Email Address Search Results

How To: Remotely sign out of your Gmail account

Accidentally leave your Gmail open on a public computer terminal? Don't fret. You can have Gmail sign out any unwanted sessions with a click of the mouse. This free video tutorial from the folks at CNET TV will show exactly what to do. Protect your Gmail email account and log out any unwanted sessions with this how-to.

How To: Filter your Gmail with the 'plus' sign

Looking for an easy way to cut down on the spam you receive at your main Gmail account? With plus (+) sign filtering, it's easy! So easy, in fact, that this free home computing how-to can present a complete (and somewhat talky) overview of the process in just over a minute's time. For specifics, and to regain control over your email account, watch this PC user's guide.

How To: Apply conditional formatting to a row in MS Excel

Love Microsoft Excel? This clip contains a tip that just might induce you to. With this free video tutorial from ExcelIsFun, the 80th installment of his "YouTubers Love Excel" or YTLE series of free video MS Excel lessons, you'll learn how to highlight an entire record (row) in a database that matches a bounced email addresss. Learn to love digital spreadsheets more perfectly with the tricks outlined in this free Microsoft Office how-to.

How To: Use apostrophes on a BlackBerry

In this video Darci Lorocque from Swirl Solutions gives a very handy and useful tip for Blackberry users. She says that you don't have to type apostrophes while you are sending text messages or emails or using Blackberry messenger. The apostrophe is automatically typed by the Blackberry. So for example if you want to write the word "Don't", you will simply type "Dont" in your Blackberry and as soon as the space button is hit the apostrophe will be added automatically.

How To: Use the voice activated Blackberry application

Mark from Minneapolis Best Buy Mobile Team walks you through the excellent Vlingo BlackBerry application, which allows you to better manage your favorite searching and networking sites from your mobile phone. Mark explains how Vlingo will get you navigating Twitter, Google, Yahoo, and Facebook with your BlackBerry faster and more efficiently than ever before. Stop fiddling around with your thumbs and free your hands for other things by effectively controlling your email, web searching, networ...

How To: Use BlackBerry Wallet to store personal information

Want to forget about always pulling out your credit card to purchase something on your BlackBerry? There's a little application that can do it all for you? But how? Best Buy has answers. The Best Buy Mobile team explains how to use the BlackBerry Wallet application. This application can store personal information such as credit card information and shipping addresses on a secure website for easy access when shopping online.

How To: Avoid phishing attempts

See what phishing (attempts to steal your online information with fraudulent email and webpages) is all about and read the tips on how to avoid becoming the next victim. In this example a HSBC bank phishing attempt is displayed.

How To: Find Identifying Information from a Phone Number Using OSINT Tools

Phone numbers often contain clues to the owner's identity and can bring up a lot of data during an OSINT investigation. Starting with a phone number, we can search through a large number of online databases with only a few clicks to discover information about a phone number. It can include the carrier, the owner's name and address, and even connected online accounts.

How To: Use Ettercap to Intercept Passwords with ARP Spoofing

ARP spoofing is an attack against an Ethernet or Wi-Fi network to get between the router and the target user. In an ARP-spoofing attack, messages meant for the target are sent to the attacker instead, allowing the attacker to spy on, deny service to, or man-in-the-middle a target. One of the most popular tools for performing this attack is Ettercap, which comes preinstalled on Kali Linux.

Exploit Development: How to Read & Write to a Program's Memory Using a Format String Vulnerability

Format strings are a handy way for programmers to whip up a string from several variables. They are designed to save the programmer time and allow their code to look much cleaner. Unbeknownst to some programmers, format strings can also be used by an attacker to compromise their entire program. In this guide, we are going to look at just how we can use a format string to exploit a running program.

Hack Like a Pro: Advanced Nmap for Reconnaissance

Welcome back, my novice hackers! Reconnaissance is one of the most important preparatory steps to hacking. As I have emphasized many times before here on Null Byte, you must know the operating system, the ports, the services, the applications, and sometimes even the language of the target to be effective. If you haven't taken the time to gather this info, then you are likely wasting your time.

How To: Change the web address of your Facebook profile

Looking for instructions on how to change your Facebook URL? This clip will show you how it's done. Whether you're completely new to the Facebook's popular social networking site or simply require a small amount of clarification on how to perform a particular task on Facebook, you're sure to benefit from this helpful video guide. For more information, including detailed, step-by-step instructions, take a look.

How To: Install heat sinks in you XBox 360 to cool it

The XBox 360 has mammoth cooling problems, and people have devised all manner of products and mods that address that. This video will show you how to install one of those products: heat sinks that will cool your motherboard directly. This will keep you XBox a lot cooler without making a lot of noise like a 12 volt fan mod.

How To: Cook bacon to a crispy perfection

Fatty, soggy, and burnt are words you never want to hear applied to your bacon. Scott Vermeire of Prather Ranch Meat Co. offers a quick and easy primer on bacon perfection. He also addresses the very important question of flipping: when to do it, and how often. Follow along with this cooking how-to video to learn how to cook bacon to perfection every time.

How To: Play no limit Texas Hold'em after the flop

Should you fold your hand or chase the draw when playing Texas Hold'em after the flop? The first three community cards that are dealt are called the flop. This how to video addresses different situations that can occur after the flop. You will learn what hands you should chase and what hands to fold determined by your position. You can play smarter Texas Hold'em poker with these great tips.