Career Targets Search Results

How To: Use Social Engineering to Hack Computers

Today I am going to teach the various ways that you can use social engineering to hack a system. For those of you that have followed my past tutorials, you know that social engineering can unlock a world of possibilities. This is because no matter how many firewalls, no matter how many patches there are on a server, the password is kept in the minds of people...and people, are not as smart as computers.

How To: Draw a dress form

Are you an aspiring fashion designer? Or do you just love drawing clothes and dresses? In this Hawks Vs. Pigeon Production, learn everything you need to know about drawing a dress form. Get that career as a fashion designer started now with help from this tutorial.

How To: Fill out job applications

Job applications should be taken seriously, and filling them out with correct information, as well as specific details that make this application stand out, is an art form. Fill out job applications with tips from a career adviser in this free video on job guidance by following the instructions of the application, making it legible and addressing the value the applicant will bring to the company.

How To: Evaluate multiple job offers

When evaluating multiple job offers it is helpful if you take the time to go over your options and determine what factors are most important to you in your career search. This how to video teaches you what to look for when deciding between several job offers.

Advanced Phishing: How to Inject Meetings into Anyone's Google Calendar

Google Calendar is a cornerstone of the Google Suite, perhaps second only to Gmail itself. Whereas email is constantly plagued by phishing attacks, as of yet, the calendar is a relatively untapped social engineering attack vector. But it's relatively easy for an attacker to inject a meeting or event into a target's Google Calendar and use it to exploit them.

Social Engineering: How to Use Persuasion to Compromise a Human Target

Social engineering makes headlines because human behavior is often the weakest link of even well-defended targets. Automated social engineering tools can help reclusive hackers touch these techniques, but the study of how to hack human interactions in person is often ignored. Today, we will examine how to use subtle, hard to detect persuasion techniques to compromise a human target.

Hack Like a Pro: How to Use Maltego to Do Network Reconnaissance

Welcome back, my greenhorn hackers! Before we attempt to exploit any target, it is wise to do proper reconnaissance. Without doing reconnaissance, you will likely be wasting your time and energy as well as risking your freedom. In previous guides, I have demonstrated multiple ways to perform reconnaissance including passive recon with Netcraft, active recon with Nmap or hping3, recon by exploiting DNS or SNMP, and many others.

How To: Draw a Boat in Two Point Perspective

VCAD instructor Glen Kennedy, who has worked for several large studios throughout his career, including Disney, Universal Studios and Marvel Productions, introduces fundamental drawing techniques to encourage young artists to develop and hone their drawing skills. In this five-part drawing series, viewers can follow along with Glen to learn how to sketch a boat in two-point perspective.

How To: Play an instrumental cover of the Jonas Brother song "Fly with Me" on piano

The Jonas Brothers may be on their way out as they grow older and Nick Jonas embarks on his solo career, but for their fans their songs will always remain. This three-part video will teach you how to play a cool instrumental version of their song "Fly with Me" on piano, the ultimate expression of your love for the Jonas Brothers. Check out a written version of the song here.

How To: Read a micrometer in mechanical engineering

In this video tutorial, viewers learn how to read a micrometer. This tool allows the user to accurately measure components. They have the ability to measure dimensions accurately to within one hundredth of a millimeter. Micrometers are designed with a wide variety of styles and sizes for normal or specialized applications. Micrometers are able to measure the internal or external dimensions of a component. They are the most important basic measuring instrument used in the metal industry. There...

How To: Exploit EternalBlue on Windows Server with Metasploit

Particular vulnerabilities and exploits come along and make headlines with their catchy names and impressive potential for damage. EternalBlue is one of those exploits. Originally tied to the NSA, this zero-day exploited a flaw in the SMB protocol, affecting many Windows machines and wreaking havoc everywhere. Here, we will use EternalBlue to exploit SMB via Metasploit.

How To: Automate Wi-Fi Hacking with Wifite2

There are many ways to attack a Wi-Fi network. The type of encryption, manufacturer settings, and the number of clients connected all dictate how easy a target is to attack and what method would work best. Wifite2 is a powerful tool that automates Wi-Fi hacking, allowing you to select targets in range and let the script choose the best strategy for each network.

How To: Train your dog to perform the "cop-cop" trick

In this Pets & Animals video tutorial you will learn how to train your dog to perform the "cop-cop" trick. In this trick the dog learns to put its feet on your feet. Step 1 – teach the dog to target a book or a mat with their feet by offering them some treat. You can do this either by appreciating or clicking when both the feet touch the book. The next step is getting the dog to target the book with their feet while they are between your legs. You have to continually reinforce the dog to ma...

How To: Avoid creating angles when putting

Looking to work on your form? Try this free video golfing lesson for size. In short: When putting, to be able to release the putter down the line to your target, the club must travel slightly inside the target line. For a complete overview of how to become a better putter, watch this video guide.

Market Reality: Apple's Smartglasses Timeline Shifts, Continental Invests in Automotive HUDS, & Target Ships Web AR App

Consumers are chomping at the bit for augmented reality smartglasses from Cupertino's finest, but one market analyst is saying not so fast, Apple fans. Meanwhile, automotive AR is gaining speed, with the latest milestone coming courtesy of a major investment in waveguides by Continental. And although mobile AR apps have already arrived, retailer Target is taking a different approach. So why is Target tinkering with web-based AR? Answers below...