Discovered Search Results

How To: Wear High Heels Without Any Pain

Whether you love or hate wearing high heels, a pair of stilettos can be incredibly painful. You can feel blisters, searing pain, pressure, and stabbing aches long after you kick off those heels, but a really simple trick could help alleviate some of the issues caused by tight-fitting, wobbly shoes. According to Kat Collings of Who What Wear, taping your third and fourth toes (if counting away from the big toe) together with tape will reduce the amount of pain you feel in the ball of your foot...

Hack Like a Pro: Cryptography Basics for the Aspiring Hacker

Welcome back, my rookie hackers! As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be able to crack passwords and encrypted protocols such as SSL and wireless, you need to at least be familiar with the concepts and terminology of cryptography and encryption.

News: WTF Is Gluten? Finally—A Definitive Answer

Does it seem like everybody you know is declaring that they're gluten-free? Some wonder if the number of people with celiac disease are on the rise or if it's the latest fad diet. And it even goes beyond food: now there are beauty products that tout themselves as being free of gluten.

How To: Patch the Glitchy Mic on Your OnePlus One to Use "Okay, Google" Commands Anywhere

Thanks to a recent back-end update to Google's Search app, every KitKat-running device can use "Okay, Google" from within any app—even the lock screen. However, the default settings for the OnePlus One's mic leave it unable to detect your voice unless you have it right up to your face. That isn't a good look for anyone, but thankfully there is an easy fix to get this working correctly.

How To: Understanding Signature Schemes: How Data Sources Are Authenticated, Secured, & Spoofed

One of the biggest problems in data security is authentication of data and its source. How can Alice be certain that the executable in her inbox is from the venerable Bob, and not from the not-so-venerable Oscar? Clearly Alice wants to know because if this file is actually sent to her by Oscar, the file might not be a game, but a trojan that can do anything on her computer such as sift through her email and passwords, upload her honeymoon pictures, or even turn on microphones and webcams. Thi...

How To: Make the Ringtone on Your Samsung Galaxy Note 2, Galaxy S3, or Other Android Phone Auto Adjust to Your Surroundings

Having your phone ring loudly in a quiet environment could be potentially embarrassing for you, but also quite annoying for everyone else that didn't forget to put their smartphone on silent. Whether it's in class, at work during a meeting, at the library, or a movie screening—you can bet that someone's phone is going to ring loudly, pissing some people off. You don't really want to be that douchebag that interrupts a movie or the middle of a lecture with their annoying ringtone just because ...

How To: SETI Needs Your Help Renaming Pluto's Newly Found P4 and P5 Moons

In 2006, everything that revolved around my world shattered into tiny pieces as I learned that scientists had decided to rescind Pluto's planetary status. Given the ol' Jeff Probst treatment, Pluto was officially voted off our solar system in the blink of an eye, leaving us with only eight planets and a whole load of useless textbooks. The primary reason that Pluto was demoted down to a "dwarf planet" was due to Pluto's largest moon, Charon, being about half the size of Pluto; all the other p...

How To: Make Water Droplets "Levitate" on Water (Using Vibrations)

You can take some really awesome photos of water droplets if you've got a fast enough camera (and flash), but water drops aren't just spectacular as photographic subjects—you can also make them a part of the photographic process by using a water drop as a DIY projection microscope and even a macro lens for your iPhone. But as useful as a water drop can be, it's still way cooler when they're in front of the camera (as the subject). Recently, researchers from the National Autonomous University ...

How To: Install Drywall Anchors

Wall Anchors. Drywall Wall Anchors. Plasterboard Wall Anchors. I discovered these plasterboard (drywall) anchors / plugs a few years ago and think they are fantastic. They are ridiculously easy to use and are extremely effective in attaching fixtures to walls. One of the main things to be aware of (as with all things that have fixtures hanging from them) is the recommended maximum weight loading of each size of anchor. What ever the packet says, adhere to it.

News: Windows 8 Reports Your Downloads to Microsoft, But Is It Really a Security Threat?

Security researcher Nadim Kobeissi has discovered that the Windows 8 SmartScreen feature, meant to screen downloads for malicious software, actually reports the data about which applications users are installing to Microsoft. He also says that "the Microsoft server is configured to support SSLv2 which is known to be insecure and susceptible to interception." The two main concerns are the ability of law enforcement to subpoena Microsoft for the information and of hackers to intercept user data...

News: This Levitating Light Bulb Defies Gravity (And Ditches Unsightly Power Cords)

Helping to prove that science is way awesome, an 18-year old electrical engineering student has successfully made a light bulb float. His name is Chris Rieger, and he's been working on his "LevLight" project for about six months now, with pretty amazing results. This feat of ingenuity was accomplished by using magnetic levitation, although that over-simplification masks how considerably difficult this undertaking was.

How To: Track a Target Using Canary Token Tracking Links

Canary tokens are customizable tracking links useful for learning about who is clicking on a link and where it's being shared. Thanks to the way many apps fetch a URL preview for links shared in private chats, canary tokens can even phone home when someone checks a private chat without clicking the link. Canary tokens come in several useful types and can be used even through URL shorteners.

How To: Use Maltego to Target Company Email Addresses That May Be Vulnerable from Third-Party Breaches

The easiest way around a security policy is to find users who don't follow it. The Have I Been Pwned database identifies accounts with information breached by major third parties like Yahoo and LinkedIn. With Maltego, hackers can locate breached accounts created using company email addresses, potentially giving attackers access to a company account if the employee reuses a compromised password.

News: 14 Reasons Why You Shouldn't Try Out iOS 11.4 Beta on Your iPhone Just Yet

While there are at least five cool things coming in iOS 11.4, they may not be enough to get you to install the iOS 11.4 beta on your iPhone. Since its initial beta release at the start of April, there have been plenty of known issues and user-reported bugs to deal with. While bugs are to be expected with a beta, you may want to read these before installing this one on your iPhone.

How To: Inject Coinhive Miners into Public Wi-Fi Hotspots

Coinhive, a JavaScript cryptocurrency miner, was reportedly discovered on the BlackBerry Mobile website. It was placed there by hackers who exploited a vulnerability in the site's e-commerce software that allowed them to anonymously mine cryptocurrency every time the website was viewed. There's no doubt Coinhive, an innovative mining method, is being abused and exploited by hackers in the wild.

How To: 5 Annoying Things About iOS 5 (Plus How to Fix Them)

I admit, when the new iOS 5 update for Apple devices was coming out, I had iTunes open all morning with my iPhone 4 attached... waiting... waiting... waiting until finally the new version of iOS was available for download. I stopped everything I was doing and quickly initiated the process of updating my device. After two excruciating hours, my iPhone 4 was finally ready to go and I couldn't be anymore happy. Who needs an iPhone 4S when you've already got iOS 5?

How To: This Secret FaceTime Trick Lets You Zoom with Your iPhone's Camera

With Zoom and Google Meet, you can zoom in using your rear camera on a video call to focus on something far away or to get a closeup view. But in Messenger, Snapchat, WhatsApp, Skype, Instagram, and most other video chat apps, zoom functionality is disabled. And it may appear to be blocked in FaceTime too, but that's not the case — the feature is just hiding in plain sight.