File Easily Search Results

How To: Use docking accessories to improve your Motorola Droid Bionic smartphone

The docking accessories available to owners of the Motorola Droid Bionic unlock several different functions dormant in the Android smartphones. The Vehicle Navigation Dock allows you to easily access Verizon's GPS system on the go, or give vocal commands so that you stay safe and handsfree with the Droid Bionic. The HD Station Dock allows you to connect your smartphone to a TV and view photos or use applications on the big screen. This guide by Motorola shows you how to access the different f...

How To: Backup files on a CD in Windows XP

Backing up your files is very smart and important. You'll want to make sure that you copy your files somewhere external just in case something happens to your PC. The easiest and most convenient way to do this is to use a blank CD and burn your programs and files to it. In this video, learn exactly how to do this and keep your documents safe and sound.

How To: Open .rar files on Mac

Mac or PC? PC or Mac? The debate rages on? Unfortunately, this can mean a lot of headaches for you when dealing with different file formats. If you work on both types, you might very well have to open the same file type on different computers. This can be a problem if you are using .rar files. But this video can help you. This tutorial will show you how a simple download can enable you to open .rar files on a Mac.

How To: Translate documents in Microsoft Office: Mac 2008

If you've ever had to work with documents written in other languages, you know how painstakingly difficult it can be if you're not a fluent speaker of the language. But now, with the help of Office 2008 for Mac, translating those documents is easy. You can know easily translate a PowerPoint presentation in almost any language to almost any language! And you can also translate Word documents, Excel spreadsheets, and even emails in Entourage! This translator is available right in the reference ...

How To: Transfer music files between computers in iTunes 9

How to use Home Sharing in iTunes 9 to transfer music files to another computer. First make sure both computers have iTunes version 9 installed. To check this go to the iTunes 9 menu next to file in upper left and select the about item. On windows machines this will be in the help menu. In the computer with the music files we need to make sure the iTunes library is nicely organized. Again go to iTunes menu, this time open the preferences menu, and advanced icon. Check mark both sections "Keep...

How To: Pick a lock easily with 2 paper clips

ZurplusFaction shows viewers how to pick a lock easily using 2 paper clips. First, you need to take your first paper clip and fold one end out. Fold it out again and straighten this out. Next, take the folded out in and fold in again so it forms boomerang shape with the paper clip. Now, take your pliers and squeeze this folded part together tightly. With a bigger paperclip, and use wire cutters to cut of a straight piece of the paper clip with a curve at the top. Now, you are ready to pick yo...

How To: Manage ESX(i), booting ISO files and more

In this web TV presentation the host is talking about Grub 2. In Grub 2 you can mount an ISO file like a device with the loop back function. In Grub 1 you can use tack tack mem to mount iso files if the files are not fragmented by using the map command. Grub 2 is an application available for download that will be available after download as a chain from Grub 1 to Grub 2 to your operating system. Grub is a program that compresses all of your favorite boot programs into one.

News: 27 Best Productivity Apps to Make Working from Home Less Stressful

In the last decade, the number of people working remotely in the US has increased dramatically, and so has their need for technology and software to supplement that remote work. Whether you work from home or a coworking office space, the requirement for highly compatible and helpful productivity apps is a must if you want to get things done successfully.

How To: Make Pokémon GO Work When You Have TWRP Installed

If you're a root user who has played Pokémon GO over the years, then you're probably familiar with the detection methods used to spoil your fun. The game's developer, Niantic, has publicly mentioned their ongoing battle with rooted Android phones and are unwilling to let up. They have a no-nonsense approach to try and keep you from playing, and they've stepped their game up once again.

How To: Beat LFI Restrictions with Advanced Techniques

One of the most common web application vulnerabilities is LFI, which allows unauthorized access to sensitive files on the server. Such a common weakness is often safeguarded against, and low-hanging fruit can be defended quite easily. But there are always creative ways to get around these defenses, and we'll be looking at two methods to beat the system and successfully pull off LFI.

How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack

Cracking the password for WPA2 networks has been roughly the same for many years, but a newer attack requires less interaction and info than previous techniques and has the added advantage of being able to target access points with no one connected. The latest attack against the PMKID uses Hashcat to crack WPA passwords and allows hackers to find networks with weak passwords more easily.

How To: Drag & Drop on Your iPhone

Apple first added a "Drag and Drop" feature to iPads in iOS 11, but your iPhone can do a little of the magic, too. It's just not so obvious. While you can't drag and drop items from one app to another like you can on an iPad using Split View and Slide Over, you can move things around in certain stock applications. And it works the same whether you're using iOS 11, 12, or 13.

How To: Load & Use Keystroke Injection Payloads on the USB Rubber Ducky

Keystroke injection attacks are popular because they exploit the trust computers have in human interface devices (HIDs). One of the most popular and easily accessible keystroke injection tools is the USB Rubber Ducky from Hack5, which has a huge range of uses beyond simple HID attacks. The USB Rubber Ducky can be used to attack any unlocked computer in seconds or to automate processes and save time.

How To: Punchabunch Just Made SSH Local Forwarding Stupid Easy

SSH local forwarding is a must for covering your tracks and getting out there to do your work. Also called SSH tunneling, this process will put one or more steps between your machine and the machine you're working on, for security and other purposes. It can be a bit daunting for newbies to get down, and that's where Punchabunch comes in.