Addresses Search Results

How To: Allow emails from known people in AOL 9 & block others

In this video the instructor shows how to allow email from people you know and block emails from all other users in AOL 9.0 for Windows. To do this, first open your AOL mail box. Go to the Mail Options menu and select the option "Block Unwanted Mail". This pops up an "AOL Unlimited Use Area" screen. You have to select "Yes" to proceed. This opens the Mail and Spam controls window. Now scroll down in the window till you find an "Additional Spam Filters" heading. Now there is a Select Filter ov...

News: Rule #1 for Surviving Somali Pirates: Lay Off the Doobie

Though it's unlikely you'll ever have a need for hostage survival skills, it never hurts to take in a few tips on what to do in the event of being accosted by Somali pirates off the Horn of Africa. Wired has tracked down a HowTo guide that addresses such a scenario. Though most of the advice is fairly general, one important point addresses the dangers of lighting up with the enemy:

How To: Get Free Wi-Fi from Hotels & More

Often times when staying at a hotel or anywhere for that matter, you'll whip out your laptop and check the local area for Wi-Fi. I know you've all been in my shoes when you find an unsecured network that appears to be public Wi-Fi belonging to the hotel or airport, and you connect to it. You connect fast and perfectly, only to find that when you open your browser, it says you don't have an account, and are filtered from accessing the web. This is because the owners of the network want to keep...

News: Secure Your Wireless Network from Pillage and Plunder in 8 Easy Steps

Wireless networks. Nowadays, everyone uses 'em, but most don't secure 'em. On average, I can drive up and down any block in my city and find at least one or two open or semi-open networks on any given day. With some changed MAC addresses for good measure, an attacker can use your network as a spring board for who knows what. When the police come a few days after, they are coming to your door—and not to talk about how nice your lawn is. Don't be that guy.

News: ShouldIChangeMyPassword.com

Unless you avoid the news entirely, you've almost certainly heard about the hacking sprees that have been taking place over the past several weeks. Tens of thousands of usernames, passwords and email addresses have been released online for anyone to download. Thankfully, it seems that one kind soul has put all that compromised info to good use.

News: Learning (and Teaching) The Use of BCC in Emails

A few years back, I wrote an article, in fact mostly to my family and friends, titled "The Evil Power of To:". I was referring to all the folks sending emails out willy-nilly to all their friends with no regard for whether or not you or I would want our email addresses boldly displayed on the "To:" line of an email. This article very pointedly explains what BCC: is and WHY you should always use it when sending out emails to more than one person. Check it out!

How To: Use the UCSC Genome Browser

In this video tutorial series, you'll find instructions for using the UCSC Genome Browser. More specifically, this video addresses (1) getting DNA sequences, (2) using annotation tracks, (3) locating intron-exon boundaries, and (4) searching with BLAT. For further detail about any or all of the above topics, and to get started using the UCSC Genome Browser yourself, take a look! Use the UCSC Genome Browser - Part 1 of 4.

Don't Get Doxed: 5 Steps to Protecting Your Private Information on the Web

If you follow the Anonymous, Occupy, and IT security scenes, you have no doubt heard about a dox release. What is it? How can it hurt you? And most importantly, how can you protect yourself from it? Some of these steps might seem common sense, while others will be an ah-ha! moment. Your private info is both your biggest weakness and your biggest weapon in your battle to remain anonymous. You must learn how to use it as both.

News: Google+ Finally Improves Comments

One of the biggest complaints people had about Google+ was comments on popular people's posts taking over their streams. Today Google addresses those issues by rolling out the ability to collapse and expand comments. +Jonathan Terleski explains the simplicity of the function - click once to expand, click again to collapse. Check out how the collapsed comments work in the screenshots below. It's as simple as clicking an arrow.

News: You Don't Need to Be a Hacker to Hack with This Android App

Security awareness seems to be a hot topic these days on the web, with developers making apps and devices that can hack networks and machines with just a few clicks. But these applications aren't only exploiting security flaws in systems and networks, they're being used by amateur and wannabe hackers who want to have a little fun, but don't want to learn how to actually "hack" anything.

How To: Transfer Your Facebook Friends to Google+ (And Vice Versa)

On the same day that Google launched their new social network, Google +, a team of Google engineers calling themselves the Data Liberation Front announced their first service on Tuesday—Google Takeout, a product that allows users to easily move their data in and out of Google products, including Buzz, Contacts and Circles, Picasa Web Albums, Profile and Stream (the equivalent of Facebook’s newsfeed).

News: Shadows of the Dammed Trailer

Remember Grindhouse, the Quentin Tarantino & Robert Rodriguez homage to B films? Well this game is just like that. It could literally pass off as the third feature in that movie. The action looks clunky, the acting is not the best, but it still looks like a fun ride. It comes out tomorrow (June 21st) and I'll have first impressions ready the next day.

News: The World's First Teensy, Weensy 3D Printed Bikini

For the hefty price of $200 and up, you can be the proud owner of the world's first 3D printed bikini. And not just the first bikini, but reportedly the first functional and affordable item of ready-to-wear 3D printed clothing on the market. Created by Continuum Fashion, the N12 3D printed bikini is revolutionary because it addresses the technical challenge of creating flexible "textiles" with 3D printed material. The bikini is made of a material called Nylon 12, which is entirely waterproof.

News: The Future of the Book Might Work Something Like This...

There are endless possibilities for eReaders, and lots of amazing things are already happening. But wow-worthy visual tricks aside, how can technology really change the way we consume books? In the video below design company IDEO presents three separate concepts for virtual consumption: Nelson, Coupland and Alice. IDEO groups their virtual experiences into three separate concepts: Nelson, Coupland and Alice. Core77 breaks down each concept:

News: Get Out of Farmville! Dr. Phil Treats an Addict

Facebook games have become a worldwide, web-wide addiction. Just take a look at all the tutorials on WonderHowTo alone. For most of us it's just fun and games (literally), but some have an addiction that merits the attention of the (perhaps officious) Dr. Phil. In a recent episode, Trends for 2010: The Good, the Bad, and the Ugly, Dr. Phil takes on a mother with a serious Farmville addiction.

How To: Add Your Gmail Inbox to Your Google Search Results

Google is rolling out a new feature that will integrate your Gmail account with Google searches. The feature will add results pulled from your email correspondences to create more "personalized" Google search results. Google is currently doing a test run of the service. To activate it for your account, head on over to this page to sign up. It's currently restricted to the English version of the site, and for those with @gmail.com email addresses (not available on Google Apps accounts). And be...

News: Mobile Game Developer Fined $50,000 by FTC for Soliciting Emails from Minors

Children under the age of 13 possess insight that can blow the minds of their elders, but not the wherewithal to make important life choices for themselves. This is exactly why there are strict rules against marketing cigarettes to them. In 2000, a law went into effect called the Children's Online Privacy Protection Act that institutes similar consumer protections for our youth's online identities, prohibiting companies from soliciting personal information from children under 13 years of age ...

News: Should You Change Your Password? Find Out If You've Been Hacked or Not

Six months ago, 1.3 million registered users of Gawker Media had their passwords compromised when the site was hacked by Gnosis. The passwords were encrypted, but 188,279 of them were decoded and made publicly available for all to see. Just three weeks ago, Sony Pictures was hacked by LulzSec, with 1 million passwords taken and 40,000 made publicly available. Comparing the two data sets, Troy Hunt found 88 accounts on both sites that used the same email address, and of those accounts, 67% use...