Discover Specific Search Results

How To: Transmit files wirelessly on the Canon EOS 7D

You can easily share and transport your photo and videos on the Canon EOS 7D by using the wireless file transmission option. See exactly how sharing and downloading your files to computers and other devices works in this video. When the digital SLR camera is combined with the WFT-E5A Wireless File Transmitter, transmitting is easy.

How To: Add colorful plants around a mailbox with Lowe's

Mailboxes don't have to look all lonesome, with only the curb to cheer them up. If you have one of those street boxes on a post instead of a house box, the best thing to do to make a happy mailbox is to give it some company. To improve your home's curbside appeal, take your landscaping efforts to the curb and enhance the area around the mailbox. It's a great way to accentuate your landscape.

How To: Make your own lipstick bullet

With thousands of beauty companies out there, we can generally find at least one lipstick shade that makes us look more dazzling than New Year's Eve. But sometimes, whether you need to match your lipstick to your dress or just can't seem to find The One, you need a specific color that no brand carries.

How To: Write left handed

Left handed writing style is not as common as right handed so many people are not sure how to do it neatly. Check out this tutorial for advice on how to improve your grip and posture to make your handwriting perfect. Left handers face many challenges. First of all, most teachers will teach children writing skills more suitable for their right handed classmates, also there are not many left hand specific products on the market, and left handers often have posture problems as they are pushing t...

How To: Wardrive on an Android Phone to Map Vulnerable Networks

Tossing an old Android smartphone with a decent battery into your hacking kit can let you quickly map hundreds of vulnerable networks in your area just by walking or driving by them. The practice of wardriving uses a Wi-Fi network card and GPS receiver to stealthily discover and record the location and settings of any nearby routers, and your phone allows you to easily discover those with security issues.

Hack Like a Pro: How to Crack Passwords, Part 5 (Creating a Custom Wordlist with CeWL)

Welcome back, my novice hackers! In my series on cracking passwords, I began by showing off some basic password-cracking principles; developed an efficient password-cracking strategy; demonstrated how to use Hashcat, one of the most powerful password-cracking programs; and showed how to create a custom wordlist using Crunch. In this tutorial, I will show you how to create a custom wordlist based upon the industry or business of the targets using CeWL.

How To: Do simple bonsai styling

Graham Potter of Kaizen Bonsai shows Bonsai beginners how to make interesting trees from relatively available materials. He first details the history of the specific tree he will be working on. He points out that this specific specimen has small, compact foliage, branches that support itself, craggy bark, and a nice taper in the trunk. He begins to shape the tree by cutting the small amounts of foliage that are dead or weak as well as the foliage grows beneath the branches. He then uses hand ...

How To: Clean your room

Do you win the prize for messiest room in America? That's a difficult contest, but how about messiest room in your house? It’s time to clean your room, so do a good job in the shortest amount of time and get your parents off your back.

How To: Do the "Pretzel" swing dance move

Swing dancing dates back to the 1920's, where the African American community, discovered the Charleston and the Lindy Hop, while dancing to contemporary Jazz music. The term "Swing dancing" is used to refer to one or all of the following swing era dances: Lindy Hop, Charleston, Shag, Balboa and Blues and extends to include West Coast Swing, East Coast Swing, Hand Dancing, Jive, Rock and Roll, Modern Jive, and other dances developing in the 1940s and later.

How To: Top 10 Browser Extensions for Hackers & OSINT Researchers

While modern browsers are robust and provide a lot of functionality, they can be unlocked to do some pretty spectacular things with browser extensions. For hackers and OSINT researchers, these tools can be used to defeat online tracking, log in to SSH devices, and search the internet for clues during an investigation. These are a list of my top ten favorite browser extensions for hackers — and how to use them.

News: Apple Fixes Group FaceTime Security Bug with Release of iOS 12.1.4, Available Now

Apple found itself in serious trouble last week when a teenager discovered a critical FaceTime bug that threatened the security of nearly every iPhone user. The bug enabled a user using Group FaceTime to access either the microphone or the camera of a recipient before they answered the call. According to Apple, the issues have been fixed in an iOS 12.1.4 update released Thursday, Feb. 7.