Web content is what makes the web pleasing. With the struggles of companies andsoftware over the rights of music, movies, television shows, etc. web designers today, arestill inadvertently posting media for download. Even large corporations as in the exampleshere in this paper have poorly constructed web servers. Modify your rights and permissionsif you are going to post embedded media. There are ways around this methodology I explainand there has been times when I just gave up because the code was extremely well written.This paper is not designed to teach you to be an internet Pirate by any means. As with anyhacking papers, it teaches the “surfer” more about what he or she is actually looking atwhen surfing the web and it teaches the web hosts and designers the flaw. This paper doesnot support unauthorized access into systems, breaking into server systems, or anythingof that nature.Web Detective Hacking, or WDH, is a way of searching through codes to find morecodes. When you finally reach the end of your code search, hopefully, you have a direct link to the media you want. For instance, Milw0rm.com hosts links to code that link to more codethat finally link to a video file. If you enjoy hacking as much as the next computer enthusiastthen you may feel the need to archive your favorite videos for later personal reference.Maybe you want show the video to a friend and with the way technology is changingeveryday, the video may be replaced, or outdated and removed. Now what do you do? Youneed to download it, that's all.Firstly I would like to recognize the fact that this new “methodology” is completelyopen to improvement and change. Not only will the pdf version be readily available, but theopen office document will be available as well. You can edit and improve this document to your liking and skill.