Connecting Search Results

How To: Instantly Share Wi-Fi Passwords from Your iPhone to Other Nearby Apple Devices

Unless you have unlimited cellular data, you probably connect your iPhone to every Wi-Fi network you come across. It could be a local coffee shop, public library, or just a friend's place. Wherever it is, you'll need to ask for the access point's password if it's a secured network, and that can be a hassle if the place is busy or the owner forgets the credentials. Luckily, Apple has a solution for this problem.

How To: Sing "Twinkle Twinkle Little Star"

All of us remember "Twinkle Twinkle Little Star" for a reason. As a fond part of our childhood, it was a song that taught us about the wonders of the sky while also connecting us with our parents, who learned the song from their parents before them. Continue the tradition by teaching your kids how to sing "Twinkle Twinkle Little Star."

How To: Create an Evil Access Point with MitmAP

The threat of an evil access point has been around for a long time, and with the rise of open public Wi-Fi, that threat is often overshadowed by how comfortable we are using third-party Wi-Fi hotspots at coffee shops and public spaces. While we've shown an evil twin attack using the Aircrack-ng suite of tools, MitmAP is a Python tool to configure custom APs for many types of wireless attacks.

How To: Control Anything with a Wi-Fi Relay Switch Using aRest

A relay is an electrical component that works like a light switch, where it's turned on or off with an electrical signal. By connecting a relay to a Wi-Fi connected microcontroller like an ESP8266, you can build a connected switch that can be controlled from the web browser of any device connected to the same Wi-Fi network — all for just a couple of dollars.

How To: Turn Your Raspberry Pi into a Wireless Hotspot

When hacking into a network during a penetration test, it can sometimes be useful to create your own wireless AP simply by plugging a Pi into an available Ethernet port. With this setup, you have your own backdoor wireless connection to the network in a matter of seconds. Creating an AP is also helpful while traveling, or needing to share a connection with a group of people.

How To: Transfer Your Apple Music Playlists to Spotify from an iPhone or Android Phone

Switching from one popular music streaming service to another shouldn't have to be a hassle, but it is if you want to transfer all your favorite music over. No popular service offers a built-in feature to export or import playlists, so if you want to move your favorite Apple Music playlists over to Spotify, you'll have to use a third-party service.

How To: Disable the 'Unlock iPhone to Use Accessories' Notification in iOS 11.4.1 & Higher

If you're on iOS 11.4.1 or iOS 12 and go more than an hour without unlocking your iPhone, an "Unlock iPhone to Use Accessories" message will appear whenever you connect your iPhone to a computer or other device that tries to use the Lightning cable's data lines. This is to protect you, but it can be annoying if you have no reason to believe that law enforcement or criminals will have access to your iPhone.

Raspberry Pi: Physical Backdoor Part 1

This tutorial is one technique to use the full functionality of your Pi. The small size makes it ideal for inside hacks, but still has the capabilities of a average desktop or computer. I should mention that a tutorial that OTW has done, but I'm gonna take it a step further. OTW made a brilliant article, but only touched on the surface of the possibilities. I hope this article will both show you many the possibilities and also allow you to start causing havoc, but I'm planning on making this ...

How To: Improve the quality of movement in a tango dance

In this video, we learn how to improve the quality of movement in a tango dance. Focus on the connection with the other person, the music, and connecting with the body as you are dancing with the other person. Be very strong and heavy into the ground as you are dancing and very light as you are moving around. Do a strong walk and make sure you are in touch with the rhythm but also make sure your body moves lightly around the dance floor, like it's effortless. Keep your body in contact with th...

How To: Transfer music from iPod to iTunes Library

In this video tutorial, viewers learn how to transfer music from an iPod to the iTunes library. Begin by connecting the device to the computer. Then click on the Start menu and open Control Panel. Now click on the device. Click on Tools and select Folder Options. Then click on the View tab and check "Show hidden files and folders". Click OK. Now open the iPod_Control folder and open the Music folder. Finish by simply opening all the folders and importing the music files into iTunes. This vide...

How To: Draw Mickey Mouse on a dry-erase board

In this video, we learn how to draw Mickey Mouse on a dry-erase board. Start off by drawing a circle on the left hand side of the board, then draw a half circle with another circle connecting to that on the right hand side of the board. Now, connect another half a circle around the sides, to help shape the face. Next, make an "m" shape on the top of the face going down to the sideburns and fill this in. Color in the ears as well, then make a rounded v-shape at the bottom of the face to make t...

How To: Perform a two handed suture tie on an animal

luvk9ines gives a tutorial on how to tie a two-handed suture tie for veterinary purposes. To begin the two-hand suture tie, knot the two ties together and continue to knot but you will alternate the direction of each knot. One knot/tie will be interlinked from the top and the next knot will be interlinked from the bottom. In other words, pretend that you are making a knot on a tie and each time you make the knot, the tie on the left will be going in the bottom direction. The next knot, the ti...

How To: Sync contacts between a Mac and Windows Mobile device

In this video tutorial, viewers learn how to sync contacts between a Mac and Windows mobile device. Users will need to download and install the program, Sync Mate 2. Begin by opening the program and connecting the device to the computer. Under Synchronization in Plug ins, check the Contacts box. Then select the Synchronization direction, Surname and name order and select which contact groups to sync. Then click on Delete all contacts and select to delete the contacts on the computer or mobile...

How To: Use your left arm properly in a golf swing

This is a Sports category video tutorial where you will learn how to use your left arm properly in a golf swing. The video tutorial is from Golf Link and is presented by Jim Ballard. Keep the left elbow always pointed down to the ground. The club face is controlled by the left elbow. When the left elbow rotates, it also changes your radius and the arch. This can be achieved by connecting the left arm to the shoulder, feeling that you are holding a handkerchief under the left shoulder. Always...

How To: Unlock a locked iPod

In this video tutorial, viewers learn how to unlock a locked iPod. Begin by connecting the iPod to your computer. It should fix itself automatically. If it doesn't press the Start button and select Control Panel. Click on Appearance and Personalization. Under Folder Options, select Show hidden files and folders. Check the box that says "Show hidden files and folders". Click Apply and then OK. Go to My Computer and open the iPod device. Select the Controls folder and click on Device. Delete th...

How To: Make an icosahedron from paper strips

An alternative to origami, here’s a very easy paper design strp icosahedron by Heinz Strobl. Here's a very easy icosahedron to origami. For the strips, use an A4 format paper and cut it in the middle lengthwise. Do so to get 8 strips and then fold strips of 6 squares. It requires 20 strips of 6 squares for the triangles and 30 strips to knot them together (strips of 5 squares also work). Only the knotting strips will stand out, but it is still better to use two colors. You can make a bigger m...

How To: Disable This Wi-Fi Option on Your iPhone to Increase Security & Prevent Unresponsive Apps & Webpages

You're out and about, and nothing on your iPhone will load. A glance at the settings shows a saved Wi-Fi network with full bars that your iPhone had connected to automatically, but you're not getting any internet. If you've experienced this, you're not alone, and there's something you can do about it. You'll even increase privacy and security on your iPhone in the process.

How To: Intercept Security Camera Footage Using the New Hak5 Plunder Bug

In a previous guide, I demonstrated how to extract images from a security camera over Wi-Fi using Wireshark, provided you know the password. If you don't know the password, you can always get physical with the Hak5 Plunder Bug. Using this small LAN tap, we can intercept traffic like images from a Wi-Fi or IP security camera if we can get physical access to the Ethernet cable carrying the data.

How To: Draw a cartoon dog on your computer

Using just the airbrush in MS Paint you can make a cartoon dog on your computer. Start off by making a circular shape using the airbrush, keep at it until it is dark and prominent and then color in the lower half of the circle, this is the nose. Now start making a line from the bottom of this circle downwards, slowly start curving the line at a ninety degrees angle. At the end of this line attach a semicircle to it so that it is perpendicular to the line. Above this line also make three small...

How To: Turn Any Phone into a Hacking Super Weapon with the Sonic

The Watch Dogs video game series came out in 2014, enamoring audiences with the idea of a seemingly magical smartphone that could change traffic signals, hack web cameras, and even remotely control forklifts. This may sound like science fiction, but The Sonic uses a customized flavor of Kali Linux to allow you to unleash the power of Kali from any smartphone — all without the need to create a hotspot to control it.

How To: Set Up a Headless Raspberry Pi Hacking Platform Running Kali Linux

The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, broadcast an FM radio signal, and apparently even fly a goddamn missile into a helicopter.