Evasive Search Results

How To: Build an Evasive Shell in Python, Part 1: Introduction & Concepts

Hello, everyone. Stealth is a large part of any successful hack; if we don't get noticed, we're much less likely to be caught. In these next few articles, we'll be building a shell based on keeping us hidden from a firewall. There are many ways to stay hidden from a firewall, but we'll only be incorporating a couple into our shell. This article will outline and explain these evasion concepts and techniques.

How To: Make an evasive beeping thing

This video shows you how to make a prank toy called "The Evasive Beeping Thing." You will need: a 555 timer, a couple of 3904 transistors, a couple of capacitors, some resistors, a 9-volt battery clip, a small speaker, and a small piece of circuit board to settle everything. Follow these simple steps:

How To: Evade talking with a close talker

Close talkers suck. While having an intimate, one-on-one conversation with someone is nice, being able to see every pore on his face is not. Plus, there are the inevitable spit sprinkles that shoot out of his mouth at every interjection.

How To: Build & Hide a Campfire from Your Enemies — The Dakota Fire Pit

Fire.  It’s everywhere— always has been.  From the Ordovician Period where the first fossil record of fire appears to the present day everyday uses of the Holocene.  Today, we abundantly create flames (intentionally or unintentionally) in power plants, extractive metallurgy, incendiary bombs, combustion engines, controlled burns, wildfires, fireplaces, campfires, grills, candles, gas stoves and ovens, matches, cigarettes, and the list goes on... Yet with our societies' prodigal use of fire, t...

How to Get Better at Halo: Reach

Introduction Halo: Reach is Bungie's latest and final addition to the franchise. Microsoft has claimed the title and from now on 343 Industries will be working on the Halo franchise. In my opinion, Bungie's last game is the best out of all of them. These are some tactics and bits of advice that I've picked up.

News: Iraqi Insurgents Hack U.S. Drones With 26 Dollar Download

Uh oh. Somebody screwed up big this time. It has recently been reported that Iraqi insurgents have used $26 software to intercept live video feeds from U.S. drones located in Middle East conflict zones. The drone (a remotely piloted aircraft) is considered one of the U.S. military's most sophisticated weapons. Apparently not sophisticated enough, however. 

Next Page
Prev Page