Advised Search Results

How To: Use SSH Local Port Forwarding to Pivot into Restricted Networks

SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port forwarding, secure file transfer, and more. Using SSH port forwarding on a compromised host with access to a restricted network can allow an attacker to access hosts within the restricted network or pivot into the network.

How To: Make Simple Mittens in Single Crochet

This is a simple pattern, designed to produce a well-fitting mitten. Both the right and left mittens worked the same up to the shaping for the top of the mitten. A slight adjustment for making one right and one left, then they are worked the same. The gusset for the thumb constructed with the increases made in the center of the gusset, rather than on each side. This makes it easy with a minimal amount of counting stitches as you go. I have been crocheting for 56 years. In doing research for w...

NR30: The Mobile AR Leaders of 2018

This time last year, we got our first taste of what mobile app developers could do in augmented reality with Apple's ARKit. Most people had never heard of Animojis. Google's AR platform was still Tango. Snapchat introduced its World Lens AR experiences. Most mobile AR experiences existing in the wild were marker-based offerings from the likes of Blippar and Zappar or generic Pokémon GO knock-offs.

How To: The Beginner's Guide to Defending Against Wi-Fi Hacking

Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a few simple actions, the average user can go a long way toward defending against the five most common methods of Wi-Fi hacking, which include password cracking, social engineering, WPS attacks, remote access, and rogue access points.

How To: Use Kismet to Watch Wi-Fi User Activity Through Walls

Your home has walls for privacy, but Wi-Fi signals passing through them and can be detected up to a mile away with a directional Wi-Fi antenna and a direct line of sight. An amazing amount of information can be learned from this data, including when residents come and go, the manufacturer of all nearby wireless devices, and what on the network is in use at any given time.

How To: Lock Down Your DNS with a Pi-Hole to Avoid Trackers, Phishing Sites & More

The Pi-hole project is a popular DNS-level ad blocker, but it can be much more than that. Its DNS-level filtering can also be used as a firewall of sorts to prevent malicious websites from resolving, as well as to keep privacy-killing trackers such as Google Analytics from ever loading in the browser. Let's take a look at setting a Pi-hole up and customizing a blacklist to suit your needs.

How To: Cook rice without salt

Are you on a low-salt diet and need some healthy recipes that are friendly on your taste buds and wallet? This superb video serves up an easy and delicious recipe that will please everyone, whether or not the doctor has advised them to cut down on the sodium. The tutorial, one in a fantastic and free video series, offers excellent tips on how to properly cook your rice, as well as how to dress it up without damaging your health.

How To: Use YouTube

The trend of online video sharing came to the mainstream with popularization of YouTube, which let users view, submit and share video clips. YouTube started off in the year 2005, and quickly became one of the most visited websites on the internet. Sensing the emerging trend, large companies like Google joined the trail and launched their own video sharing sites (Google later bought YouTube).

News: Compost human manure

Going green has never been so hardcore as Jack Mountain's bushcraft podcast. This is basically a 10 minute poo tutorial. Fortunately for us, Jack's "deposit" is simulated, and we are spared seeing the real act or his prodigious backside.

News: The Soft Fur Rat

The African Soft Fur Rat though new to the pet trade is a unique little rodent with unusual qualities. Not only is this little rat a great step up for people who feed reptiles it is virtually odorless and that is definately a plus for those who would like to have a pet rat or mouse they can keep inside the house and not spend a fortune in bedding or spend a lot of time cleaning to keep the rodent odor down.

How To: 9 DIY Ways to Remove Sweat Stains from Clothes

Got a bad sweat stain on the underarms of your light-colored clothing? You probably have something in your kitchen or medicine cabinet that will help get rid of the stain immediately. Aspirin, table salt, lemon juice, white vinegar, baking soda, and even meat tenderizer (make sure it is unseasoned!) are some of the many common household ingredients you can use to make your sweaty clothes look brand new again.

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services

For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. Before someone can learn how to root a box, they need to learn how not to be found. I can not stress that point enough.

How To: Deal with dating fatigue using NLP techniques

Going on dates can be tiring and can start to become a bit of a chore. But by using these NLP techniques, as advised by love doctor Sam Van Rood from his book Teach Yourself Flirting, you can reinvigorate yourself and continue your search for the perfect match. So Deal with your dating fatigue the VideoJug way. Deal with dating fatigue using NLP techniques.

Next Page