Self Check

How To : Hack Hackademic.RTB1 Machine Part 1

Welcome hackers. Hackacademic.RTB1 is vulnerable machine for training our skills.This machine can be download from free from here. There is many tutorial how to hack these machine but i did always be my self. Step 1: Recognize Open Ports First step is recognize open ports i ...more

News : The 15 Most Viral Costumes for Halloween 2015

If you don't want to dress up as a vampire, witch, werewolf, or zombie again this Halloween, step things up a notch and go viral. There have been a ton of funny memes and absurd news since last October, so the only hard part is settling on the right one for inspiration for you ...more

How To : Don't Have Self-Rising Flour? You Don't Need It!

Many recipes call for self-rising flour as a staple ingredient. Oftentimes, we find ourselves passing these recipes by because we don't have it on hand, or because we don't use it enough to actually want to buy it. Don't Miss: Cook Like a Chef: Use Ratios, Not Recipes Lucki ...more

How To : Pull Off the Smoke Bomb Inside a Candle Prank

The title pretty much speaks for it's self, basically you'll be putting a smoke bomb inside a candle. Obviously you'll be modifying the candle's appearance but make sure you do at good job at disguising the smoke bomb. Next time someone tries to light the candle, they'll be in ...more

How To : 47 Baking Hacks That You Shouldn't Live Without

Right now is that magical time of year when the general public decides to embrace their inner fattie and get baking in the kitchen. Hello, pies and cakes and cookies and everything carbs. Goodbye, diets—see you in the next year, when you cripple us with unbridled guilt and lon ...more

How To : The 4 Best Password Managers for iPhone

Using a strong password is critical to the security of your online accounts. However, according to Dashlane, US users hold an average of 130 different accounts. Memorizing strong passwords for that many accounts is impractical. Fortunately, password managers solve the problem. ...more

ProtonMail 101 : How to Send Self-Destructing Emails

When you're sending sensitive information via email, it's best to do so with end-to-end encryption. Even better, set the email to destroy itself after a set amount of time for a little piece of mind. Sending a self-destructing email message is a cinch in ProtonMail for Androi ...more

News : YouTube Red's First Originals Are Now Streaming

YouTube announced last October some of the original programming it was producing for its YouTube Red subscription service, and the first four originals went live on Wednesday, February 10th. The first four original series are Lazer Team, A Trip to Unicorn Island, Scare PewDie ...more

Compared : The 5 Best Keyboard Apps for Android

Your phone's keyboard is one of the most commonly used apps. Whether you're typing out status updates, sending private messages, or just bombarding everyone in sight with as many emoji as you possibly can, you probably couldn't get by without a good keyboard app. Since Androi ...more

How To : Deal with Acne Bullying & Self Esteem

I want to talk about growing up with burden of acne. I frequently receive comments and private messages about kids being bullied for having acne, this is not right. Everybody is beautiful in their own way and you should never let the haters put you down! Love yourself =) Video ...more

News : Roly-Poly Bridge

Heatherwick Studio's London based rolling bridge is an engineering marvel. Lots of fun, and immensely satisfying to watch (via YouTube, assuming you can't see it in person). From Heatherwick Studio: "Rather than a conventional opening bridge mechanism, consisting of asingle ...more

News : Auto-Unicycle Trumps Segway

Forget the Segway, you don't even have to stand anymore thanks to Honda's U3-X. This self-balancing unicycle relies on an inclinometer instead of gyroscopes to keep the rider balanced. The personal transporter even allows the user to travel forward, back, left, and right thank ...more

News : THE Wilbur Wright of Paper Airplanes

Self proclaimed "Paper Airplane Guy", John Collins, is the master of paper crafted flight. Collins hosts workshops for Corporate America, using the paper airplane as a metaphor for success: "Weaving your corporate message into the stories of how the planes get invented, ties ...more

How To : Audit Web Applications & Servers with Tishna

Penetration-testing frameworks can be incredibly useful since they often streamline certain processes and save time by having a lot of tools available in one place. Of course, the most popular pentesting framework is undoubtedly Metasploit, but there are many others out there ...more

IFTTT 101 : How to Create Custom Applets

IFTTT is a fantastic tool that lets you trigger actions on your smartphone that normally require more advanced hacking. With the help of its friendly user interface, turning your phone into a more personal device has never been easier. However, the app has some more intricate ...more

How to Train Your Python : Part 17, Introduction to Classes

Welcome back everyone! In the last training session we covered basic file input and output. We're going to leave this topic for a bit and start on something that will change the way we write scripts, classes. A class is basically an object. It's something that we can make att ...more

How To : 12 Browser Add-Ons for Reddit Pros

Reddit, the self-proclaimed "front page of the internet," continues to take a big bite of my free time each and every day, as well as millions of its other users'. The clicking and scrolling through page after page never gets old, but you could speed things up with a few brows ...more

How To : Set Up an Eviltwin

When I tried to set up an eviltwin for a MitM-constelation in kali 2.0, I couldn't provide internet to the victim. The origin was the brctl bridging. I have read many tutorials but all of them where explained in backtrack and older versions of kali. So i was searching for a so ...more

How To : Work Less & Get More Accomplished

From our work life to our home life, we have an awful lot of projects, tasks, and activities that require more productivity than play. After working for an entire day in the office, no one wants to face even more that needs to be done at home. However, there's a trick to avoi ...more

How To : Make a Trojan Appear Legitimate

So, we all probably know that when you run a trojan made by Metasploit, nothing will appear to happen. This is a sign for me to immediately check my Task Manager, but for an unsuspecting victim, it will just seem like a broken file. It is likely that they will delete this "bro ...more

  • Hot
  • Latest