Foundations Search Results

Networking Foundations: Exploring UDP via Wireshark(Part 2)

Hello ladies and gentlemen, welcome back to the Part 2 of our UDP & Wireshark adventure as I promised. Last time we discussed about what DNS is and how it uses UDP as its transport protocol but we left some unexplained parts behind and I'm about to investigate those with you. I would advice you to go back to Part 1 so you can have a clear understanding in case you don't feel comfortable with the topic. So our computer made its request to the DNS server and asked "Hey, I want to find out what ...

Networking Foundations: Subnetting Based on Host Requirements

Hello everyone! I hope you are having a great day so far. Today, instead of caring about networks we are going to talk about subnetting based on host requirements as promised in my first article about subnetting. Just like in the previous articles we will jump right into the examples because that's the best way to learn.

Networking Foundations: Subnetting Madness

Hello everyone! How's subnetting going? Did you practice a lot? I hope you did, but even if you didn't we will go through some more examples so you can be feeling confident after reading this article. It's all about that bad boy binary!

Networking Foundations: Dynamic Host Configuration Protocol

Hello ladies and gentlemen, PySec here coming at you with another informative(hopefully) article for you all. In the last tutorial, we finally finished our discussion about IP Addressing and I intentionally didn't mention a really important concept with which IP Addressing wouldn't be feasible without it. What I'm talking about is how our network device gets the IP Address in order to communicate with other devices on the network/Internet. There are many different ways for that to be accompli...

Networking Foundations: Exploring UDP via Wireshark(Part 1)

Hello ladies and gentlemen, I'm back with another informative(hopefully) article for you all. Once again I would like to apologize for my absence for about a week or so. I have some stuff going on with my life and university and I haven't found enough time to make a fully in-depth article. In this article I'm going to walk you through one of the main networking protocols when it comes to communication across the Internet between programs, aka UDP(User Datagram Protocol).

How To: Contour your face with foundations and highlighters

Once you contour your face you never go back. That's because contouring - or using varying shades of makeup (bronzers, foundations, highlighters, concealers) that are lighter or darker than your skin - helps define your features. Alternatively, contouring can also fake features you don't have and cover up features that you're less fond of.

How To: Achieve flawless skin, without foundation

Sometimes it may not be the best idea to apply foundation before going out. It may sweat away, get all over you clothes, or just be uncomfortable on those hot and humid days. This video will show you exactly how to achieve a flawless, concealed look without using any foundations; just moisturizers and powders.

How To: Make a tinted moisturizer using foundation and lotion

In order to make your own Tinted Moisturizer, you will need the following: lotion and foundation. In advance, you will need to select an appropriate foundation and moisturizer. The foundation that you choose should be very close to your current complexion. Mixing it with lotions will dilute it a bit, but it will still need to be close to your current complexion to blend in well.

How To: Play "Build Me Up Buttercup" on the ukulele

Want to play the Foundations' "Build Me Up Buttercup" on your ukulele? Learn how with this free video ukulele lesson from Ukulele Mike, which presents a complete breakdown of the song and its chords. Whether you play the ukulele or bass kazoo, there is no better way to improve your chops than by learning to play your favorite songs. Not only is it more fun and much easier than running drills or memorizing a chord book by wrote, it's obviously also a wonderful way to build your repertory of so...

How To: Crochet a puffy spike crochet square

The author of this video explains how to combine a puff stitch and a drop stitch while crocheting a six by six inch square. She goes step by step, first showing how to create a slipknot, and then by showing how many slipknots will be needed in each chain across the square, which make the foundations. She then shows how to make a slipknot of a new thread of yarn, and how to insert it on the hook, into the original chain while creating the puff stitch. The chains are repeated, as are the puff s...

How To: Train your dog advanced tricks

Ron Watson of Positive Vibe dog training studio in western Michigan with Frisbee Foundations and Dog mantic Dog Training TV explains how to do vault, stall, and rebound discrimination dog training. First, add value to a barrel by using eye contact. When the dog goes to where the reinforcement happens, feed it treats. Then order the dog off the barrel. When the dog jumps up by its own volition, then you know the technique is working. Then, set a linear vault by saying, top, and tossing the tre...

How To: Practice walking meditation for Buddhism

Watch this instructional video in basic Buddhist Vipassana (Insight) Meditation. In this how-to video there is an explanation of the four foundations of mindfulness and a guided walking meditation based on creating a clear thought centred on the present reality. Learn all about how to practice walking meditation.

How To: Do a BMX bunny hop

In this series of expert video clips, you will learn how to do a bunny hop, one of the foundations of BMX freestyle tricks. Get tips on various stunts and variations on the bunny hop move from an expert freestyle rider.

News: Sketchy Chinese App Store Removed from Evad3rs iOS 7 Jailbreak

The internet was ablaze this week after it was found out that evasi0n's newest jailbreak for iOS 7 secretly came bundled with a highly obfuscated Chinese app store. The application, called Taig, was filled with pirated software and was rumored to have permissions capable of tracking your information and sending it elsewhere. It was reported that the team at evad3rs financially benefited from this move, netting them a very high six-figure number close to a million dollars. The controversy incr...

How To: Design Your Own Video Games with This Pay What You Want Bundle

"I want to make video games" — Is there anyone who hasn't ever thought that? It's almost universal among gamers to want to get on the other side of the screen and design the games themselves, especially those of us who have played less than impressive games and thought that we could do a better job. But it's hard to know where to start — or how — when it comes to creating our own games.

News: Top 9 New Safari Features in iOS 12 for iPhone

If there's one strength of Apple's that iOS and Android fans can agree on, it's the company's dedication to user privacy. With each new iteration of iOS, Apple builds upon these foundations, enhancing and increasing each iPhone's ability to protect its user's data. In iOS 12, Apple has added many new features to Safari, most of which have their own unique way of keeping you safe online.

How To: Linux Basics for the Aspiring Hacker: Using Ship for Quick & Handy IP Address Information

Whether you're white hat, black hat, or some shade in-between, navigating through a network is a core part of hacking. To do that, we need to be able to explore a network to discover the addresses of gateways, interfaces, and other attached devices. When ifconfig just isn't enough, you can steer your way around a network with a convenient tool called Ship, the script for everything IP.

Steganography: How to Hide Secret Data Inside an Image or Audio File in Seconds

Steganography is the art of hiding information in plain sight, and in this tutorial, I'll show you how to use Steghide — a very simple command line tool to do just that. In addition, I'll go over a bit of conceptual background to help you understand what's going on behind the scenes. This is a tool that's simple, configurable, and only takes a few seconds to hide information in many file types.

How To: Learn How Elliot from Mr. Robot Hacked into His Therapist's New Boyfriend's Email & Bank Accounts (Using Metasploit)

Social engineering is a pretty important item in a hacker's toolkit. In Mr robot there was a time, we saw Elliot using social engineering to gain access to his therapist's boyfriend's email and bank accounts by calling him and pretending to be someone from his bank, then Elliot asked him for some info that were really useful to gain access to his account, the target believed to be someone from the bank and gave him the info Elliot was looking for. But How Is It in the Real World?

News: Why Is Linux & Other Open-Source Software Free?

Welcome back, my greenhorn hackers! As hackers, we often take for granted that nearly all of our hacking tools and operating system are free and open source. I think it's important to examine a bit of background on how we arrived at this intriguing juncture in the history of computer software. After all, we pay for nearly all of our other software (Microsoft, Adobe, etc.) and nearly everything else we use in life, so how is it that Linux and all our hacking tools are free?

Prev Page