Hacking

  • Daily Blob – Oct 16, 2013 – How the NSA TOR Hack Worked

    Daily Blob – Oct 16, 2013 – How the NSA TOR Hack Worked - YouTube thumbnailDaily Blob – Oct 16, 2013 – How the NSA TOR Hack Worked
  • Keylogging Software Introduction

    Keylogging Software Introduction - YouTube thumbnailFor Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
  • TOR Security Concerns and Considerations

    TOR Security Concerns and Considerations - YouTube thumbnailFor Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
  • TOR Browser to View Deep Web Sites and Protect Privacy

    TOR Browser to View Deep Web Sites and Protect Privacy - YouTube thumbnailFor Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
  • Introduction to TOR

    Introduction to TOR - YouTube thumbnailFor Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
  • Introduction to the Darknet

    Introduction to the Darknet - YouTube thumbnailDescription: The Darknet is a component of the Deep Web that is shielded from casual web surfing by systems such as TOR and Freenet. When speaking of sites on the Darknet people generally are talking about TOR Services. TOR Services allow you to create your own webserver and have ...
  • Introduction to the Deep Web

    Introduction to the Deep Web - YouTube thumbnailDescription: The Deep Web is comprised of all the web pages that Search Engines do not Index. There are numerous reasons why they may not be accessed, but generally the reasons are far less “cool” then people imagine. For more Information on the Robots.txt file you can go here: http://www.robotstxt.org/ For Classes, Class ...
  • Hands On Review of OkayFreedom Personal VPN Service to Bypass Firewalls and Regional Restrictions

    Hands On Review of OkayFreedom Personal VPN Service to Bypass Firewalls and Regional Restrictions - YouTube thumbnailInfo Company: Steganos Software (http://www.steganos.com/us/) Product: OkayFreedom (https://www.okayfreedom.com/) Compensation to ETCG: NONE Date Created: June 5, 2013 Overview OkayFreedom is a freemium Personal VPN Service that allows you to bypass network restrictions and firewalls. The free version gives you up to 1 GB of traffic a month, and works very well. Overall the User Interface and ...
  • Introduction to Metasploit for Penetration Testing and Hacking

    Introduction to Metasploit for Penetration Testing and Hacking - YouTube thumbnailInfo Level: Beginner Presenter: Eli the Computer Guy Date Created: April 19, 2013 Length of Class: 24:05 Research Assistance: Nullset Computer Co (http://nullsetcomputerco.com/) Tracks Hacking Prerequisites None Purpose of Class This class gives students an overview as to why Metasploit is an important tool for Penetration Testing and Hacking. Class Notes Metasploit is a Framework vs. being a purpose built application. ...
  • Building a Virtual Lab with VirtualBox for Penetration Testing and Hacking Tests

    Building a Virtual Lab with VirtualBox for Penetration Testing and Hacking Tests - YouTube thumbnailInfo Level: Intermediate Presenter: Eli the Computer Guy Date Created: April 12, 2013 Length of Class: 58:40 Research Assistance: Nullset Computer Co (http://nullsetcomputerco.com/) Tracks Hacking Prerequisites None Purpose of Class Class Notes VirtualBox is owned by Oracle and is Opensource and Free to Use. VirtualBox runs on All Major Operating Systems and Can Run All Major Operating Systems other then OSX. Install ...
  • Introduction to Practical Hacking and Penetration Testing

    Introduction to Practical Hacking and Penetration Testing - YouTube thumbnailInfo Level: Beginner Presenter: Eli the Computer Guy Date Created: April 9, 2013 Length of Class: 41:09 Tracks Hacking Prerequisites None Purpose of Class Class Notes The first rule of Hack Club is, “Don’t talk About Hack Club.” Legitimate Reasons to Hack Include: Regaining Access to Systems that Owners have Locked Themselves Out Of (This happens a derpressing amount of the time) Demonstrating ...
  • Hacking to Harvest User Login Credentials Off of the Network for Web Services Using Subterfuge

    Hacking to Harvest User Login Credentials Off of the Network for Web Services Using Subterfuge - YouTube thumbnailInfo Level: Intermediate Presenter: Eli the Computer Guy Date Created: April 5, 2012 Length of Class: 15:07 Research Assistance: Nullset Computer Co (http://nullsetcomputerco.com/) Tracks Hacking Prerequisites Ability to Administer a Linux System Solid Foundation in Networking Purpose of Class This class teaches students how to use Subterfuge to harvest credentials sent in clear text to web services over the LAN. Class Notes Subterfuge ...
  • Hacking to Acquire Passwords from HTML Forms Password Boxes

    Hacking to Acquire Passwords from HTML Forms Password Boxes - YouTube thumbnailInfo Level: Intermediate Presenter: Eli the Computer Guy Date Created: April 4, 2013 Length of Class: 12:58 Research Assistance: Nullset Computer Co (http://nullsetcomputerco.com/) Tracks Hacking Prerequisites Understand HTML and Web Browsers. Purpose of Class This class teaches students how to display in plain text information in Password Boxes on HTML Forms. Class Notes Use “Inspect Element” tool in any modern web browser to ...
  • Introduction to Kali – The Linux Operating System Built for Hacking

    Introduction to Kali – The Linux Operating System Built for Hacking - YouTube thumbnailInfo Level: Intermediate Presenter: Eli the Computer Guy Date Created: April 1, 2013 Length of Class: 12:35 Research Assistance: Nullset Computer Co (http://nullsetcomputerco.com/) Tracks Hacking Prerequisites Solid foundation in Linux, Networking and Computer Systems. Purpose of Class This class introduces students to the Kali Operating system that has been developed for hacking and penetration testing. Class Notes Kali is the replacement for ...
  • GoDaddy Down…Real World Ramifications of the DNS Attack

    GoDaddy Down…Real World Ramifications of the DNS Attack - YouTube thumbnailGoDaddy Down...Real World Ramifications of the DNS Attack
  • LAN Disruption Attacks for Hacking

    LAN Disruption Attacks for Hacking - YouTube thumbnailLAN Disruption Attacks for Hacking
  • Creating a Phishing Website for Hacking

    Creating a Phishing Website for Hacking - YouTube thumbnailCreating a Phishing Website for Hacking
  • Disposable Email for Hacking and Security

    Disposable Email for Hacking and Security - YouTube thumbnailDisposable Email for Hacking and Security
  • Using Web Proxy Servers for Hacking

    Using Web Proxy Servers for Hacking - YouTube thumbnailUsing Web Proxy Servers for Hacking
  • Linux Live CDs for Troubleshooting and Hacking

    Linux Live CDs for Troubleshooting and Hacking - YouTube thumbnailLinux Live CDs for Troubleshooting and Hacking
  • Hacking the Windows Registry

    Hacking the Windows Registry - YouTube thumbnailInfo Level: Beginner Presenter: Eli the Computer Guy Date Created: January 23, 2012 Length of Class: 23 Minutes Tracks Hacking Computer Security /Integrity Computer Repair Prerequisites Basic knowledge of Windows system administration. (You should know how to reinstall Windows in case you kill your computer.) Purpose of Class This class teaches students how to easily modify the registry to enable and disable ...
  • Introduction to Phishing Email Hacking Attacks

    Introduction to Phishing Email Hacking Attacks - YouTube thumbnailPlease give us a THUMBS UP if you like our videos!!! Donations are Appreciated!!! https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=XGA9BN4V37QY6
  • Introduction to Hacking

    Introduction to Hacking - YouTube thumbnailInfo Level: Beginner Presenter: Eli the Computer Guy Date Created: November 3, 2010 Length of Class: 68 Minutes Tracks Hacking Prerequisites None Purpose of Class This class gives an overview of what hacking is and what hackers do. Topics Covered What is Hacking and Who are Hackers Legal Questions for “Ethical Hackers” Planning an Attack Ways to Attack Protecting Yourself from Discovery Class Notes What is Hacking and ...
  • Hacking DNS

    Hacking DNS - YouTube thumbnailInfo Level: Intermediate Presenter: Eli the Computer Guy Date Created: November 1, 2010 Length of Class: 45 Minutes Tracks Hacking Computer Security /Integrity Prerequisites Knowledge of TCP/IP and Domain Name Resolution Purpose of Class This class teaches students how use DNS to redirect computer or network users to alternate websites or servers for security or malicious purposes. Topics Covered How DNS Works Editing the ...


















Subscribe to me on YouTube