Knowledgeable Search Results

How To: Conceal a USB Flash Drive in Everyday Items

Technology in computers these days are very favorable to the semi-knowledgeable hacker. We have TOR for anonymity online, we have SSDs to protect and securely delete our data—we can even boot an OS from a thumb drive or SD card. With a little tunneling and MAC spoofing, a decent hacker can easily go undetected and even make it look like someone else did the hack job.

News: worlds worst salesman

An "employee" is helping a customer who has a few questions. Not only does the fake employee know absolutely nothing about what is being asked, but the "employee" then "accidentally" breaks an item in the store while trying to demonstrate to the customer. Then a "manager" walks by, and the employee blames the broken item on the customer. The results are endless. People might react in all sorts of entertaining ways. The prank really depends on the fake employee's ability to keep cool while lyi...

Next Page