tutorial, learn how to make a tasty veggie for your next party or get together. Zucchini au gratin makes a perfect savory meal for any occasion. Ina Garten (The Barefoot Contessa) will show you exactly how to make them so that you have everyone licking the ...more
Most of you are familiar with using Ettercap for attacking systems, but what about using it to find attackers? This tutorial will cover using Ettercap to find people sniffing on your network. The plug-ins we will be using are search_promisc, arp_cop and scan_poisoner. Have fun ...more
Welcome back my networking geeks. In this part we are going to keep discussing about IP Addressing and I hope after you finish reading it you will become an IP wizzard. So in the last tutorial we did what we did without the use of our default gateway. To be honest, in really ...more
Google Reader is ostensibly just an RSS aggregator, a tool that lets you catch up on your favorite blogs. How could Google have anticipated that getting rid of its social features could have angered so many people who were actually using it as their default social network, and ...more
Stay secure on public wireless networks by making your own FREE virtual private network (VPN). This tutorial shows you how to set up an OpenVPN server and connect to it from your laptop. Video: . Links used in this video: http://www.openvpn.net http://tinkernut.com/wiki/page/E ...more
Most of the home wireless networks are not set up by professionals and hence they might lack in security features. People just set up the wireless networks by connecting the devices and powering them up and never care to apply security settings to the network. This may result ...more
If you want to connect your Mac notebook or desktop to a wireless network, you'll need to set up the wifi connection on your computer first. Take a look at this walkthrough to find out how to find and connect to available wireless networks in OS X. This is a great skill to kno ...more
Learn how to force your BlackBerry Pearl 3G to connect to a specific wireless (Wi-Fi) network. This clip will show you how it's done. Whether you're the proud owner of a BlackBerry smartphone or are merely considering picking one up, you're sure to be well served by this video ...more
How to send pop-up messages to friends on a local Windows NT network. Send pop-up messages to friends on a Windows network. Click through to watch this video on tricklife.com
I've struggled for a long time trying to set up a virtual network between my KVM virtual machines. I tried several forums and tutorials on the web, but still on my system it just wouldn't work. I eventually got it owrking, so I've decided to make some notes of my own. Hopefull ...more
This video includes instructions on how to get your PlayStation Portable (PSP) onto the BGSU wireless network. Set-up Your Connection 1. Go to Network Settings under the PSP settings menu. 2. Select the "Infrastructure Mode" and press X. 3. Under "Select a connection to edit ...more
Verizon Wireless has a data cap on the 4G LTE connection that the Motorola Droid Bionic uses to connect to the internet and download information from its apps. If you want to stop your phone from hitting these caps and causing you overage fees, you can turn off the 4G connecti ...more
The research team at Google has found yet another way for machine learning to simplify time-intensive tasks, and this one could eventually facilitate Star Wars-like holographic video. In a recent blog post, Google researchers demonstrated how a neural network is able to separ ...more
No wireless router? There is a way to network your computers by using your existing power-line. This CNET video will show you how to set up a power-line network - it's not as sexy as a wireless network, but it's easy and reliable!
Not 100% familiar with all the awesome features that make facebook a great storytelling medium? Check out this instructive how-to video from the cast. Setup a Facebook profile to expand your network and keep in touch with friends and family. Check out this official video on u ...more
Learn how to discover and connect to close-by wireless (Wi-Fi) networks on your BlackBerry Pearl 3G. This clip will show you how it's done. Whether you're the proud owner of a BlackBerry smartphone or are merely considering picking one up, you're sure to be well served by this ...more
In this video tutorial, we learn how about the basics of setting up a simple wired network. It's easy. So easy, in fact, that this home-computing how-to from the folks at CNET can present a complete overview of the process in just over two minutes. For more information, includ ...more