Potential

How To : Dump a MacOS User's Chrome Passwords with EvilOSX

Barrow's article on Pupy made me wish for a RAT that could target an OS frequently used by gatekeepers at startups, tech companies, and creative firms: macOS. Once run, a RAT can do severe damage by dumping a user's stored credentials for many accounts. The best loot lives in ...more

Protect Your Facebook Profile : 10 Ways to Increase Privacy

Don't want one of your Facebook "friends" knowing your status updates? Prefer to keep a few of those "friends" out of your photo albums? Would you like to prevent a few "friends" from accessing your address? The simple answer would be to remove all of those so-called friends— ...more

Vidify : The Best Automatic Video Editor App for the iPhone

There’s a race on to see who'll be the Instagram of moving pictures. This makes sense, since many of our phones are clogged with video that, so far, no one is going to see. Wouldn’t it be great if there were a simple app that could take our video content, edit it for us, and t ...more

How To : Tie braided line to leader

A recent trend in freshwater fishing is adding a fluorocarbon leader to your braided fishing line. The benefits of this are mainly allowing for some more absorbtion of pull, resulting in less twist and potential tangling. This how-to will show you how to tie this knot yourself ...more

How To : Make a military-style night vision goggles prop

Night vision goggles are one of the iconic pieces of equipment of the modern military. Getting a real pair is prohibitively expensive, especially if you just want to use it as a prop in your film instead of actually seeing at night. This video features instructions for making ...more

Real Brain Food : What Geniuses Actually Eat, Part 2

If you've already read the first part exploring what geniuses actually eat as opposed to what the rest of us are told to eat for brain health, you've noticed that there are some big discrepancies. Instead of favoring healthy, wholesome foods high in antioxidants, lots of high- ...more

News : Squid Ink Is the New Black

I have a thing for black foods, whether it's mysterious, lovely black garlic (the secret to its color: fermentation) or adding charcoal powder with its reputed health benefits to cookies, cakes, and breads. Now add one more ingredient to the list: squid ink. It goes by many o ...more

How To : Enumerate MySQL Databases with Metasploit

It's been said time and time again: reconnaissance is perhaps the most critical phase of an attack. It's especially important when preparing an attack against a database since one wrong move can destroy every last bit of data, which usually isn't the desired outcome. Metasploi ...more

News : Electrocute an Innocent Pickle

MIT scientist explains OLEDs by electrocuting a pickle. From Gizmodo: "...Electrons pass through the pickle (or any other active organic matter) and charge the substance. When positive and negative charges collide, they release a photon (light). This pickle represents just o ...more

How To : Tips and tricks for claw machines

This guy is a master at claw machines! Check out this video to see some tips and tricks to maximize your winning potential for claw machines found in most arcades and other venues. This video covers all topics, from winning prizes to a weak claw, or a claw with a short string. ...more

How To : The 4 Best Password Managers for iPhone

Using a strong password is critical to the security of your online accounts. However, according to Dashlane, US users hold an average of 130 different accounts. Memorizing strong passwords for that many accounts is impractical. Fortunately, password managers solve the problem. ...more

How To : Turn pennies into silver and gold coins with zinc

One of the most famous and repeated chemistry experiments involves money. Some would say this is more of a trick than an experiment, but you can be the judge of that. No one can just turn pennies into silver or gold coins, but someone with a few chemicals can. So, if you want ...more

Exploiting XSS with BeEF : Part 1

BeEF is an XSS-exploiting framework that lets you "hook" or gain control of victim web browsers. In this part of XSS exploitation, we will be working on finding an XSS-vulnerable website. We can simply do this by Google Dorking. How It Works XSS is caused when a website "ref ...more

News : The Many Wonders of Black Garlic

Garlic: almost every cuisine in the world considers it a staple, and for good reason. Its pungent flavor gives depth and character to food. Dishes made without it seem bland and forgettable. And on top of all that, it's been studied for its potential anti-cancer properties (an ...more

How To : Cross Site Scripting (XSS) Basics

Hello everybody Joe here. Today I will be demonstrating how you can find XSS vulnerabilities in a website and what you can do with them Step 1: What Exactly Is XSS? Basically, cross site scripting is a type of security hole in a website's forms. Normally forms allow you to i ...more

How To : Make an acetylene explosion

A demonstration of the explosive potential of even a small amount of acetylene mixed with the right amount of oxygen. Watch to learn how to do this yourself. Make sure to wear goggles and stand at a safe distance when making your own acetylene explosion.

How To : Why & When to Evolve Your Pokémon in Pokémon GO

Like previous installments in the Pokémon series, as you progress through Pokémon GO you'll be able to evolve your Pokémon into more-powerful monsters with new and more-damaging attacks. However, unlike older entries in the series, your Pokémon won't simply evolve when they re ...more

Build a Home Arcade Machine : Part 1

Remember the arcades? Were you saddened when they closed up one by one, leaving no outlet to actually go out and socialize while you played video games? With all the home consoles and internet connectivity, gaming has evolved, but the social factor has been eliminated. Sure we ...more

How To : Understand & Use IPv4 to Navigate a Network

You may not know it, but the IPv4 address of your computer contains tons of useful information about whatever Wi-Fi network you're on. By knowing what your IPv4 address and subnet mask are telling you, you can easily scan the whole network range, locate the router, and discove ...more

How To : Be a Navy SEAL

There's no doubt about it—the most elite military force in the United States is hands down, the Navy SEALs. They can operate at sea, in the air and on land, and their ability to conduct missions underwater separates them from most other military units in the world. They've fou ...more

  • Hot
  • Latest