Origin

How To : Is Your SD Card Legit? Here's How to Check

In the tech world, it's all too common to slap a fake label and packaging on a lower quality product, especially SD cards. If you've ever bought an SD card on the cheap from a slightly-less-than-reputable source (or even a reputable source, in some cases), how do you know if i ...more

Walkthrough Assassin's Creed 2 : Glyph Puzzle 20

No need to figure out the 20th puzzle, entitled "The Origin of the Species", in Assassin's Creed 2. Here's the answers! Puzzle wheel: Start by turning the fifth ring right ten times, then turn the fourth ring left twice. Then rotate the third (and first) rings right twice, the ...more

The Octopus Conundrum : Octopuses vs. Octopi vs. Octopodes

A couple of days ago, I had some questions regarding the mighty tentacled beast of our oceans— the octopus. Actually, I was just curious as to what an octopus was, and I found the answer, which was a cephalopod mollusk in the order Octopoda. But that's not all I came across. ...more

How To : Inject Coinhive Miners into Public Wi-Fi Hotspots

Coinhive, a JavaScript cryptocurrency miner, was reportedly discovered on the BlackBerry Mobile website. It was placed there by hackers who exploited a vulnerability in the site's e-commerce software that allowed them to anonymously mine cryptocurrency every time the website w ...more

How To : Set Up an Eviltwin

When I tried to set up an eviltwin for a MitM-constelation in kali 2.0, I couldn't provide internet to the victim. The origin was the brctl bridging. I have read many tutorials but all of them where explained in backtrack and older versions of kali. So i was searching for a so ...more

News : Anonymity Networks. Don't use one, use all of them!

Introduction The 3 major anonymity networks on the Internet are Tor/Onionland, I2P and Freenet. If you feel confused on which one is the "best" one to use the answer is simple. Use all three! Each anonymity network is designed for a different specific purpose. One network al ...more

Hacking macOS : How to Hide Payloads Inside Photo Metadata

Complex shell scripts can be implanted into photo metadata and later used to exploit a MacBook. In addition to obfuscating the true nature of an attack, this technique can be used to evade network firewalls as well as vigilant sysadmins. In this attack scenario, a malicious c ...more

How To : Stream PC Games to Your Phone Using AMD Link

It is a great time to be a mobile gamer. Not only are there millions of mobile games on the Play Store and App Store, but thanks to some recent developments, we can also even play PC games. AMD recently released an app, which, among other things, lets you play your favorite PC ...more

How To : Pronounce "faux pas"

Today's word is "faux pas". This is a noun of French origin which means a social slip in etiquette or manners. For example, you can say, "She didn't introduce herself to the host, a terrible faux pas, considering she'd never met her."

News : The All-Natural Secret to Turning Food Purple

Even if you haven't heard of ube (pronounced "OO-beh"), you've probably seen pictures of desserts made with this brilliant purple yam. The ube really does look almost too pretty to be food, doesn't it?. While there is often confusion between sweet potatoes and true yams, the u ...more

News : Syphilis Has Returned with New Drug Resistance

What do Leo Tolstoy (writer), Beethoven (composer), Paul Gaugin (artist), and Adolf Hitler (politician) have in common? They are all considered to have suffered from the sexually transmitted disease syphilis. With the incidence of sexually transmitted infections (STIs) and se ...more

How To : Hack SAML Single Sign-on with Burp Suite

Single sign-on (SSO) lets users login across different sites without having to manage multiple accounts. I'm sure most of us appreciate the convenience of seeing "Sign in with …" buttons that let us login with a single username. Hackers, however, see a possible avenue for expl ...more

How To : Play Apex Legends on Your Phone Right Now

With EA chief executive Andrew Wilson stating the official mobile version of Apex Legends won't arrive until the 2021 fiscal year, fans have to wait at least another year to enjoy their favorite battle royale game on the go. But for those who can't wait, there are ways to play ...more

How To : Dance the Schottische

The Schottische is a partnered country dance, Bohemian in origin. Schottische was popular in Victorian era ballrooms (part of the Bohemian "folk-dance" craze) and left its traces in folk music of countries as distant as France, Spain, Portugal, Italy and Sweden. At the start o ...more

How To : Manipulate User Credentials with a CSRF Attack

Web 2.0 technology has provided a convenient way to post videos online, keep up with old friends on social media, and even bank from the comfort of your web browser. But when applications are poorly designed or incorrectly configured, certain flaws can be exploited. One such f ...more

How To : Send Spam & Spot Fake Emails (Email Spoofing 101)

Spammers are the bane of every email user. No matter what you do, junk mail always breaks through the spam filters. And some of the best ones seem to come from legit companies, and that's because they aren't legit companies— they're spammers masquerading as legit companies. W ...more

How To : Design Your Own Playing Card Sculpture

Download the Software Go to the Antiprism downloads page. Download and install Antiprism 0.20. Run the Programs You need a method of running programs on the command line. In Windows, that could be a DOS box, on other systems a terminal emulator (e.g. xterm). Start this up. ...more

News : The Latest and Greatest Kinect Hacks

Nobody could predict the success of Microsoft's Kinect, not even Microsoft themselves. So, it was quite a surprise when it ended up earning a Guinness World Record for fastest-selling consumer electronics device, and an even bigger surprise to see people buying one that didn't ...more

How To : Use Traffic Analysis to Defeat TOR

As was mentioned by the great OTW last week, TOR, aka The Onion Router, has had its integrity attacked by the NSA. In an attempt to reduce the anonymity granted by the service, the NSA has opened a great many nodes of their own. The purpose is presumably to trace the origin of ...more

How To : Dance the minuet step of three movements

In this video, a man performs a French, Baroque-era (17th Century) style dance, the minuet. A minuet is a social dance of French origin for two people. This video gives a demonstration of minuet combinations.

How To : Setup an Asterisk Server

Over the years, I have enjoyed playing with Asterisk. I have found Asterisk to be extremely powerful and fun to play with. There are several books and many scattered how to articles out there, but most are outdated and the information required to build Asterisk from beginning ...more

How To : Your One-Stop Guide to Secure, Encrypted Messaging

Now that smartphones have ensured that we're connected to the internet 24/7, online privacy has become more important than ever. With data-mining apps hoping to sell your information for targeted ads, and government agencies only one subpoena away from knowing every detail of ...more

How To : Use Rembrandt lighting for images in Photoshop

This Photoshop video series is going to explain how to create a chiaroscuro lighting effect on an image. This art form was made famous by the Italian artist Rembrandt. Part one covers the origin of terms and how to create chiaroscuro dramatic lighting. Part two has instruction ...more

  • Hot
  • Latest