Greetings my fellow hackers, In the previous article, I discussed briefly about ransomwares and their devastating capabilities. Devastating in a way that ransomwares are not only known to encrypt files but to also lockout some specific functions of the system and hold it up f ...more
MacOS isn't known as an ideal operating system for hacking without customization, but it includes native tools that allow easy control of the Wi-Fi radio for packet sniffing. Changing channels, scanning for access points, and even capturing packets all can be done from the com ...more
Now that we've set up Vuforia in Unity, we can work on the more exciting aspects of making physical objects come to life on the HoloLens. In this guide, we will choose an image (something that you physically have in your home), build our ImageTarget database, and then set up o ...more
Regular backups of your important files are something that should be a top priority, though because of the complexity of most backup systems, regular backups are often overlooked until it is too late. In this video tutorial, you'll learn how to set up automated backups in the ...more
This video will show you how to find hidden or system files on Windows Xp. You’ll want to open up you’re browser, go to tools and from there you can change your folder settings to show any of the files you would like. You can also set you computer to show the extensions of you ...more
Worried about a hard drive failure? Or a virus that destroys your operating system? Well, don't worry… Windows 7 lets you backup and restore your Windows 7 operating system and all of the files and folders you choose. Backup and Restore—improved for Windows 7—creates safety c ...more
Microsoft has invested years and countless man-hours in an effort to get their cloud storage service on par with competitors like Dropbox and Google Drive, who have long resided at the top of this market. Their hard work has definitely paid off, as OneDrive (formerly SkyDrive) ...more
As penetration testers, we sometimes need to securely store customer data for prolonged periods. Bruteforce-resistant, vault-like containers can be created with just a few commands to protect ourselves from physical attacks and unintended data disclosures. The subject of cryp ...more
If you want to create a shortcut in Mac OS X, or if you want to change the default hotkey for a function on your Mac computer, check out this quick tip from Tekzilla. It will help you learn how to access the system preferences on your Mac and gain access to the full list of ke ...more
Adobe Photoshop CS4 is the industry-standard software for perfecting digital images and is ideal for professional photographers, serious amateur photographers, and graphic designers. In this Photoshop CS4 tutorial, you'll learn how to save and set file formats in Adobe Photosh ...more
File associations associate a file extension to a file type. In this Dreamweaver 8 video tutorial you will learn how to set file associations, specify Dreamweaver preferences and boot the right program from Dreamweaver. Make sure to hit "play tutorial" in the top left corner o ...more
A fixed rappel station is an important part of climbing, and there are a lot of ways to make one. This video will show you how to use a two-anchor system with a redundant backup for maximum saftey. It also has a hip-seat rappel with a safety prusik. Go here for more info on t ...more
If you're anything like me, you started down the Android-modding path for two distinct reasons; to run cutting-edge software and squeeze every bit of performance out of your hardware. Utilizing the new F2FS file system on your rooted Nexus 4 or 5 fulfills both of those desires ...more
Our sound system expert shows you exactly how to set up your pa system to achieve great sound. He tells you how to adjust signal flow and dynamic range, how to set up mixers and microphones and where to place speakers for the best sound. He also discusses the best kinds of spe ...more
Check out this instructional climbing video that demonstrates how to set up the ascent system for crevasse self rescue. Hooking up the prussik is the subject of this video and stops at the second ascender required for upward mobility. Watch all the crevasse self rescue series ...more
Whether you're new to Autodesk's popular 3D modeling program or a seasoned graphic artist just interested in better acquainting yourself with the application, you're sure to be well served by this free video tutorial. For more information, including detailed instructions, take ...more
Oftentimes a friend will send you a PDF, MP3 or some other type of document such as a spreadsheet. When you open the file, an application opens. But sometimes it's not the application you wanted to associate with that file. In this video tutorial, you'll learn how to define wh ...more
This Is How to Make A Password In Batch File. Create a Windows password system in a batch file. Click through to watch this video on tricklife.com
A PA system, or public address system, is an electronic amplification system with a mixer, amplifier, loudspeakers, cables, mikes and cords. Learn how to properly set up a PA system with tips from a multimedia technology expert in this free technology video series. Part 1 of 1 ...more
As if the swollen, painful joints of rheumatoid arthritis weren't enough, the disease is the result of our immune system turning against cells of our own body. Ever since this realization, scientists have worked to find the trigger that sets the immune system off. Scientists b ...more
Mark Wallace shows how to set up a pocket wizard system and use mixed lighting for photography.
This video shows you how to set up a mini wireless spy cam. Where you put it is up to you. Who you spy on is up to you. If you're wanting to keep an extra set of eyes on someone, watch and learn. So whether you're looking to put a camera in your bathroom or garage, go for it.
Want to mix and scratch like a professional DJ? To be a good DJ you need to understand the concepts of mixing tracks, adding cool effects, and of course you need a good sense of rhythm to line up the beats. This how to video explains how you can set up a big sound system. This ...more
This video shows you how to set up an active speaker system with a built-in amp. Move the gain up and have it halfway up on the mixer. The actual volume control should be set to 0 prior to moving the gain up and down. Mess around with the gain, and slowly bring the gain up unt ...more
This tutorial shows you how to improve your digital asset management. Once you have recorded your digital audio and video footage, you'll want to import it and edit it as efficiently and quickly as possible. This video shows you the most efficient workflow set up to use.
Home theater systems are all the rage these days. Our expert, Reggie Hayes, will help you decide whether you should buy a ready-to-go theater system or build your own with separate components. He'll also help you create the best surround sound environment by choosing the best ...more
Set up your network storage system with the help from a kind of creepy blonde woman. Great tutorial though. Easy to follow. Set up a nas200 network storage system. Click through to watch this video on linksys.com
In this Episode, you will learn how to set up a seamless looping particle system. We will be using Trapcode Particular and Starglow to create a stylized holiday snowstorm, but the concepts can be adapted for anything from backgrounds to lower 3rds. Creative Cow is a support c ...more
If you're looking for an efficient way to communicate with your online customers or fan base, one way to accomplish this is by setting up a PHP database of people who have signed up with your site, so you can send them email blasts or news updates. Part 1 of 6 - How to Set up ...more
In this video from Creative Tips, you will get expert advice on how to set up a basic stereo system in your home. Nathan will walk you through all the steps and make sure that music and movies flow through your home in perfect pitch.
This video is a tutorial for setting up Native Instruments' Traktor Scratch system. While the setup can seem a bit confusing, with this video's help, you will be able to setup and use your system easily. You should practice setting this system up repeatedly, especially if you ...more
Low budger project? NO budget project? Lighting is a key part of any film, so you don't want to skimp on it. This tutorial shows you how to set up some inexpensive lighting systems when you're filming a documentary or interview.
How to set a graphic EQ on a DJ system. This bit of kit is a bit like the bass, mid and top on your mixer except you don't get 3 knobs to mess about with you get anything from 15 to 30 and up.
This tutorial shows you an easy and fun way to make two sided lapbooks. These tools are ideal for things like language lessons, where you can show different vocabulary words on either side of the book. All you need are some manila file folders and bright colors.
Hello all! In this tutorial, I'd like to show you one way of getting root on OS X. Check out this GitHub page for a recent privilege escalation exploit that was recently discovered. I've tested it and it works on both OS X 10.9 Mavericks and OS X 10.10 Yosemite, but appears to ...more
In this web TV presentation the host is talking about Grub 2. In Grub 2 you can mount an ISO file like a device with the loop back function. In Grub 1 you can use tack tack mem to mount iso files if the files are not fragmented by using the map command. Grub 2 is an applicatio ...more
Welcome back, my nascent hackers! We have spent a lot of time in previous tutorials focused on hacking the ubiquitous Windows systems, but the vast majority of "heavy iron" around the world are Linux or Unix systems. Linux and Unix dominate the world of Internet web servers w ...more
Greetings null-bytians. Firstly, I would like to apologize for the no images thing. I guess I can't upload them. If you have watched the documentary titled "In the Realm of the Hackers", the one about two Australian hackers, Electron and Phoenix, you will know that it was a g ...more
Some apps look great with Dark Mode, and some do not. So when you have system-wide Dark Mode enabled on your iPhone and are using an app that only looks good in Light Mode, you'd normally have to turn the dark appearance off manually, then switch it back on when you leave. But ...more
Welcome back, my novice hackers! My recent tutorials have been focused upon ways to NOT get caught. Some people call this anti-forensics—the ability to not leave evidence that can be tracked to you or your hack by the system administrator or law enforcement. One the most com ...more
Warnings i cant be held responsible for any illegal act done by anyone but myself and there are copyrights so notise that taken the trademarks or copyrights are strigtly prohibeted by law and will be punshied by law and i or my partners cant be held responsible for sudo camma ...more
In my last hack blog on crashing your roommates Win7 system, we started looking at client- side attacks. As promised, we will be looking at some more client-side attacks. As web server and OS’s have become hardened and living behind significant perimeter defenses, hackers hav ...more
Welcome back, my fledgling hackers! Let's continue to expand our knowledge of digital forensics, to provide you the skills necessary to be a digital forensic analyst or investigator, as well make you a better hacker overall. In your attempts to enter a system or network undet ...more
Welcome back, my rookie hackers! Now that nearly everyone and everyplace has a computer, you can use those remote computers for some good old "cloak and dagger" spying. No longer is spying something that only the CIA, NSA, KGB, and other intelligence agencies can do—you can l ...more
OpenBSD implements security in its development in a way that no other operating system on the planet does. Learning to use the Unix-like operating system can help a hacker understand secure development, create better servers, and improve their understanding of the BSD operatin ...more
Welcome back, my fledgling hackers! There's an evil dictator hellbent on destroying the world, and in one of our last hacks, we successfully compromised his computer and saved the world from nuclear annihilation. Then, we covered our tracks so no one would know what we did, a ...more
|Choose Your View: Quick Bullet Points | Detailed Descriptions Android's newest major update is a special one — it's the tenth full version of the world's most commonly used operating system. The latest release, dubbed simply Android 10 (codename Android Q), was first showcas ...more
Welcome back , my fledgling hackers! Lately, I've been focusing more on client-side hacks. While web servers, database servers, and file servers have garnered increased protection, the client-side remains extremely vulnerable, and there is much to teach. This time, we'll look ...more
Hackers often rely on lazy system admins and unpatched vulnerabilities to get access to a host. Keeping intruders off of our machines requires us to update daily, only run the services we need, and read the code, among other things, but we can still make mistakes. Luckily for ...more
Welcome back, my aspiring hackers! Those of you who use Windows in a LAN environment understand that Windows machines can share directories, files, printers, etc. using "shares." This protocol dates back to the 1980s when the then dominant computer firm, IBM, developed a way ...more
Welcome back, my tenderfoot hackers! Recently, Microsoft released a new patch (September 8, 2015) to close another vulnerability in their Windows Vista, 7, 8, and 8.1 operating systems. The vulnerability in question (MS15-100) enabled an attacker to gain remote access to any ...more
There's no doubt iOS 13 has dominated the talk around the Apple community this month. Since the announcement and release of the first developer beta, we iPhone users have had a treasure trove of new features and changes to explore and discuss. Now the fun continues with iOS 13 ...more
Welcome back, my neophyte hackers! In previous tutorials, we learned how to steal system tokens that we could use to access resources, how to use hashdump to pull password hashes from a local system, and how to grab password hashes from a local system and crack them. In each ...more
The internet is constantly under siege by bots searching for vulnerabilities to attack and exploit. While conventional wisdom is to prevent these attacks, there are ways to deliberately lure hackers into a trap in order to spy on them, study their behavior, and capture samples ...more
Kali Linux is established as the go-to operating system for penetration testing, but in its default configuration, it's less than ideal for regular desktop use. While in many scenarios, a live boot or virtual environment can resolve these issues, in some situations, a full ins ...more
With an inconspicuous Android phone and USB flash drive, an attacker can compromise a Windows 10 computer in less than 15 seconds. Once a root shell has been established, long-term persistence to the backdoor can be configured with just two simple commands — all while bypassin ...more
The first developer beta for iOS 13 is available to install on iPhone models, but the process for doing so may be a bumpy ride. Apple has not included configuration profiles for the developer beta yet, and many developers are having issues installing iOS 13 even with macOS 10. ...more
John Hendron demonstrates keyboard shortcuts and the "Sidebar" in Mac OS X Tiger with tips on keeping files organized. This 7.5 minute video includes how to "tell where you are" in the file system, how to set desktop preferences, and how to customize the toolbar in Finder wind ...more
Welcome back, my greenhorn hackers! After the disaster that was Windows Vista and the limited and reluctant adoption of Windows 8 and 8.1, Windows 7 has become the de facto standard operating system on the desktop/client. Although the most valuable information to the hacker ...more
A hacker with privileged access to a Windows 10 computer can configure it to act as a web proxy, which allows the attacker to target devices and services on the network through the compromised computer. The probes and attacks appear to originate from the Windows 10 computer, m ...more