Routing

How To : Exploit Routers on an Unrooted Android Phone

RouterSploit is a powerful exploit framework similar to Metasploit, working to quickly identify and exploit common vulnerabilities in routers. And guess what. It can be run on most Android devices. I initially covered RouterSploit on Kali Linux and macOS (OS X), but this tuto ...more

How To : Seize Control of a Router with RouterSploit

A router is the core of anyone's internet experience, but sadly most people don't spend much time setting up this critical piece of hardware. Old firmware, default passwords, and other configuration issues continue to haunt many organizations. Exploiting the poor, neglected co ...more

How To : Build the motor mount for a CNC router

A CNC router machine is probably the most useful tool a hobbyist can own, but the price for a CNC machine on the market is way more than the average hobbyist is willing to spend. You can build your own CNC with very basic tools, little knowledge of machinery, mechanics, or ele ...more

How To : Use a horizontal router table in woodworking

Eagle Lake Woodworking, hosted by John Nixon, offers great do-it-yourself guides for building your own furniture, especially in the American Arts and Crafts style, and turning your garage into an amateur woodshop. Search Eagle Lake on WonderHowTo for more carpentry tutorial vi ...more

How To : Use a plunge wood router

If you're looking to rout, or hollow, out a length of wood as part of a DIY project, you'll need a wood router. In this handy tutorial, Darren Baensch reviews the three basic principles while walking you through a cut. Watch this video and learn the basics of plunge routing. U ...more

How To : Map a walking route with MapMyWalks on Android

Take walks for exercise, to roam around your neighborhood, or just to get outside? Want to know how far you walked? Well, it's easy to do with MapMyWalks and Google Maps! One of the salient advantages of a Google Android smartphone over, say, an Apple iPhone, is the inherent e ...more

How To : Route cables for a DICE iPod kit in a BMW X5

Bavarian Soundwerks teaches you how to route the cables for your DICE iPod kit into a BMW X5. Part 1 of 2 - How to Route cables for a DICE iPod kit in a BMW X5. Part 2 of 2 - How to Route cables for a DICE iPod kit in a BMW X5.

How To : Make the y-axis motor mount for a CNC router

A CNC router machine is probably the most useful tool a hobbyist can own, but the price for a CNC machine on the market is way more than the average hobbyist is willing to spend. You can build your own CNC with very basic tools, little knowledge of machinery, mechanics, or ele ...more

How To : Route FX using StudioLive

In this video, we learn how about routing FX using the StudioLive with Brandon Hays. To recall an effect, select the effect button and then page down to gt the list of effects for A and B. Once it's been selected, hit the recall button and then find the mono delay for the voca ...more

How to Walkthrough Bayonetta : Ch. 8 - Route 666

Complete five verses in this level of the Xbox 360 game Bayonetta. In Chapter 8 - Route 666, prepare for some hard battles. The first verse fight takes place on the back of a moving truck. There are two enemies with health bars on the same truck where you start. On other nearb ...more

How To : Prevent tear-out while routing

Shopsmith Academy shows you how to prevent tear-out and practice good shop safety while routing. Apply this lesson to your next woodworking project. Watch this video for useful woodworking tips. Search Shopsmith Academy on WonderHowTo for more woodworking videos.

How To : Set up and route drums for hip hop in Reason 3

Learn some tips on setting up your drums and routing them, also we'll talk about some workflow tips and organization for creating hip hop music in Reason 3. Part 1 of 2 - How to Set up and route drums for hip hop in Reason 3. Part 2 of 2 - How to Set up and route drums for hi ...more

How To : Use decoy routes & blocking in football

Learn about decoy routes and blocking with expert tips and advice from a former professional football player in this free online American football video series. Part 1 of 10 - How to Use decoy routes & blocking in football. Use decoy routes & blocking in football - Part 2 of 1 ...more

How To : Set up a secure wireless router

In order to set up a secure wireless router, you will need to use the security that is available with your wireless routing. You will need to change the default ID names and password on your computer. Try to make sure that your passwords are difficult. Also, turn on the encryp ...more

How To : Use a Katana flush router bit for woodworking

Eagle Lake Woodworking, hosted by John Nixon, offers great do-it-yourself guides for building your own furniture, especially in the American Arts and Crafts style, and turning your garage into an amateur woodshop. Search Eagle Lake on WonderHowTo for more carpentry tutorial vi ...more

Waze 101 : How to Avoid Toll Routes

Discovering you're on a route filled with tolls while you're already on the road, with no cash on hand, is never a pleasant surprise. Fortunately, Waze has an incredibly simple solution to nip this potential headache in the bud and save you money while navigating. Best of all ...more

How To : Change your driving route to save money and gas

Saving money on fuel is as simple as checking your route. We show you which types of road to avoid and how to beat the traffic. 1. Plan your route Look for the easiest and shortest routes before setting off. A quick map check could save you money on fuel if you’re reaching th ...more

How To : Trace Any IP Address

Using a simple trace trick, you can easily look up the IP address and its location for any website. This method uses a command line command to first find the IP address of a given website, and then uses a free online tool to get that IP's location. Don't Miss: Tips & Tricks f ...more

How To : Pull the Porn Star Toilet Prank

Looking for a great practical joke to pull on your friends? Then watch this joke how-to video to learn how pull the porn star toilet prank. Follow the step by step prank instructions to rig your toilet to dump water on a seated user by re-routing the water tube. This is a grea ...more

How To : Hack LAN passwords with Ettercap

Want to hack a LAN? Well, hacking local area networks is easier than you'd think. And by watching a few short videos, you can become a master hacker, something every techie wants to achieve. And what's the best way to hack a LAN? Ettercap, a password sniffing program. The pro ...more

Tor vs. I2P : The Great Onion Debate

In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and m ...more

SPLOIT : How to Make a Proxy Server in Python

NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! Hello Guys, Welcome to my tutorial and in this tutorial, We are basically going to create a python script that serves as a proxy server ( Without External ...more

How To : Enable Stereo Sound on Your Nexus 5

At $349 off contract, the Nexus 5 has always been one of the best bang-for-your-buck smartphones on the market. In order to keep the price that low, however, Google had to pass up on some of the minor features that other flagship phones offer. Stereo sound, for instance, is b ...more

How To : Enable True Stereo Sound on Your Galaxy S5

With all of the top-notch specs that the Galaxy S5 sports, the only minor quibble users have had with its hardware is the speaker situation. A front-facing earpiece is used for phone calls, but all other media is restricted to a single rear-firing speaker. Developer langeveld ...more

How To : Use Tortunnel to Quickly Encrypt Internet Traffic

Encryped traffic and tunneling is a must when away from home to keep you and your information safe. SSH tunnels can be slow, and are heavily encrypted. VPNs are an all port solution, and proxies are just not what we need in most cases. Then, there is Tor. Tor runs your traffi ...more

How To : Detect hackers with netstat

Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is available on Unix, Unix-like, and Windows NT-based operating systems. This video tutorial pre ...more

News : Anonymity Networks. Don't use one, use all of them!

Introduction The 3 major anonymity networks on the Internet are Tor/Onionland, I2P and Freenet. If you feel confused on which one is the "best" one to use the answer is simple. Use all three! Each anonymity network is designed for a different specific purpose. One network al ...more

Build a Home Arcade Machine : Part 1

Remember the arcades? Were you saddened when they closed up one by one, leaving no outlet to actually go out and socialize while you played video games? With all the home consoles and internet connectivity, gaming has evolved, but the social factor has been eliminated. Sure we ...more

How To : Use Traffic Analysis to Defeat TOR

As was mentioned by the great OTW last week, TOR, aka The Onion Router, has had its integrity attacked by the NSA. In an attempt to reduce the anonymity granted by the service, the NSA has opened a great many nodes of their own. The purpose is presumably to trace the origin of ...more

How To : See who is connected to a computer with netstat

Want to see whether your PC is being accessed by hackers? Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is available on Unix, Unix-like, and W ...more

How To : Fully Anonymize Kali with Tor, Whonix & PIA VPN

Hacking from a host machine without any form of proxying is reckless for a hacker, and in a penetration test, could lead to an important IP address becoming quickly blacklisted by the target. By routing all traffic over Tor and reducing the threat of malicious entrance and exi ...more

How To : Hide your IP address using IP Hider 4.0

IP Hider masks the real IP of a user, allowing him to browse all kind of pages without ever worrying that the ISPs or any other marketing tool is monitoring your surfing habits or spammers are attacking your computer. The simplest way to do this is to have traffic redirected t ...more

How To : Turbo Ping Sweeping with Python

Why did I write this when they're tons of scanning tools available. Let's start with a real world situation. I sometimes visit clients sites that I need to obtain a usable IP address for a server or whatever. Believe it or not, they are networks that are configured with class ...more

Prev Page
  • Hot
  • Latest