Zero Day Exploit

How To : 3 Tips to Get to Inbox Zero Faster in Gmail

On average, an office worker receives 121 emails a day. Many of these emails are trivial and don't require immediate attention. While Gmail's automatic spam filters catch plenty of irrelevant emails, some still make their way into your inbox. Fortunately, Gmail's tools aren't ...more

How To : Root the New Kindle Fire HD

Yesterday, the entire Internet was talking about how the new Kindle Fire HD was supposed to be incredibly difficult to hack. Turns out, the folks over at XDA Developers are smarter than they thought—one day later, the mystery has already been solved. The exploit is the same on ...more

How To : Social Engineering - Total Guide

Good day to everyone, today I will present some basic and advanced concepts that targets sophisticated attacks on the social basis, also I will write about some steps that can prevent this attacks from occuring, basically we will examine Social Engineering from the angle of at ...more

Real Scenarios #2 : The Creepy Teacher [Part 2]

In part one of this tutorial we found out that your English teacher is a paedophile, by using a Man in the Middle attack to intercept his internet traffic. Now you're faced with the dilemma of how to alert other staff at the school to how creepy he is without letting on that ...more

How To : Create a Wireless Spy Camera Using a Raspberry Pi

Surveillance is always a useful tool in a hacker's arsenal, whether deployed offensively or defensively. Watching targets yourself isn't always practical, and traditional surveillance camera systems can be costly, lacking in capabilities, or both. Today, we will use motionEyeO ...more

How To : The Ultimate Guide to Customizing Your iPhone

Cases and stickers are always great, but they aren't the only way to customize an iPhone. The software on your device is full of customization options, from a better-looking home screen and cooler lock screen wallpapers to app icon changes and a system-wide dark mode. There's ...more

How to Hack Wi-Fi : Automating Wi-Fi Hacking with Besside-ng

Besside-ng is the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. When run with a wireless network adapter capable of packet injection, Besside-ng can harvest WPA handshakes from any network with an active user — and crack WEP passwords outright. Unlike many tools, ...more

How To : Protect Your PHP Website from SQL Injection Hacks

As a web developer, I often read articles about hackers (from the lowly to the knowledgeable) infiltrating websites via the dreaded 'SQL Injection' method and completely taking control, changing, gaining access, or destroying the owner's data. As a fellow web developer, I'm su ...more

How To : Create sexy Valentine's Day makeup with MakeupGeek

This beauty video demonstrates how to create sexy Valentine's Day makeup. Marlena, aka MakeupGeek, is a freelance makeup artist living in Michigan. Marlena says "Makeup isn’t just paint for the face, something to cover blemishes, or even something fun to do in my spare time- ...more

How To : Create a pink summer night smokey eye makeup look

Wearing layers and layers of makeup during the day is just asking for disaster, especially now that the humidity is soaring and temperatures are climbing up higher and higher. But during summer nights the temperatures cool down just enough that you can sport a decent amount o ...more

How To : Dominate the New York Times Crossword Puzzle

First off, don't be frustrated. YOU CAN DO IT! Contrary to the message in the image above, it's NOT over. It's just beginning. And when it comes to solving the New York Times crossword puzzle, the old cliche does apply: practice makes perfect. I've read quite a few books and ...more

How To : Understand integers and the number line

User DayTeacher helps you understand integers and the number line. When numbers were conceived, man had the basic concept of small numbers. The first things you learn in a language are numbers. The weather might have had an impact on numbers, as temperatures dropped below 0. W ...more

How To : Create a Basic Attendance Sheet in Excel

If you're a teacher in any type of school, whether it's high school, college, or middle school, it's imperative that you keep an attendance sheet. The paper and pen route can get pretty messy, and very disorganized, and that's where Microsoft Excel comes in. With this software ...more

Ekokook : The Kitchen of the Future

ZERO WASTE. Yes, You read that right. This kitchen of the future aims to have zero waste. Ekokook the kitchen concept out of design company Faltazi gives us hope for a greener future. How is this possible you ask when in most homes 85 or 90 percent of a family's trash is gener ...more

How To : Eat better

If your personal food pyramid replaces “Grains” with “Pizza” and “Fruits and Vegetables” with “Taco Sauce,” it’s time to make some changes. You Will Need * Unprocessed foods * Fruits and veggies * Fish * And plenty of drinking water Step 1 Eat whole, unprocessed foods wheneve ...more

HowTo : Top 10 DIY Nerdtastic Halloween Costumes

Defined by Urban Dictionary, Nerdtastic: Something generally not cool, but to a nerd it's freakin' fantastic. Below, a collection of WonderHowTo's top 10 favorite, utterly nerdtastic Halloween costume tutorials. The clock's ticking, so if you don't have your costume yet, perus ...more

How To : Get Free Windows Software Daily

When you look up the word free in the dictionary, you'll find a lot of definitions, but in the days of digital dependency and a falling economy, free only means one thing—expensive stuff for nothing. And if you own a Windows computer, one of the best sites to get free software ...more

News : You can't eat what?

Whenever my husband or I have to explain that our middle daughter Edith absolutely cannot handle white flour or sugar the first reaction is usually one of disbelief. You mean she can't have it ever? Next come the questions about when we can make exceptions. Surely we must be ...more

How to Hack Like a Pro : Getting Started with Metasploit

This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing p ...more

  • Hot
  • Latest