Chat Support Search Results

News: Obama supports drone attacks

In a recent address, Obama supports drone attacks against people 'on the list'. He talks about the people on the list being known of 'going to attack Americans', and who have a 'track record of terrorism'. Let me tell you, targeted strikes will, 90% of the time, have civilian casualties. There is no such thing as a clean strike. But I'll let you decide.

News: Catch Creeps and Thieves in Action: Set Up a Motion-Activated Webcam DVR in Linux

When it comes to webcams these days, most people are using their laptops over desktops. The cameras are centered, integrated, and require no configuring. They're a cinch and usually have great resolution. So, then what do we do with all of those old wired desktop webcams that we've accrued over the years? Even if you still use an external USB one, chances are you're not using it daily, so why not come up with a better use for it?

How To: Remotely Control Computers Over VNC Securely with SSH

VNC is a great protocol that you can use on Windows and Linux machines to remotely control computers. This is useful if you need to control your computer when away from home, help your grandma check her email, or help a client with a disk cleanup. VNC is secure in the sense that it requires authentication in order to make the connection, but after that, the data is sent over the internet unencrypted. This means that an attacker could sniff your traffic and snoop everything that's going on. Th...

News: The Top 10 Must-Have Skyrim Mods

Skyrim really took the cake this year. With its awe-inspiring gameplay, much improved combat and leveling system, and a fresh new look, it's no wonder the game has already received a Game of the Year award. But for hardcore gamers, the fun may be over. You've played the game for thousands of hours, and have exhausted the entire game's main and auxiliary quests. You need more.

How To: Give Your GRand Unified Bootloader a Custom Theme

GRUB, or the GRand Unified Bootloader, is a program that installs to your Master Boot Record and controls what operating system you load at boot time. Normally, it is used for multi-boot systems. Multi-boots allow you to switch between operating systems installed on seperate drives, or partitions at boot time. Linux actually uses it as its default bootloader, even without multiple operating systems.

News: Facebook Takes Cues From Google+ and Adds Better Privacy Controls

After the launch of Google+ and its ensuing attendant fanfare and rave reviews, Facebook seemed to undergo an identity crisis. On July 6th, Facebook failed to make waves with its "awesome" announcement - the new group chat and video chat features felt lame in comparison to the Google+ hangout and huddle features. Facebook also faced ongoing criticism for its perceived lack of privacy controls. Over on Quora, workers confirmed a lockdown of sorts at Facebook, for employees to work harder on fe...

News: No Point In Playing To Level 100!?

Thanks for contacting Zynga Customer Support. I found there are other accounts reporting they don't receive Dinners back when sent. The Game Developers have decided how the Game works and Dinners can only be sent from Players(neighbors) above level 100 back and fort. The Development Team will get you feedback from me, Thanks for reporting this issue.

News: Is Google+ More of a Threat to Twitter than Facebook?

Much of the press around the launch of Google+ has pitted it squarely against Facebook. This was highlighted painfully for Facebook with their (misguidedly dubbed) "awesome" announcements yesterday. Their launch of a new design, video calling, and group chat might have been exciting, had not Google announced its Hangout feature for Google+ a week earlier (and by the way, introduced their own 1-on-1 video calling inside of Gmail way back in 2008). Hangouts took video calling a step further and...

News: Is Open Source Really Insecure?

To go Open Source or go proprietary? There is a common conception that open-source is unsafe and insecure and therefore companies should rather go for proprietary solutions. They think that because software is termed "open-source", that the world can see the vulnerabilities of the software and might exploit it, and less informed people tend to think that open-source software can be modified while it is running.

News: Wild Mustang Problems?

Tip If some of your friends did not get the email, find one of the 5-15 people you selected who did, ask them for the link and fix it using the steps below then share it on your feed so it can get clicked by anyone!

News: Zeiss Compact Prime Lens + Zacuto DSLR Baseplate

Zeiss recently debuted their Compact Prime Lens set at NAB.  The best part: no mount modifications or adapters necessary!  Zacuto has done one better with their new DSLR Baseplate system.  Previous rigs had unwanted play when using the follow focus.  "Zacuto’s new DSLR Baseplate System, debuting at the NAB show in Vegas, mounts to the camera and lens using the standard 1/4 20” screw and ¼ 20 lens support, which gives you two mounting points for rock solid support to the camera & attached prim...

How To: Audit remote password using THC-Hydra

THC-Hydra is a remote dictionary attack tool from The Hacker?s Choice group. It?s a well made tool that supports a lot of protocols and options. The following protocols are supported: TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC, RSH, RLOGIN, CVS, SNMP, SMTP-AUTH, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, LDAP2, LDAP3, Postgres, Teamspeak, Cisco auth, Cisco enable, LDAP2, Cisco AAA. Audit remote password using THC-Hydra.

How To: Run a Successful Student Council Campaign

Running a successful student council campaign requires hard work and preparation. Whether you’re part of a candidate’s support group or a candidate yourself, you need to focus and give it all you’ve got. As Vince Lombardi said, “Leaders aren't born, they are made. And they are made just like anything else, through hard work.”

How To: Dropped Your Phone in Water? The Quick Response Guide to Saving Wet Electronics

It's no secret that water and electronics don't mix well, but somehow, people always manage to combine the two. I've had my fair share of water-damaged electronics, everything from cheap headphones to a desktop computer. My devices are getting dunked in water so much, it's like doughnuts in coffee. And I know I'm not the only one. That jam session with your favorite song will end really quick when your iTouch is chilling in the toilet bowl.

News: Block Cell Phone Signals on the Carrier of Your Choice by Hacking a Radio Frequency Jammer

Cell phone jammers, a DIY endeavor for the darker crowd. I'm pretty sure we've all considered having one at some point: whether the obnoxiously loud woman next to you is announcing private bedroom stories to a crowd on the subway, or your kids are grounded from using the phone (and consequently snagged a hidden prepaid phone), sometimes having a cell phone jammer comes in handy.

Goodnight Byte: HackThisSite, Realistic 1 - Real Hacking Simulations

Last Friday's mission was to accomplish solving HackThisSite, realistic 1. This is the first in a series of realistic simulation missions designed to be exactly like situations you may encounter in the real world. This first mission, we are asked to help a friend manipulate the website voting system for a Battle of the Bands vote count in his favor.