Advantageous Search Results

How To: Bluff in no limit Texas Hold'em

There are some basic thing that you will need to think about, when trying to bluff in poker. Always think about taking advantage of being in position. Being "in position" refers to being the person who bets at the most advantageous time. This is the case, when you are "on the button": i.e. the last person to bid.

How To: Discover Open Ports Using Metasploit's Built-in Port Scanner

One of the first steps in reconnaissance is determining the open ports on a system. Nmap is widely considered the undisputed king of port scanning, but certain situations call for different tools. Metasploit makes it easy to conduct port scanning from directly inside the framework, and we'll show you three types of port scans: TCP, SYN, and XMAS.

Social Engineering: How to Use Persuasion to Compromise a Human Target

Social engineering makes headlines because human behavior is often the weakest link of even well-defended targets. Automated social engineering tools can help reclusive hackers touch these techniques, but the study of how to hack human interactions in person is often ignored. Today, we will examine how to use subtle, hard to detect persuasion techniques to compromise a human target.

How To: Root Apps Not Working with Magisk? Here's What to Do

It's the icing on top of your cake (or whipped cream on top of your Android Pie) of despair. You may have not had the easiest time rooting your device, but you feel like you overcame all of the obstacles. Only now to discover that those very apps and mods you were rooting for still won't work — and the signs point to a lack of root access. Don't lose hope, because we have some tricks up our sleeve.

How to Use PowerShell Empire: Getting Started with Post-Exploitation of Windows Hosts

PowerShell Empire is a post-exploitation framework for computers and servers running Microsoft Windows, Windows Server operating systems, or both. In these tutorials, we will be exploring everything from how to install Powershell Empire to how to snoop around a target's computer without the antivirus software knowing about it. If we are lucky, we might even be able to obtain domain administrator credentials and own the whole network.

How To: Quickly Open Your Favorite Apps Just by Tapping the Back of Your iPhone

In recent years, accessibility features on the iPhone have been given more attention by Apple, which means more people with disabilities can take advantage of everything iOS has to offer. These features are also beneficial for non-disabled users, and iOS 14 has an exciting one that everyone will want to use: Back Tap.

How To: Inject Your Drill Press Table Crank with Steroids

First, I would like to explain that among my family members, I am considered somewhat of an oddball. Mostly because of some of the mods that I have performed on a few of my woodworking tools. After I show you what I did to my drill press, you may be inclined to agree. When I first hatch an idea in my little pea brain, the first thing I take into consideration is whether or not this mod is irreversible and will destroy my tool. In the case of my drill press, I determined that it was safe to pr...

How To: Save libraries and symbols in Illustrator

In this video we will take a look at how you can speed up your Illustrator processes and workflow by saving out libraries of symbols, graphic styles, swatches and more. Also get the scoop on symbols and why it may be advantageous to build up several libraries to have at your disposal. These are great tips for those who use Illustrator often. Save libraries and symbols in Illustrator.

How To: Scan for Viruses in Windows Using a Linux Live CD/USB

Many windows users, if not all, run into a virus infection once in a while. This is unavoidable when using Microsoft's operating system. Without digressing too much, the fact that Windows is such a popular OS with no controlled software sources makes it easy for viruses and malware to spread. And while there's a plethora of antivirus tools for Windows, sometimes infections (such as certain scareware) can disable the install and/or use of antivirus systems and render your OS unusable until cle...

Next Page
Prev Page