Field Typically Search Results

How To: Hide Your IP Address with a Proxy Server

Proxies can be quicker to use than a VPN for specific applications, like web browsers or torrent clients. Both services will hide your true IP address, but a VPN is slowed down because it encrypts all data through a VPN network, while a proxy just acts as a middleman for fetching and returning requests from a server on your behalf. When speed is needed, go proxy.

How To: Force Switch to T-Mobile or Sprint on Project Fi

If you own a Pixel or Nexus device, Project Fi is a great alternative for cellular service outside of the four major US carriers. Project Fi is a Google-managed MVNO, providing service primarily through the T-Mobile and Sprint networks. One of the biggest mysteries on Fi is which network you're connected to at any given time, but there's a simple solution.

Apple AR: Move the AR World with Your Gestures in New Demo

The future is here with a new demo made with Apple's ARKit and LeapMotion. Typically, since ARKit works through your iPhone, in order to move augmented reality objects that are appearing on your screen, you have to drag them with your finger. However, developer Arthur Schiller is now playing around with how you can move augmented reality objects on your phone with gesture recognition, rather than by touching.

How To: Introduction to the C.H.I.P by Next Thing Co - IoT Hacking Device?

Hello NullByte, it's mkilic! This time I'm here with the C.H.I.P from NTC. Although it is not too popular, the C.H.I.P is a brand new micro computer. It is very similar to the Raspberry Pi or Beaglebone Black. The key difference with this particular board is its cost and size. The C.H.I.P only costs $9 and measures 2.5 x 1.5 inches. In addition to this, the C.H.I.P has built in 802.11 b/g/n Wifi and Bluetooth 4.0. Considering these great specs, what could a Hacker use this for? Step 1: The In...

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 10 (Identifying Signatures of a Port Scan & DoS Attack)

Welcome back, my budding hackers! As I have mentioned many times throughout this series, knowing a bit of digital forensics might keep you out of a lot of trouble. In addition, digital forensics is a burgeoning and high paying career. Some knowledge and certifications in this field will likely help you land a Security Engineer position or put you on the Incident Response Team at your employer.

How To: Create Collaborative Reminders on Your iPhone or iPad

Reminding a spouse or roommate to pick up some last-minute groceries is typically done with a quick message that can easily go unnoticed or unseen. Your feeble attempt of a reminder won't work unless it's conveniently sent at the right moment, like when they're on their way home. Chances are, you'll forget to text them and they'll forget the earlier reminder you sent.

How To: Set Separate Sleep/Wake Volumes on Your Samsung Galaxy S4

When I'm not actively using my Samsung Galaxy S4, I typically crank the volume up all the way so I can hear it in my pocket or if I'm in another room. But when it's in my hands and I'm using it, I don't want the ringer to blast at full volume, or any volume at all. Either I'll see a notification come in, or a quick vibrate will call my attention to any pertinent alerts.

How To: Clean and Maintain Your Tape Measure

Recently I was working outside forming a driveway in the rain. Working in and around the wet sand was not friendly on my tools, especially my tape measure. About halfway through the day my tape measure would need "encouragement" in order to retract to the closed postion. Not too much later, with force applied, it would remain standing out at 1ft. and the problem progressively got worse.

How To: Are Your Gadgets Safe from Solar Storms and Nuclear Attacks?

It's September 1st, 1859, and the Earth looks more or less like something out of an apocalyptic movie or Sci-Fi novel. All communications have failed, it's so bright outside at midnight that people are getting up and making breakfast, and people all over the world are seeing auroras. The solar storm that produced the electromagnetic pulse and caused all this mayhem is known as the Carrington Event, and storms like it happen about about once every century.

How To: Get to know your DSLR camera

This video gives viewers an overview on how to use the manual settings of your DSLR camera. Aside from the Auto setting, your DSLR camera has the P-mode which is the program mode, S-mode which is the shutter priority mode, A-mode which is the aperture priority mode and finally the M-mode which is the complete manual mode. P-mode or program mode is more like the Auto-mode in your camera. You can't control your shutter speed and f-stops (aperture) however; you can manipulate the other settings ...