Captured Search Results

How To: Draw a ninja

Ninjas has captured the imagination of both East and West with a combination of flair, combat effectiveness, and secrecy unlike any other type of warrior in the world. In this three-part video you will learn how to draw a rather muscular example of the group, holding a massive sword and adorned with shruiken, in pencil.

How To: Record your audio in Camtasia 6

In this video tutorial, viewers learn how to record audio, using Camtasia Studio 6. Camtasia Studio is a screen video capture program. The user defines the area of the screen or the window that is to be captured before recording begins; it is also possible to capture the entire screen area. You can also talk, and use a videocam. Begin by selecting the Camtasia Studio icon in the taskbar. Right-click it and select the sound option. When the window pops up, enable all the options to be able to ...

How To: Understand histograms on digital cameras

A video from Graham River Productions, presented by Shannon Smith, explains how to interpret Histograms on modern Digital Cameras. Just because a captured image looks nice on the camera screen does not mean that it is really good. One of the better checks for quality of a photograph is the histogram display that is available on many modern cameras. Histograms accurately tell whether the full potential of the the camera's optical sensor has been utilized or not; and are the tools of choice for...

How To: Take a screenshot on an iPhone

This video demonstrates an Easter egg on the iPhone that enables you to take a screenshot of the iPhone. First, navigate to the website or menu page that you need to capture as a screenshot and capture the screenshot by pressing the buttons as shown in the video. That is it, the captured screenshots can be found in your camera roll. Make sure to have your iPhone in the desired orientation before taking the screen-shot. This can be used for capturing web pages for future reference as well.

How To: Convert to a higher equivalent fraction

A representative from Math Problem Generator explains in this video that converting a simple fraction from its current state to a higher equivalent can be very simple. He explains the process neatly and provides a great example. To convert a fraction, you must multiply the numerator and the denominator by the exact same number. The example he shows is captured from the screen of a computer and is written out in some sort of a painting program. The example shows that four-ninths equals eight-e...

How To: Create a custom caption box in Wordpress

In order to create a custom caption box in WordPress you'll need to go to your dashboard. Here click on appearances, then on editor. Now over on the right select the sidebar option. Here you'll see some code, what you need to do is find the word that you want to replace on the main page, you can use ctrl+F to find the word. When you've found it within the code just replace it with whatever you want and then press the 'apply' button. You'll see that the main page will now be displaying the wor...

How To: Use Audacity to record audio

The video shows us how to use audacity to record audio. Firstly you need to have the software audacity installed in your system and for that Google and search for 'audacity' and after that you get a link to save and install the software. Once the installation is done, open audacity and on the drop down menu the default is set to microphone, change that to stereo mix and copy my settings. Once this is done we will be recording the audio. Go to a site like youtube and press the record button in...

How To: Phish Social Media Sites with SocialFish

Phishing is the easiest way to get your password stolen, as it only takes one mistake to log in to the wrong website. A convincing phishing site is key to a successful attempt, and tools to create them have become intuitive and more sophisticated. SocialFish allows a hacker to create a persuasive phishing page for nearly any website, offering a web interface with an Android app for remote control.

How to Hack Wi-Fi: Capturing WPA Passwords by Targeting Users with a Fluxion Attack

With tools such as Reaver becoming less viable options for pen-testers as ISPs replace vulnerable routers, there become fewer certainties about which tools will work against a particular target. If you don't have time to crack the WPA password or it's unusually strong, it can be hard to figure out your next step. Luckily, nearly all systems have one common vulnerability you can count on — users!

How To: Hack Wi-Fi Networks with Bettercap

There are many tools out there for Wi-Fi hacking, but few are as integrated and well-rounded as Bettercap. Thanks to an impressively simple interface that works even over SSH, it's easy to access many of the most powerful Wi-Fi attacks available from anywhere. To capture handshakes from both attended and unattended Wi-Fi networks, we'll use two of Bettercap's modules to help us search for weak Wi-Fi passwords.

How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack

Cracking the password for WPA2 networks has been roughly the same for many years, but a newer attack requires less interaction and info than previous techniques and has the added advantage of being able to target access points with no one connected. The latest attack against the PMKID uses Hashcat to crack WPA passwords and allows hackers to find networks with weak passwords more easily.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 14 (Live Memory Forensics)

Welcome back, my budding hackers! One of the most basic skills the forensic investigator must master is the acquisition of data in a forensically sound manner. If data is not captured in a forensically sound manner, it may not be admissible in court. In my Kali Forensics series, I showed you how to acquire a forensically sound, bit-by-bit image of a storage device such as a hard drive or flash drive, but now let's dive into live memory.

How to Hack Wi-Fi: Cracking WPA2-PSK Passwords with Cowpatty

Welcome, my hacker novitiates! As part of my series on hacking Wi-Fi, I want to demonstrate another excellent piece of hacking software for cracking WPA2-PSK passwords. In my last post, we cracked WPA2 using aircrack-ng. In this tutorial, we'll use a piece of software developed by wireless security researcher Joshua Wright called cowpatty (often stylized as coWPAtty). This app simplifies and speeds up the dictionary/hybrid attack against WPA2 passwords, so let's get to it!

How To: Secretly Take Photos on Android Without Launching Your Camera App

The art of taking secret photos is one that requires keen awareness and skill. Not only do you need to ensure that your subject remains oblivious, but you also need to make sure that no one near you notices what you're attempting to do. It's great when you buddy is acting a fool, but sucks when they stop their shenanigans when they notice you pulling out your camera phone in an effort to evade your picture.