Someone Attack From Behind

How To : Survive a knife attack from behind

This video details how to survive a knife threat from behind. When threatened from behind with a knife, do not attempt to move the body first, this will result in the attacker maintaining the capability to thrust the knife into the body. When threatened, place arms out and low ...more

How To : Help someone having a panic attack

Help Someone Having a Panic Attack. We show the best measures to take to relieve someone suffering a panic attack. Come to the support of friends, family, and other members of the community. Help someone having a panic attack. Click through to watch this video on videojug.com

How To : Spy on Network Relationships with Airgraph-Ng

What if you could easily visualize which access point every Wi-Fi device nearby is connected to in a matter of seconds? While programs like Airodump-ng can intercept this wireless information, making it easy for hackers to use and understand is another challenge. Fortunately, ...more

How To : Track a Target Using Canary Token Tracking Links

Canary tokens are customizable tracking links useful for learning about who is clicking on a link and where it's being shared. Thanks to the way many apps fetch a URL preview for links shared in private chats, canary tokens can even phone home when someone checks a private cha ...more

How To : Things to Do on WonderHowTo (01/18 - 01/24)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. More amazing community contributions this w ...more

How To : Why You Should Study to Be a Hacker

Welcome back, my budding hackers! People often ask me, "Why are you training hackers? Isn't that illegal?" Although I usually give them a short version of this post, there are MANY reasons why YOU should be studying hacking. Before I begin, I want to re-emphasize to all of y ...more

How To : Social Engineering - Total Guide

Good day to everyone, today I will present some basic and advanced concepts that targets sophisticated attacks on the social basis, also I will write about some steps that can prevent this attacks from occuring, basically we will examine Social Engineering from the angle of at ...more

How To : Simulate a RAT on Your Network with ShinoBOT

A remote administration tool, or RAT, is a piece of software used for remotely controlling machines. They are commonly used by tech support to gain remote access for troubleshooting purposes, but RATs are also an important part of a hacker's advanced persistent threat (APT) to ...more

How To : Spy on Traffic from a Smartphone with Wireshark

So you want to know what that person who is always on their phone is up to? If you're on the same Wi-Fi network, it's as simple as opening Wireshark and configuring a few settings. We'll use the tool to decrypt WPA2 network traffic so we can spy on which applications a phone i ...more

News : The 15 Most Viral Costumes for Halloween 2015

If you don't want to dress up as a vampire, witch, werewolf, or zombie again this Halloween, step things up a notch and go viral. There have been a ton of funny memes and absurd news since last October, so the only hard part is settling on the right one for inspiration for you ...more

How To : Prevent indoor lighting problems

Prevent indoor lighting problems with these great tips. -When a window is behind the object, bring lights closer to object or use a reflector using the light from the window to create a 3 point lighting effect. -To conceal someone's identity, eliminate all lighting and use a ...more

News : Port-Able-Pot

have a port-a-pot on a fork-lift. Hide the forklift behind the port-o-pot for the time being. When someone (probably England) goes to shit, use duct tape to tape around the door locking them in the port-a-pot. Then, forklift the port-a-pot onto a truck bed and drive down the h ...more

How To : Con a free meal from the drive-thru at McDonald's

Want a free meal at McDonald's restaurant? Forget those money-saving (supposedly) weekly coupons, that's nothing compared to an actual free meal. Coupons won't get you that. But this method of free food, perfect for the freegan or the poor (or maybe just the rude). This would ...more

How To : Eye gouge someone in self defense

This is the #1 Self Defense Technique for Women's Self Defense or for anyone for that matter. Even with over 20 years of martial arts training I myself would use this technique because it is by far the most effective and delivers the outcome we want ,which is to be released or ...more

How To : Survive an attack in the street

The video describes an easy way to survive an attack from someone in the street. When the assailant grabs your, your first reaction should be to guard against their initial blow. Then, punch them in the groin, grab them around there neck in a sleeper hold type move using your ...more

News : Drop Through Floor

Subject enters a typical office where someone familiar is sitting behind a desk across from the door. Everything in the room is fixed to the floor or walls and the person behind the desk is secretly strapped into the desk chair. As the subject approaches the desk to sit down i ...more

How To : Defeat SSL in Practice with SSL Strip

SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, w ...more

How To : Disable an attacker

Ever wanted to know how to disable an attacker? The trick to getting away from an assailant – even one who's bigger and stronger than you are – is to hit 'em where it hurts. You Will Need: • Knowledge of the human anatomy • Bravery • A self-defense course (optional) Step ...more

How To : Unlock A Privacy Door Handle

When owning a home one type of lever set you may have in your home is a privacy lever. In a privacy lever set, the main feature is that the door can only be locked from the inside. Sometimes a kid might get locked in or someone may accidentally lock the door behind them. It's ...more

How To : Use a CPR Ezy in case of a heart attack

The aim of CPR is to preserve life by maintaining an adequate supply of oxygen to the heart and brain. Effective CPR prolongs a person's chance of survival until either a defibrillator arrives and can be used to shock the heart back into its normal rhythm or advanced professio ...more

How To : Identify the symptoms of a stroke or heart attack

If your arm is tingling all fuzzy-like the way it does when you've slept on it wrong all night but you've been up for more than a few hours, then you may have a case of the stroke rather than sleep-induced wonky arm. There are a variety of symptoms to look for if you suspect ...more

How To : Find the vertex when graphing a quadratic equation

The instructor goes about giving a crash course on finding the vertex of a parabola. This is a very nice review of the subject but not really a complete lesson. The instructor fails to explain many of the symbols and other expressions used. The simple way taught by the instruc ...more

How To : Keep clean with a homemade drill dust collector

Drilling is always a messy job. Some just drill and leave the dirt behind to clean up later. Some require someone to stand next to them with a vacuum cleaner, sucking up the dust as they drill. But to eradicate the extra manpower, and to clean up your mess as you drill, try so ...more

How To : Collect dust and stay clean when drilling

Drilling is always a messy job. Some just drill and leave the mess behind to clean up later. Some require someone to stand next to them with a vacuum cleaner, sucking up the dust as they drill. But to eradicate the extra manpower, and to clean up your mess as you drill, try so ...more

Walkthrough Assassin's Creed 2 : Mission 14

Ace Up My Sleeve: It's not a playing card though. Talk to Paola again and she'll give you the hookup with a cool weapon. Problem is, it doesn't work yet. You need to bring it to Leonardo da Vinci, who's just across town. Make your way to him and knock on his door for a lengthy ...more

How To : Do jiu jitsu rubber guard moves

This how-to video explains the names behind the rubber guard (why they are called what they are) and a step by step method behind the basic rubber guard set up. There are many variations and attack positions, but this video covers the basics: mission control, zombie, New York, ...more

How To : Get away from your opponent in netball

Chioma Ezeogu, who plays wing attack for England and Middlesex, shows how she gets away from her opponent. Netball is similar to basketball but with no backboard behind the net, and no dribbling. Evasion techniques involve fakes and rolls. Get away from your opponent in netbal ...more

How To : Survive a shark attack

Sharks. The first thing that comes to mind is "Jaws", Steven Spielberg's horrifying shark film that scared generations of young adults from entering the ocean waters. But not all sharks are as violent (and hungry) as "Jaws", so jump in the water and know a few guidelines to st ...more

How To : Defend against a back attack with the arm bar

The arm bar is a great self-defense maneuver to use when being attacked from behind. Learn to perform the arm bar for self-defense from a professional martial arts instructor in this free combat video. Defend against a back attack with the arm bar - Part 1 of 17. Click through ...more

Prev Page
  • Hot
  • Latest