Engineer Search Results

How To: Use Cerberus to Take Control of Anyone's Android Phone

If you need to hack an Android device, try a remote administration tool. Known more familiarly as a RAT, there are open-source RATs that are barebones and exorbitantly priced RATs that are more polished. There are also low-cost and polished RATs that aren't intended to be RATs at all, such as Cerberus, an anti-theft solution available right on Google Play.

How To: Make Spoofed Calls Using Any Phone Number You Want Right from Your Smartphone

Spoofed phone calls originate from one source that's disguising its phone number as a different one, and you probably get these calls all the time. Maybe they're numbers from your local area code or for prominent businesses, but the callers are just hijacking those digits to fool you into picking up. Turns out, making a spoofed call is something anybody can do — even you.

How To: Use iOS 15's Built-in Authenticator as a Secure 2FA Method for All Your Accounts

Most websites and apps support two-factor authentication (2FA), which adds an extra layer of security to your accounts by requesting another form of identification beyond username and password. The second factor can be a recovery code, physical security key, or one-time password (OTP) that only you can access, even if someone else has your password. This process is easier than ever thanks to iOS 15.

How To: Dial These Secret Codes to See if Someone Is Hijacking Calls & Texts on Your iPhone

Malevolent hackers can divert your incoming calls and texts to any number they want, and they don't need to be a criminal mastermind to do it. Even friends and family members can reroute your incoming calls and messages so that they know exactly who's trying to reach you, and all it takes is seconds of access to your iPhone or wireless account. These secret codes can help uncover them.

How To: Install & Use the Ultra-Secure Operating System OpenBSD in VirtualBox

OpenBSD implements security in its development in a way that no other operating system on the planet does. Learning to use the Unix-like operating system can help a hacker understand secure development, create better servers, and improve their understanding of the BSD operating system. Using VirtualBox, the OS can be installed within a host to create a full-featured test environment.

How To: Mix music in Logic 8

Self-recording and mixing music today is easier than ever with programs such as Apple's Logic Pro 8. Mix any piece of multi-track music easily and quickly with tips from an experienced studio engineer in these free recording videos.

How To: Install an electric garage door

In this online video series learn how to install electric garage doors from licensed engineer and licensed home inspector Drew Finn as he demonstrates electrical garage door installation including: mounting the door bracket, attaching the rail to the head, installing the drive belt, mounting the wall bracket, attaching the rail to the wall, attaching the head to the ceiling, attaching the door to the rail, installing the electric eye, wiring the head, installing the wall switch, testing the d...

How To: Make and repair audio cables

In this video series, watch as professional sound engineer Kip Bradford teaches how to make and repair audio cables. Learn the tools needed to repair and make audio cables, learn what kind of solder to use, learn the types of connectors and wires to use, how to solder audio cables, how to remove solder from a solder joint, and how to roll audio cables.

How To: Build a home recording studio

In this series of video clips you’ll learn how to build a music recording studio in your own home. Expert musician and studio engineer Arie Pytel shares tips on the various types of microphones, monitors, headphones, and computer recording software that are available. He takes you step-by-step through the process of connecting the mics, MIDI components and other devices you’ll need to start recording your own music. By following the simple steps in these free videos you can build a home recor...

How to Play Dead Space 2: Achievement & Trophy Guide

It's currently 2011, but when you fire up your game console, put your hands on the controller and play the new Dead Space 2 video game, you're warped into the future— into the year 2511— just 3 years after the events that took place in the first Dead Space. And it's sure to be a beautiful, frightening, futuristic experience.

How To: Move A Safe

Moving a 2000 pound safe isn't easy... I was working as manager for a construction company that was performing an up fit on a century old building in downtown Concord, N.C. The owners wanted us to move a two thousand pound (that's a ton!) safe up to the second story so that it could be displayed in their new office. The safe was located between the first and second floors in a small office that was used for accounting purposes in the old days when said building had been a hardware store.

News: Holiday Greetings from Zero Gravity

The crew from NASA's International Space Station wish planet Earth a heartwarming Merry Christmas and a Happy New Year. (Check out flight engineer Cady Coleman's hair. Zero gravity is awesome.) For the nostalgic, the legendary Apollo 8, the first manned mission to the Moon, wishes the world Merry Christmas in s live television broadcast from lunar orbit, December 1968: