Business Exists Search Results

How To: Make YouTube Music Stop Playing the Music Video Version of Songs

YouTube Music has been around since late 2015, but it only started becoming a viable music service in 2019. It makes sense for Google to utilize YouTube's existing library of music videos, remixes, and cover songs to create one massive music platform. But one downside is you get a lot of the music video versions of songs instead of the album versions. Thankfully, you can change this.

How To: Stop Videos & Live Photos from Auto-Playing in the Photos App on iOS 13

By default, videos in the Photos app auto-play in several instances on iOS 13, making it a great way to get a quick, extended glimpse when you're browsing. But this isn't always ideal — especially when you're flipping through private or embarrassing videos and other eyes are on your screen. Fortunately, Apple has an easy way to disable this feature.

How To: Create Lists of Locations Using Collections in Apple Maps for iOS 13

Apple Maps has had a rocky history since its introduction, which included limited features and questionable data, earning it a reputation as a lesser alternative to Google Maps. Since then, Apple has worked to close the gap, and in iOS 13, they're introducing Collections, which allow you to create groups of locations on your iPhone that you can then quickly access and share with others.

News: New Evidence Implies Apple Pencil May Work on the New iPhone 11 Models

Although styluses and smartphones have existed together for years, the iPhone has always ignored the pairing. After all, "Who wants a stylus?" But ever since the Apple Pencil made its debut on iPad, the rumor mill has churned out the idea that an iPhone could one day see stylus support. That day will probably come with the release of iPhone 11, and there's a good indicator to make its case.

How To: Use Metasploit's Timestomp to Modify File Attributes & Avoid Detection

It is said that the best way to avoid detection when hacking is to leave no trace, and often that means not touching the filesystem at all. But realistically, in most cases, it's impossible not to interact with the filesystem in one way or another. The next best thing to do to throw off any investigators is to change the file attributes to hide activity. We can do this with Metasploit's Timestomp.