Passing Through

News : The Top 10 Must-Have Skyrim Mods

Skyrim really took the cake this year. With its awe-inspiring gameplay, much improved combat and leveling system, and a fresh new look, it's no wonder the game has already received a Game of the Year award. But for hardcore gamers, the fun may be over. You've played the game f ...more

How To : Play Scrabble

Everyone loves Scrabble, but not everyone knows how to play the game properly. Yes, there is a set up rules that come with each game, but who actually wants to read them? Isn't it better to learn from a more visual approach? This video will teach you the basics of gameplay. I ...more

Android Basics : How to View Your Location History

Your smartphone has a GPS chip inside of it that can pinpoint your location down to the nearest 4 meters, and this little device stays in your pocket or purse all day. Combine those two facts and you start to realize that your phone knows exactly where you've been during every ...more

How To : The Specs That Really Count When Buying a Phone

When shopping for a new smartphone, you'll encounter comparisons and spec sheets that are filled to the brim with values like mAh, GB, and GHz. To the average consumer, however, these values are meaningless, so we end up looking at which device has the specs with the highest a ...more

UDP Flooding : How to Kick a Local User Off the Network

Only so much data can be passed through the network and to your computer's networking interfaces. This is limited by the amount of bandwidth you have. The more bandwidth you have, the faster your network connections will be. Not only this, but your transfers will be more paral ...more

Hacker Fundamentals : A Tale of Two Standards

If you read my article on the OSI model, you got a good overview on communications from that model's perspective, but how does that relate to TCP/IP? We're going to take it a step further, getting into the idea behind the two address concept. How does an IP address and a MAC a ...more

How To : 13 Terminal Commands Every Mac User Should Know

When you think of Terminal, you probably imagine some hacker sitting in front of their computer in a dimly lit room trying to break into an FBI database. In reality, it's just a simple tool that can make using your Mac much easier. Now, I'm not saying that learning Terminal c ...more

Minecraft : I'm Going Home

Back in the Super Nintendo days, playing one RPG after the other, memorizing maps and mazes became second nature if you didn't want to look at the mini map or get lost often. I would make it a point to memorize corners and the overall structure of the dungeon or location, so t ...more

How To : Cast on with Work in Progress When Knitting

Ever wonder how to cast on with work in progress when knitting? Well, wonder no more with this knitting demonstration video! There are several ways to accomplish this, but I'm going to show you the one I like best. It's the one I use in the Knitting At Knoon patterns, and I r ...more

How To : Fully Anonymize Kali with Tor, Whonix & PIA VPN

Hacking from a host machine without any form of proxying is reckless for a hacker, and in a penetration test, could lead to an important IP address becoming quickly blacklisted by the target. By routing all traffic over Tor and reducing the threat of malicious entrance and exi ...more

HowTo : Get Rid of the Hair-Down-There

Jezebel has compiled 8 user-posed questions that address not just the hair-down-there, but any and all shaving and waxing concerns. How do I avoid ingrown hairs? How can I remove lip/chin/facial hair without causing blemishes or scarring? How can I get my legs to stay smooth ...more

How To : Make the ultimate F16 paper airplane

Want to make the coolest paper airplane? This tutorial will show you how to make a paper f16 and you'll be flying in under 3 minutes. This passed our cargo test by traveling with an eraser load.

How To : The Best Video Recording Apps for Your iPhone

If you have a modern iPhone, you have an excellent video recorder at your disposal. Every iPhone since the 6S has the ability to shoot in 4K resolution, and each new iteration has brought new capabilities to the table. But even the best mobile shooter can use a little extra he ...more

How To : Pick a normal lock

This video tutorial is for educational purposes only. See how to pick a normal lock with a tension allen wrench and a small screwdriver. "Lock picking is the act of unlocking a lock by analyzing and manipulating the components of the lock device, without the original key. Alt ...more

How To : Access a port-a-cath in nursing

Studying to be a nurse? Then here is a nursing how-to video that teaches you how to access por-a-caths on a patient. Every nurse should know the basics of this technique, follow along and see how easy it is to identify and access port-a-caths on your patient so that they can r ...more

How To : 8 Fun (& Annoying) Easter Eggs in Google Hangouts

Google has added some fun Easter eggs to Hangouts that'll give you a few more ways to procrastinate throughout your day. All of them (except for one) work on the web browser version, the Chrome app, and the mobile apps for Android and iOS, and are activated by sending a specif ...more

How to Hack Wi-Fi : Hunting Down & Cracking WEP Networks

While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and they can be cracked in a matter of minutes. We'll show y ...more

How To : Redeem Gift Card Balances for Cash

I've never understood gift cards. Aside from being severely restricted as to where you can use them, they're also a strange gift, especially if you don't shop at that particular store. Some even have expiration dates and service fees. The biggest problem I have with gift card ...more

How To : Exploit PHP File Inclusion in Web Apps

File inclusion can allow an attacker to view files on a remote host they shouldn't be able to see, and it can even allow the attacker to run code on a target. To demonstrate these vulnerabilities, we'll be practicing PHP file inclusion using the Damn Vulnerable Web App. We'll ...more

  • Hot
  • Latest