Dumpster Search Results

How To: Be a dumpster diving freegan

So you recycle your newspapers and plastics. Big deal. “Freegans” are trying to save the environment by living exclusively on stuff in your trash. Here’s how to join them. You will need a willingness to get dirty, a tolerance for eating food from the garbage, and a commitment never to buy anything new. Watch this video tutorial and learn how to dumpster dive and live like a freegan.

How To: Dumpster dive with freegans

What is a freegan? It's an anti-consumer movement, and a way of getting free food by dumpster diving. Get a crash course in dumpster diving with an accomplished Biology professor who demonstrates the lifestyle of a freegan. Watch this video ecology tutorial and learn how to dumpster dive.

Dumpster Drive: Exchange Your Digital Trash with Strangers

Do you ever wonder if the files you're trashing on your Mac are actually trash? Let's say there are 80 million computer owners running Mac OS. If each user trashes at least 10 files each day, that's 800 million deleted files that cease to exist every 24 hours. If that doesn't sound like a lot to you, a month would equal 24 billion junked files, a year—nearly 1 trillion.

HowTo: Dumpster Dive For Gold

Dumpsters make great swimming pools and skateboard ramps, but when they're full of trash, they're pretty valuable, too. You can get a surprising amount of free booty dumpster diving. If you're a penny pincher who values low cost (re: free) functionality, check out Apartment Therapy's guide to mastering the craft. Below, my three favorite insider tips.

How To: Remove carpet to install concrete floors

Bob Harris of decorative concrete institute explains how you can remove your tiled or carpeted flooring for a concrete substitute. He suggests when your removing carpeting that it can be very heavy and advises you to hire someone who can lift and carry it out, or rent a dumpster for easy take away. He states that after the carpet is removed you'll need to remove the adhesive from the floor. You can do this by stripping or grinding, and at other times the use of harsh chemicals may be needed. ...

News: Google Assistant on iOS Is Absolute Garbage

Google Assistant was just released for iOS today. You may know it as the AI-powered assistant that makes Google Home tick, or perhaps you've heard from one of many review sites about how much better it is than Siri. Well, before you run off to the App Store to install Google Assistant, let me save you some time: It sucks.

How To: Social Engineering - Total Guide

Good day to everyone, today I will present some basic and advanced concepts that targets sophisticated attacks on the social basis, also I will write about some steps that can prevent this attacks from occuring, basically we will examine Social Engineering from the angle of attacker and victim, some people who are interested in security and work for middle-sized companys can learn and use something interesting from this post.

Hack Like a Pro: The Hacker Methodology

Welcome back, my neophyte hackers! Many newbie hackers seem to be confused regarding the process or methodology to employ a successful hack. Most want to simply go straight to the exploit without doing the due diligence to make certain that the hack will work and you won't get caught.

How To: The Fastest Way to Remove the Background from Your iPhone Photos

You might think your photo is amazing, but in the midst of editing it and getting ready to post it on social media, you notice something in the background. Maybe it's an unwelcome stranger or a wide-open dumpster, or it's the entire backdrop, but suddenly you realize that it's bad. Although you look good in it, the background just doesn't work — which is why you can always get rid of it.

How To: Use a Virtual Burner Phone to Protect Your Identity & Security

Every time you make a call or send a text, you're giving the recipient your phone number. This can be quite the security vulnerability, opening yourself up to scammers, spammers, and the feds. In this how-to, we'll look at what a burner phone is, why you might want one, and how to get started using a free second phone number on your regular smartphone.

How To: Conduct a Pentest Like a Pro in 6 Phases

Penetration testing, or pentesting, is the process of probing a network or system by simulating an attack, which is used to find vulnerabilities that could be exploited by a malicious actor. The main goal of a pentest is to identify security holes and weaknesses so that the organization being tested can fix any potential issues. In a professional penetration test, there are six phases you should know.

Next Page
Prev Page