Want to create an explosion behind your subject? With After Effects, it's easy. Whether you're new to Adobe's popular motion graphics and compositing software or a seasoned video professional just looking to better acquaint yourself with the program and its various features an ...more
How to attack from someone's guard (you in the mount position) in Jiu Jitsu using the heel hook technique.
This video details how to survive a knife threat from behind. When threatened from behind with a knife, do not attempt to move the body first, this will result in the attacker maintaining the capability to thrust the knife into the body. When threatened, place arms out and low ...more
Help Someone Having a Panic Attack. We show the best measures to take to relieve someone suffering a panic attack. Come to the support of friends, family, and other members of the community. Help someone having a panic attack. Click through to watch this video on videojug.com
Industrial espionage, social engineering and no-tech hacking are all very real and there are simple precautions that you can take to protect yourself, which this article will discuss. Whether you are a high-profile businessman or a housewife (or husband), keeping information y ...more
I have had a lot of people ask me, "How does my neighbor keep getting into my wireless?!". Chances are, these people are all using WEP, a deprecated wireless encryption protocol. Either that, or you are using one weak WPA passphrase. If someone can access your wireless networ ...more
Android has several features built into the platform that improve user experience but require extra attention to prevent a security breach. By modifying these settings, you can drastically reduce the possibility of someone exploiting your device or intercepting information. B ...more
What if you could easily visualize which access point every Wi-Fi device nearby is connected to in a matter of seconds? While programs like Airodump-ng can intercept this wireless information, making it easy for hackers to use and understand is another challenge. Fortunately, ...more
Canary tokens are customizable tracking links useful for learning about who is clicking on a link and where it's being shared. Thanks to the way many apps fetch a URL preview for links shared in private chats, canary tokens can even phone home when someone checks a private cha ...more
This is the first of a multi-part series on steganography techniques. Steganography, the art of hiding things in plain sight, has existed for a long time, and in many forms. When you manipulate the alphabet to have your own cipher and decipher, this is considered steganography ...more
Baidu Inc, the "Chinese Google" search engine and technology company, which has been actively pursuing self-driving cars, reported that a gang of hackers recently attempted to steal its driverless car technology. The company, based in Beijing, has since beefed up its cybersec ...more
With a cheap computer, smaller than the Raspberry Pi, an attacker can create a remote hacking device. The device can be attached to a target router without anyone's knowledge and enable the hacker to perform a variety of network-based attacks from anywhere in the world. As th ...more
We share links on an almost daily basis, usually not even thinking twice about it. Whether you're sending a funny cat video to your sister, or letting your coworker know where to go to download relevant files, there are plenty of reasons you might be giving someone a URL. But ...more
If you want to keep your online world secure, your best bet is to have a different password for every site and service that you use, and to make sure each of the passwords are comprised of random characters instead of familiar words or numbers. But this obviously creates a pro ...more
To become a tried-and-true Pokémon master in Pokémon GO, there's an incredibly important decision that needs your attention: Team Instinct, Team Mystic, or Team Valor? We know—it's a tough choice to make, especially when you can't change teams without creating an entirely new ...more
Fighting fire with fire, scientists are harnessing the adaptability of helpful microbes to challenge the adaptability of deadly microbes. What are we talking about? Hunting with phages — viruses that attack and kill bacteria. Bacteriophages are small, skeletal viruses that at ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. More amazing community contributions this w ...more
Welcome back, my budding hackers! People often ask me, "Why are you training hackers? Isn't that illegal?" Although I usually give them a short version of this post, there are MANY reasons why YOU should be studying hacking. Before I begin, I want to re-emphasize to all of y ...more
Good day to everyone, today I will present some basic and advanced concepts that targets sophisticated attacks on the social basis, also I will write about some steps that can prevent this attacks from occuring, basically we will examine Social Engineering from the angle of at ...more
The misconception that macOS is more secure than the Windows operating system is far from the truth. With just one small command, a hacker can completely take over a MacBook and control it remotely. The sheer volume of Windows computers currently in operation around the world ...more
A remote administration tool, or RAT, is a piece of software used for remotely controlling machines. They are commonly used by tech support to gain remote access for troubleshooting purposes, but RATs are also an important part of a hacker's advanced persistent threat (APT) to ...more
While password cracking and WPS setup PIN attacks get a lot of attention, social engineering attacks are by far the fastest way of obtaining a Wi-Fi password. One of the most potent Wi-Fi social engineering attacks is Wifiphisher, a tool that blocks the internet until desperat ...more
In October of 2017, Mathy Vanhoef released "Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2." This paper demonstrates a way to decrypt traffic on practically any WPA2 network, the most commonly used form of wireless security (seeing as all other forms of Wi-Fi encrypti ...more
So you want to know what that person who is always on their phone is up to? If you're on the same Wi-Fi network, it's as simple as opening Wireshark and configuring a few settings. We'll use the tool to decrypt WPA2 network traffic so we can spy on which applications a phone i ...more
Before attacking any website, a hacker or penetration tester will first compile a list of target surfaces. After they've used some good recon and found the right places to point their scope at, they'll use a web server scanning tool such as Nikto for hunting down vulnerabiliti ...more
If you don't want to dress up as a vampire, witch, werewolf, or zombie again this Halloween, step things up a notch and go viral. There have been a ton of funny memes and absurd news since last October, so the only hard part is settling on the right one for inspiration for you ...more
Google Calendar is a cornerstone of the Google Suite, perhaps second only to Gmail itself. Whereas email is constantly plagued by phishing attacks, as of yet, the calendar is a relatively untapped social engineering attack vector. But it's relatively easy for an attacker to in ...more
It's easy to have your password stolen. Important people like executives, government workers, journalists, and activists face sophisticated phishing attacks to compromise their online accounts, often targeting Google account credentials. To reduce this risk, Google created the ...more
Dragon Age 2 is the latest fantasy RPG from the folks at Bioware, and if you're watching this video you've probably either just gotten it or are thinking about it. Check out the vid for a walkthrough of the prologue quest, Destruction of Lothering. From the Creator: 1. There ...more
'Wayward Son' is a main story quest about halfway through Act 1 of Dragon Age 2, in which you are called upon to, big surprise, help a mother and son in need. This video series will give you a walkthrough of the entire quest, allowing you to complete it yourself and also makin ...more
Prevent indoor lighting problems with these great tips. -When a window is behind the object, bring lights closer to object or use a reflector using the light from the window to create a 3 point lighting effect. -To conceal someone's identity, eliminate all lighting and use a ...more
Disabling your opponents legs is the fastest way to make sure that you can get away from a fight situation without killing your opponent. Attacking the pressure points associated with the large blood vessels and nerves in the legs is an effective way to do that. This two-part ...more
have a port-a-pot on a fork-lift. Hide the forklift behind the port-o-pot for the time being. When someone (probably England) goes to shit, use duct tape to tape around the door locking them in the port-a-pot. Then, forklift the port-a-pot onto a truck bed and drive down the h ...more
After 12 years Starcraft 2 is finally here to blow your mind. If you're looking for help with the game, you've come to the right place. We have tons of videos about how to do just about everything in the game. We have strategies for winning campaign and multiplayer games. We h ...more
Want a free meal at McDonald's restaurant? Forget those money-saving (supposedly) weekly coupons, that's nothing compared to an actual free meal. Coupons won't get you that. But this method of free food, perfect for the freegan or the poor (or maybe just the rude). This would ...more
To get the Guerilla Tactics achievement / trophy in Bulletstorm, you must execute 25 skillshots in a single Echoes map. Skillshots are the most fun part Bulletstorm. This video will give you a handy step-by-step guide to getting the achievement in Collapsed Building. From the ...more
This is the #1 Self Defense Technique for Women's Self Defense or for anyone for that matter. Even with over 20 years of martial arts training I myself would use this technique because it is by far the most effective and delivers the outcome we want ,which is to be released or ...more
Draw someone from behind who has muscular arms! Arms look different from the back than they do the front, and this video tutorial goes over in detail how you can accurately draw arm muscles from the back point of view.
The video describes an easy way to survive an attack from someone in the street. When the assailant grabs your, your first reaction should be to guard against their initial blow. Then, punch them in the groin, grab them around there neck in a sleeper hold type move using your ...more
Subject enters a typical office where someone familiar is sitting behind a desk across from the door. Everything in the room is fixed to the floor or walls and the person behind the desk is secretly strapped into the desk chair. As the subject approaches the desk to sit down i ...more
SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, w ...more
I've heard blind people have heightened senses, but I never imagined it could translate to such superb soccer footwork. As you watch below, remember this- all players are legally blind except for the goalie. *For a full description of how the game works, scroll down. Via Wire ...more
Ever wanted to know how to disable an attacker? The trick to getting away from an assailant – even one who's bigger and stronger than you are – is to hit 'em where it hurts. You Will Need: • Knowledge of the human anatomy • Bravery • A self-defense course (optional) Step ...more
This very informative safety video, was intended to teach you the importance of using a forklift correctly when there are others walking. Just like cars, forklifts can be dangerous weapons when someone who is irresponsible or not paying attention is behind the wheel. So find ...more
When owning a home one type of lever set you may have in your home is a privacy lever. In a privacy lever set, the main feature is that the door can only be locked from the inside. Sometimes a kid might get locked in or someone may accidentally lock the door behind them. It's ...more
The aim of CPR is to preserve life by maintaining an adequate supply of oxygen to the heart and brain. Effective CPR prolongs a person's chance of survival until either a defibrillator arrives and can be used to shock the heart back into its normal rhythm or advanced professio ...more
If your arm is tingling all fuzzy-like the way it does when you've slept on it wrong all night but you've been up for more than a few hours, then you may have a case of the stroke rather than sleep-induced wonky arm. There are a variety of symptoms to look for if you suspect ...more
The instructor goes about giving a crash course on finding the vertex of a parabola. This is a very nice review of the subject but not really a complete lesson. The instructor fails to explain many of the symbols and other expressions used. The simple way taught by the instruc ...more
Anybody who spends most of their day on the internet should know all about lulz. Lulz are most often jokes made at the expense of web users, as popularized on 4Chan. Today, a consortium of hackers called LulzSec is attempting (and in some cases succeeding) in efforts to shut d ...more
Drilling is always a messy job. Some just drill and leave the dirt behind to clean up later. Some require someone to stand next to them with a vacuum cleaner, sucking up the dust as they drill. But to eradicate the extra manpower, and to clean up your mess as you drill, try so ...more
Drilling is always a messy job. Some just drill and leave the mess behind to clean up later. Some require someone to stand next to them with a vacuum cleaner, sucking up the dust as they drill. But to eradicate the extra manpower, and to clean up your mess as you drill, try so ...more
Ace Up My Sleeve: It's not a playing card though. Talk to Paola again and she'll give you the hookup with a cool weapon. Problem is, it doesn't work yet. You need to bring it to Leonardo da Vinci, who's just across town. Make your way to him and knock on his door for a lengthy ...more
I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to rememb ...more
Ever wonder what you look like to someone else as you walk, talk? How it looks from above, behind, or to the side? Seeing yourself in a video flattens the experience into two dimensions, but this wireless camera rig experiment from Instructables member BigRedRocket brings it i ...more
This how-to video explains the names behind the rubber guard (why they are called what they are) and a step by step method behind the basic rubber guard set up. There are many variations and attack positions, but this video covers the basics: mission control, zombie, New York, ...more
Chioma Ezeogu, who plays wing attack for England and Middlesex, shows how she gets away from her opponent. Netball is similar to basketball but with no backboard behind the net, and no dribbling. Evasion techniques involve fakes and rolls. Get away from your opponent in netbal ...more
Grab your thinking caps and get your hack on. Null Byte is officially seeking contributors on a weekly basis who are willing to take the time to educate the Null Byte community on anything, from hardware hacks to life hacks. Contributors that write tutorials will be featured o ...more
Sharks. The first thing that comes to mind is "Jaws", Steven Spielberg's horrifying shark film that scared generations of young adults from entering the ocean waters. But not all sharks are as violent (and hungry) as "Jaws", so jump in the water and know a few guidelines to st ...more
One day, you may find yourself in an emergency situation where you need to undo the chain lock of your home's front door, or somebody else's front door. Maybe someone forgot the unlock it when exiting the back door. Maybe you're grandfather is having a heart attack. Maybe your ...more
The arm bar is a great self-defense maneuver to use when being attacked from behind. Learn to perform the arm bar for self-defense from a professional martial arts instructor in this free combat video. Defend against a back attack with the arm bar - Part 1 of 17. Click through ...more