Module Introduces Search Results

Hack Like a Pro: Exploring Metasploit Auxiliary Modules (FTP Fuzzing)

Welcome back, my hacker novitiates! In previous guides, we have used one of the most powerful hacking platforms on the planet, Metasploit, to perform numerous hacks. They ranged from exploiting Windows XP and Windows 7/8 vulnerabilities, to installing a keylogger and turning on a webcam remotely. We have even been able to save the world from nuclear annihilation, see if our girlfriend is cheating, spy on suspicious neighbors, evade antivirus detection, and more.

How To: Install memory in a 13" MacBook Pro (2009)

This video demonstrates the installation of memory in a 13” Macbook Pro (mid 2009 model). It’s easy to perform and takes about 10min time. You’ll require a #00 Philips screwdriver (available in the Newer Technology 11- piece tool kit). Take care to work in an anti-static work space. Close the Macbook Pro and flip it over with the hinge side up. You can note 10 screws along the border. Start unscrewing the 3 screws on the right on the top edge, these are longer than the rest. Now unscrew the r...

How To: Write a macro by hand in Excel for beginners

The speaker in this video introduces the concept of macros used in Excel, very simply and lucidly. Two sets of shortcut keys are used, one set to create the macro and the other set to run it. The first shortcut opens up the VBA window (Alt+F11), with a workbook along with the 3 default sheets. This video puts the macro in a module. The procedure starts with typing sub and a name which can be easily recalled. The rules for naming the macro are also covered briefly. After the macro code is writ...

How To: Use the regression analysis module

Are you in real estate? Take a look at this instructional video and learn how to run your excel spreadsheet over a regression analysis module. An appraiser who's appraising a house decides to run a multiple regression analysis as an addition to the direct sales comparison approach. The spreadsheet used in this tutorial was written in excel, but could be rewritten in another format. The spreadsheet was exported from an MLS. Once the excel sheet is downloaded, the appraiser will open up the reg...

How To: Build a Drupal photo-sharing website

In this video tutorial, you'll learn to use CKK modules ImageCache and Imagefield to build a system for posting images on your Drupal website. Learn to create a robust and flexible system for handling images and has a bright future with more modules born every day that tap in. (This micro-lesson depends on prior understanding of the CCK module and the Views module.)

How To: Use a Peltier module to create free electricity from heat

A Peltier module allows you to turn heat into electricity. Because you can place it in areas that are normally warm anyway, the electricity created is "free" in a sense, though it does work best when one side of the module is cold and the other is hot. In other words, all you'll need for this project is the Peltier module and a cooler surface such as soil or water, and a warm area such as a well lit window or warm pan.

How To: Use FileField and jQuery Media modules to host video

Here's a fast lesson in hosting video on your own Drupal website using the FileField and jQuery Media modules. The Filefield and jQuery Media modules are a one-two knock out combination for allowing users to upload media files to fields in your custom content types and then playing back the media files in their matching player or handler. It represents a positive direction for treating fields containing files and is a great starting point for researching your own implementation of this recipe.

Xposed 101: How to Install Unofficial Modules

The Xposed Framework has an official repository for downloading modules which can be easily accessed by searching the Download section in your Xposed Installer app. But not every module is available on the Xposed repo — in fact, many unique and interesting modules are only hosted on third-party servers.

How To: Create a tetrahedra origami with five intersections

Origami purists will argue that all origami creations, no matter how complex, should be folded from one single sheet of paper, but the rules were made to be broken, right? If you've already mastered the art of one-sheet origami projects like frogs and cranes, challenge yourself to this project: a tetrahedra composed of five intersecting pyramidal shapes.

How To: Install memory in a 17" MacBook Pro

This video from OWC presents how to install memory in a 17" Macbook Pro.The operation will take about 15 minutes and doesn't require an experienced user.First you need to provide all necessary anti-static precautions - discharge static electricity, use static-free surface.You'll need #00 Phillips screwdriver and nylon pry tool.You can find these in the Newer Technology 11-piece tool kit.To start, shut down the computer, close it and flip it over.You will need to remove 10 screws. Use #00 scre...

How To: Use modules when working with Joomla

Go to your Joomla admin page. Now go to extensions, module manager. Now on that page, click on new. Now select login button and click on next. Now type the name and set the position, it depends on the template you use like if you have the help file of that template, you can figure it out by checking that but many free template does not contain the help file. So for now, set the position left and click on save. You can arrange the order of your modules just by clicking the up icon or just by e...

How To: Remove the macro warning in Excel

In this video tutorial, viewers learn how to remove the macro warning in Microsoft Excel. When you see the warning, click Enable Macros. Then right-click on of the sheet tabs and select View Code. Open the Modules folder menu. Now right-click on the module and select Remove Module. Click No to prevent the Module from exporting as a saved text. To go back to Excel, click on File and click on Close and Return to Microsoft Excel. Click on Save to save your workbook. This video will benefit those...

How To: Quickly Gather Target Information with Metasploit Post Modules

Post-exploitation information gathering can be a long and drawn-out process, but it is an essential step when trying to pivot or establish advanced persistence. Every hacker should know how to enumerate a target manually, but sometimes it is worth it to automate the process. Metasploit contains post modules that can quickly gather valuable information about a target, saving both time and effort.

News: The Complete List of Marshmallow-Compatible Xposed Modules

The Xposed Framework was just recently made available for Android Marshmallow, but everything isn't quite back to status quo just yet. Sure, some Xposed modules function properly, but others are a bit buggy, and several don't even work at all. This is mostly a result of changes to the Android system that Lollipop modules relied upon, and such modules will need to be updated for Marshmallow compatibility.

How To: Repair a MacBook Air - Airport module removal

Accidents will happen. This brief how-to will guide you through the process of removing the AirPort module from your MacBook Air both quickly and efficiently without damaging any of the components, the first necessary step of any successful repair. This tutorial will also be of use to those who wish to learn more about the guts of their MacBook Air laptops without actually disassembling their computers.

How To: Install memory in a 2009 Mac Pro

MacOSG demonstrates how to install memory in a 2009 Mac Pro. When performing this upgrade, be sure to take precautions for static by discharging static electricity before beginning. Shut down, unplug and place the Mac Pro on a static-free surface. To access the memory, you need to open the side access door by lifting the latch located on the rear of the Mac until it locks in the open position. You can then the door forward and then remove from the body. The memory is attached to the processor...

How To: Get Twitter's Emojis on Any Android Phone

The art of emoji — the next level beyond the simple text-based emoticons we used once upon a time in the not so distant past. We rely upon emojis so much in our always-connected world of today simply because they help portray emotion into our typed out words. They've not been around very long, but have taken the world by storm just as quickly as they made their first appearance in our society.

Prev Page