Prerequisite Search Results

How To: Perform the dance move "the Dip"

Check out this instructional dance video to learn how to do "The Dip". Learn this smooth move to rock in the clubs or at parties. This is a prerequisite for one of the types of freak dancing. Chihoe "Groove" Szeto teaches you popular, fun dance moves step by step in these tutorial videos. Remember to have fun and practice your hip hop skills with this tutorial video.

How To: Perform an impressive wall flip

Want to perform a wall flip? Take a look at this instructional video and learn how to do a wall flip. It would help if you knew how to back flip already, but that's not a prerequisite. To perform this you'll want to run at the wall in a normal running speed. Then jump and place your foot high. Afterwards, you have to rotate. To achieve rotation you must kick up with your other leg that was not planted on the wall and swing back by leaning your head backwards.

How To: Every Mac Is Vulnerable to the Shellshock Bash Exploit: Here's How to Patch OS X

Heartbleed, move over. There's a new bug in town, and this time it's also affecting Mac and Linux computers. It's called Shellshock (its original official title is CVE-2014-6271), and it's currently got a 10 out of 10 severity rating over at the National Cyber Awareness System. While some updates have been issued to fix this bug, they were incomplete, and your system is probably still vulnerable, as it has been for the last probably 20 years.

How To: Enable the Swipe-Back Gesture for All Apps on the Galaxy Note 2 & 3

While some Android applications have built-in gestures that allow you to perform certain actions, it's not a feature that's been comprehensively, let alone consistently implemented. If you're on Twitter or Facebook and you want to go back, the only global way is by tapping on the capacitive back button at the bottom of your device. Thanks to XDA dev PeterCxy, you can now enable a global swipe back gesture on your Android smartphone or tablet, making it easier than ever to backtrack within apps.

How To: Learn to Code Your Own Games with This Hands-on Bundle

We've shared a capture-the-flag game for grabbing handshakes and cracking passwords for Wi-Fi, and there are some upcoming CTF games we plan on sharing for other Wi-Fi hacks and even a dead-drop game. While security-minded activities and war games are excellent ways to improve your hacking skills, coding a real video game is also an excellent exercise for improving your programming abilities.

How To: Get CyanogenMod's 'Caffeine' Feature to Keep Your Screen Awake Longer at the Press of a Button

Sometimes it's the smallest feature in your smartphone that makes the biggest difference in user experience. Take screen timeout, for instance. You can probably think of plenty of times when your handset's display blacked out while you were in the middle of something. You could have been cooking with a recipe on the screen or looking at chords while you learned a new riff on your guitar.

How To: Get Rid of the Annoying "High Volume" Alert When Using Headphones on Your Samsung Galaxy S4

When you were younger, you probably had your parents bugging you not to have your cassette player headphones up too loud. For all you younger readers out there, it was probably a CD player. The even younger readers likely had an iPod or other MP3 player. Either way, your parents didn't want you to mess up your hearing, blasting that Limp Bizkit in your ears (wow, I'm showing my age here).

How To: Use LinEnum to Identify Potential Privilege Escalation Vectors

The art of privilege escalation is a skill that any competent hacker should possess. It's an entire field unto itself, and while it's good to know how to perform the techniques involved manually, it's often more efficient to have a script automate the process. LinEnum is one such script that can be incredibly useful for privilege escalation on Linux systems.

How To: Security-Oriented C Tutorial 0xF8 - PE File Infection

How is it goin', fellow 1337 haXX0rZ! dtm here with another article, this time, we'll be looking at infecting PE files, executables in particular for this write-up. Obviously some prerequisite knowledge will be needed since this isn't really newbie-friendly. If you are still a beginner, fear not, it might still be interesting to read! Hopefully!

How To: Upgrade a Normal Command Shell to a Metasploit Meterpreter

When attempting to compromise a target, we want as much control as possible over the victim. Metasploit's meterpreter allows us to have immense control over the victim, the only issue is that sometimes we can't land a meterpreter. We may only be able to land a standard shell, but fear not, there is a way to upgrade our shell into the all powerful meterpreter!

How To: Brute-Force SSH, FTP, VNC & More with BruteDum

Brute-forcing is an easy way of discovering weak login credentials and is often one of the first steps when a hacker finds network services running on a network they gain access to. For beginners and experienced hackers alike, it's useful to have access to the right tools to discover, classify, and then launch customized brute-force attacks against a target. BruteDum does it all from a single framework.

How To: Create a Reusable Burner OS with Docker, Part 1: Making an Ubuntu Hacking Container

Containers are isolated software instances representing applications, servers, and even operating systems—complete with all of their dependencies, libraries configuration files, etc.—and they're taking over the corporate world. The ephemeral, portable nature of containers help them stay current and speedy, and they can work on pretty much any computer, virtual machine, and cloud.

How To: Beginner's Guide to OWASP Juice Shop, Your Practice Hacking Grounds for the 10 Most Common Web App Vulnerabilities

Web application vulnerabilities are one of the most crucial points of consideration in any penetration test or security evaluation. While some security areas require a home network or computer for testing, creating a test website to learn web app security requires a slightly different approach. For a safe environment to learn about web app hacking, the OWASP Juice Shop can help.

How To: What to Do After Your iPhone Is Lost or Stolen — The Ultimate Guide

Your iPhone just went missing, and now you're panicking. You need it for work, to get around, to contact your friends and family, and pretty much everything else in your life. So, what are the chances you might get it back? The odds may be stacked against you unless it's just under a couch cushion, but you can improve your chances of recovering your iPhone by taking certain steps.

How To: Install ceramic floor tile

Ceramic tile floors offer a very attractive and durable alternative to other floor finishes. They come in many different sizes and colors to match the décor of any room and they can provide years of maintenance-free use. Additionally, ceramic tiles are fairly easy to install. Ceramic tiles have one major prerequisite – you must have a smooth and rigid sub-floor to support the installation. Ceramic tiles are not flexible in the least, so they can crack if installed over a rough surface or thin...

Prev Page