2012 May



Linux

Password Cracking - Linux

Once you’ve got a hold of a Linux password hash, you’ll need something to crack it, and we’ve got just the thing. John the Ripper is a cracker available for both Windows and Linux, and can utilize both brute force and wordlist cracking methods.

Continue reading…

Windows

Password Cracking - Windows

Windows passwords are either LM or NTLM hashes. While you can’t get direct access to the password, you can’t get direct to the password hash and then attempt to crack it. There are quite a few ways, along with quite a few tools to accomplish this task. We’re going to show you just how easy it can be to crack a Windows password if it isn’t secure (complicated) enough.

Continue reading…

Hide / Restore Hotkey

Stealth - Hide / Restore Hotkey

Ever been somewhere where you wanted privacy, because you want to browse the internet freely or play a video but don’t want to get caught? (Like at work? 😉 ) Let us show you how to create the ultimate hotkey macro to allow you to hide all those applications via the click of just one button!

Continue reading…

GBA / NDS / 3DS

Portable - GBA / NDS / 3DS

If you’ve ever wanted to be able to load roms onto your Nintendo Gameboy (GBA, DS, 3DS, etc), then look no further. We’re about to show you just how easy and simple it can be. All you’ll need is a simple tool can a flash cart/card which can be purchased quite cheaply!

Continue reading…

Hide in Images

Stenography - Hide in Images

Ever want to know how pass around secret messages? In this tutorial, you’ll learn how to hide encrypted text inside of images so that not only would the recipient have to know it’s inside the image, but also know the password to be able to make any use of it.

Continue reading…

Hide in Text

Stenography - Hide in Text

If you’ve ever wanted to learn how to hide a secret message inside another message, you’ve come to the right place! Hiding secret messages is every kids fantasy and it’s pretty awesome to learn how to do it even if you’re no longer a kid. Aren’t we all still kids on the inside anyway?

Continue reading…

Bypass Proxies

Browse - Bypass Proxies

So maybe your work or dormitory has an internet proxy that blocks you from being able to browse to certain websites or play video games. When there is a will, there is a way. We’re going to show you how you can get past those pesky proxy servers once and for all!

Continue reading…

Protect Yourself

Peer-to-Peer - Protect Yourself

If you’re torrenting without going through any sort of proxy, then that means your IP address is directly visible to anyone when you connect them to download or seed a torrent. It basically means you have no security or anonymity whatsoever. To remedy this, it’s best to torrent through a VPN proxy service.

Continue reading…