• Daily Blob – Oct 16, 2013 – How the NSA TOR Hack Worked

    Daily Blob – Oct 16, 2013 – How the NSA TOR Hack Worked
  • Keylogging Software Introduction

    For Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
  • TOR Security Concerns and Considerations

    For Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
  • TOR Browser to View Deep Web Sites and Protect Privacy

    For Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
  • Introduction to TOR

    For Classes, Class Notes and Blog Posts: http://www.EliTheComputerGuy.com Join the Conversation at Our Online Community: http://ETCGNetwork.com Visit the Vlog YouTube Channel at: http://www.YouTube.com/EliComputerGuyLive Follow us on Facebook at: http://www.Facebook.com/EliComputerGuy Follow us on Twitter at: http://www.Twitter.com/EliComputerGuy
  • Introduction to the Darknet

    Description: The Darknet is a component of the Deep Web that is shielded from casual web surfing by systems such as TOR and Freenet. When speaking of sites on the Darknet people generally are talking about TOR Services. TOR Services allow you to create your own webserver and have ...
  • Introduction to the Deep Web

    Description: The Deep Web is comprised of all the web pages that Search Engines do not Index. There are numerous reasons why they may not be accessed, but generally the reasons are far less “cool” then people imagine. For more Information on the Robots.txt file you can go here: http://www.robotstxt.org/ For Classes, Class ...
  • Hands On Review of OkayFreedom Personal VPN Service to Bypass Firewalls and Regional Restrictions

    Info Company: Steganos Software (http://www.steganos.com/us/) Product: OkayFreedom (https://www.okayfreedom.com/) Compensation to ETCG: NONE Date Created: June 5, 2013 Overview OkayFreedom is a freemium Personal VPN Service that allows you to bypass network restrictions and firewalls. The free version gives you up to 1 GB of traffic a month, and works very well. Overall the User Interface and ...
  • Introduction to Metasploit for Penetration Testing and Hacking

    Info Level: Beginner Presenter: Eli the Computer Guy Date Created: April 19, 2013 Length of Class: 24:05 Research Assistance: Nullset Computer Co (http://nullsetcomputerco.com/) Tracks Hacking Prerequisites None Purpose of Class This class gives students an overview as to why Metasploit is an important tool for Penetration Testing and Hacking. Class Notes Metasploit is a Framework vs. being a purpose built application. ...
  • Building a Virtual Lab with VirtualBox for Penetration Testing and Hacking Tests

    Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: April 12, 2013 Length of Class: 58:40 Research Assistance: Nullset Computer Co (http://nullsetcomputerco.com/) Tracks Hacking Prerequisites None Purpose of Class Class Notes VirtualBox is owned by Oracle and is Opensource and Free to Use. VirtualBox runs on All Major Operating Systems and Can Run All Major Operating Systems other then OSX. Install ...
  • Introduction to Practical Hacking and Penetration Testing

    Info Level: Beginner Presenter: Eli the Computer Guy Date Created: April 9, 2013 Length of Class: 41:09 Tracks Hacking Prerequisites None Purpose of Class Class Notes The first rule of Hack Club is, “Don’t talk About Hack Club.” Legitimate Reasons to Hack Include: Regaining Access to Systems that Owners have Locked Themselves Out Of (This happens a derpressing amount of the time) Demonstrating ...
  • Hacking to Harvest User Login Credentials Off of the Network for Web Services Using Subterfuge

    Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: April 5, 2012 Length of Class: 15:07 Research Assistance: Nullset Computer Co (http://nullsetcomputerco.com/) Tracks Hacking Prerequisites Ability to Administer a Linux System Solid Foundation in Networking Purpose of Class This class teaches students how to use Subterfuge to harvest credentials sent in clear text to web services over the LAN. Class Notes Subterfuge ...
  • Hacking to Acquire Passwords from HTML Forms Password Boxes

    Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: April 4, 2013 Length of Class: 12:58 Research Assistance: Nullset Computer Co (http://nullsetcomputerco.com/) Tracks Hacking Prerequisites Understand HTML and Web Browsers. Purpose of Class This class teaches students how to display in plain text information in Password Boxes on HTML Forms. Class Notes Use “Inspect Element” tool in any modern web browser to ...
  • Introduction to Kali – The Linux Operating System Built for Hacking

    Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: April 1, 2013 Length of Class: 12:35 Research Assistance: Nullset Computer Co (http://nullsetcomputerco.com/) Tracks Hacking Prerequisites Solid foundation in Linux, Networking and Computer Systems. Purpose of Class This class introduces students to the Kali Operating system that has been developed for hacking and penetration testing. Class Notes Kali is the replacement for ...
  • GoDaddy Down…Real World Ramifications of the DNS Attack

    GoDaddy Down...Real World Ramifications of the DNS Attack
  • LAN Disruption Attacks for Hacking

    LAN Disruption Attacks for Hacking
  • Creating a Phishing Website for Hacking

    Creating a Phishing Website for Hacking
  • Disposable Email for Hacking and Security

    Disposable Email for Hacking and Security
  • Using Web Proxy Servers for Hacking

    Using Web Proxy Servers for Hacking
  • Linux Live CDs for Troubleshooting and Hacking

    Linux Live CDs for Troubleshooting and Hacking
  • Hacking the Windows Registry

    Info Level: Beginner Presenter: Eli the Computer Guy Date Created: January 23, 2012 Length of Class: 23 Minutes Tracks Hacking Computer Security /Integrity Computer Repair Prerequisites Basic knowledge of Windows system administration. (You should know how to reinstall Windows in case you kill your computer.) Purpose of Class This class teaches students how to easily modify the registry to enable and disable ...
  • Introduction to Phishing Email Hacking Attacks

    Please give us a THUMBS UP if you like our videos!!! Donations are Appreciated!!! https://www.paypal.com/cgi-bin/webscr?cmd=_s-xclick&hosted_button_id=XGA9BN4V37QY6
  • Introduction to Hacking

    Info Level: Beginner Presenter: Eli the Computer Guy Date Created: November 3, 2010 Length of Class: 68 Minutes Tracks Hacking Prerequisites None Purpose of Class This class gives an overview of what hacking is and what hackers do. Topics Covered What is Hacking and Who are Hackers Legal Questions for “Ethical Hackers” Planning an Attack Ways to Attack Protecting Yourself from Discovery Class Notes What is Hacking and ...
  • Hacking DNS

    Info Level: Intermediate Presenter: Eli the Computer Guy Date Created: November 1, 2010 Length of Class: 45 Minutes Tracks Hacking Computer Security /Integrity Prerequisites Knowledge of TCP/IP and Domain Name Resolution Purpose of Class This class teaches students how use DNS to redirect computer or network users to alternate websites or servers for security or malicious purposes. Topics Covered How DNS Works Editing the ...

Back to Top