Configurations Search Results

Hack Like a Pro: Snort IDS for the Aspiring Hacker, Part 2 (Setting Up the Basic Configuration)

Welcome back, my tenderfoot hackers! As you should know from before, Snort is the most widely deployed intrusion detection system (IDS) in the world, and every hacker and IT security professional should be familiar with it. Hackers need to understand it for evasion, and IT security professionals to prevent intrusions. So a basic understanding of this ubiquitous IDS is crucial.

How To: Wear an American Apparel Le Sac dress (Gathered Mini)

Turn your American Apparel Le Sac dress into a cute Gathered Mini. It's a fun look and really easy to accomplish. The Le Sac dress has at least TWELVE different configurations for you to enjoy, which means more closet space, and less laundry! It can be a totally new dress each day of the week. Follow along and get this easy, sexy style that's perfect for summertime.

How To: Use a proxy with Firefox to hide your IP address

The video shows us how to use a proxy server with Firefox to hide your IP address. you can actually use this to avoid the hacking and various things that are blocking you from websites. Firefox is one of the easiest way to do this and for doing this you need to Google search the free proxylist and then you can select a proxy from the one which is related to the country you are residing in. Then copy that proxy server and then go to tools and click on options and under advanced tab click on ne...

How To: Create a three-point lighting rig in Blender

A good lighting setup is essential to effectively displaying your model. Without it your hard work might as well be for nothing. This tutorial takes a look at how to make a good three-point (+) lighting setup in Blender. The tutorial covers the different kinds of lights within Blender, the different configurations needed, and some general tips and tricks to creating a good setup within Blender. Whether you're new to the Blender Foundation's popular open-source 3D computer graphics application...

How To: Setup the Redrock microShouldermount

This cinematography tutorial explains how to setup the Redrock mircroShouldermount for the first time. The video covers two basic configurations: for a stock video camera and for an existing camera setup. The Redrock shoulder mount is a modular system designed to meet an individual's customizable needs.

How To: Disable Aero in Windows 7

A video from HelpVids that shows how to disable Windows Aero visual style in Windows 7. Nero makes your windows look more beautiful by adding effects like transparency / translucency, live thumbnails, live icons etc. All these effects however use valuable system resources like memory (RAM) and processor time. This may lead to a noticeable decrease in performance in some PC configurations especially those in which the processor speed and the amount of RAM is low.

How To: Password protect your wireless network

Most of the home wireless networks are not set up by professionals and hence they might lack in security features. People just set up the wireless networks by connecting the devices and powering them up and never care to apply security settings to the network. This may result in your wireless network being compromised by unwanted external entities. How ever you can do a web based configuration settings and secure your wireless network by password protecting it. This settings differ from the m...

How To: Build a basic modular synth in Reaktor 5.1

For anyone experimenting with music, learn how to create a basic synthesizer using Reaktor 5.1. This video tutorial shows us step-by-step how to create a modular synthesizer beginning with showing how to structure various instrumental sounds at different pitch levels using the software system. The pitches can be ordered in all different kinds of configurations allowing you to play around with sounds until you find the ones you want. Follow the steps outlined in this tutorial to learn how to c...

How To: Run multiple Windows operating systems simultaneously

If you want to run multiple windows operating systems at the same time you first need a Windows computer, the installation disk for the operating system you want to run, and Windows Virtual PC 2007. To install this, first type in Virtual PC 2007 to Google, go to the Microsoft link and download and install the program. Now, open the Virtual PC and click next on the wizard. Name your hard disk and click next until you choose where you want this at. Now your virtual hard drive is created. Now, p...

How To: Monitor System Usage Stats in Your Mac OS X Menu Bar

Like a car, your Mac needs to be monitored and cared for to keep it running as smoothly as possible. While your vehicle comes with a ton of gauges to keep track of your oil, temperature, and in some cases, even tire pressure, your Mac has no easy way to watch for low memory or high disk usage. Normally you would have to open up Activity Monitor to take a look at your usage stats, but now there is something better.

How To: Browse the net faster on your PSP

In this video tutorial the instructor shows how to browse the internet faster on your PSP. The normal browser built into the PSP is very slow because it does not use full ram of the PSP and because of its internal settings. These default settings of the browser make it pretty slow. So as an alternative to it you can download and use the Netfront Beta 4 browser. Basically it can be used in the same way as the normal PSP browser but as it uses good configurations and settings it makes your inte...

How To: Generate ASCII graphics for a line of text

In this tutorial the author shows us how to make your own 'Subscribe' ASCII text for your channel. He says that almost every one has that text on their channels but they usually copy it from somewhere else. So in this video the author how to do this using a web application called ASCII Generator which is found at http://www.network-science.de/ascii. He goes on and shows how to generate that ASCII text using the different configurations and settings available in that web application. He shows ...

Hack Like a Pro: How to Exploit SNMP for Reconnaissance

Welcome back, my rookie hackers! The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked sources for information is the Simple Network Management Protocol (SNMP). Many rookie hackers are not even aware of it, but it can prove to be a treasure trove of information, if you understand how it works and how to hack it.

How To: Quickly Gather Target Information with Metasploit Post Modules

Post-exploitation information gathering can be a long and drawn-out process, but it is an essential step when trying to pivot or establish advanced persistence. Every hacker should know how to enumerate a target manually, but sometimes it is worth it to automate the process. Metasploit contains post modules that can quickly gather valuable information about a target, saving both time and effort.

How To: 11 Tips for Preordering an iPhone XR, XS, or XS Max Before They Sell Out

Apple's new iPhone XR, XS, and XS Max are sure to be hits this year. Of course, that means plenty of hungry customers are looking to sign up for a model once preorders begin on Friday, Sept. 14, for the XS models, and Oct. 19 for the XR. Luckily, there are preemptive actions you can take right now to avoid waiting outside an Apple Store overnight or getting kicked out of the preorder queue online.

How To: Use the Cowrie SSH Honeypot to Catch Attackers on Your Network

The internet is constantly under siege by bots searching for vulnerabilities to attack and exploit. While conventional wisdom is to prevent these attacks, there are ways to deliberately lure hackers into a trap in order to spy on them, study their behavior, and capture samples of malware. In this tutorial, we'll be creating a Cowrie honeypot, an alluring target to attract and trap hackers.

Prev Page