File Encryption Search Results

How To: Use Google Earth

Google Earth is a great tool of the web, if you know how to use it the right way. Learn everything you need to know about using Google Earth in this powerful video series set to show you all the basic maneuvers and tricks to using the well known application. Google Earth is a cross-platform program, so the steps shown in this video series will work on Windows operating systems, as well.

How To: Edit metadata in Aperture

Aperture's metadata inspector is a one-stop location for editing the metadata associated with your images. Some of this metadata is automatically stored within the image files of your digital camera, and aperture automatically reads it when you import your photos. You can add other metadata, such as keywords, yourself.

How To: Adjust date and time in Aperture

All digital cameras automatically record the date and time each photo was taken and store this time stamp as metadata within each image file. In Aperture 2, you can change these time stamps. This is particularly useful if the clock in your camera is set incorrectly or if you're trying to synchronize photos taken by multiple cameras at a single event.

How To: Fix or change song info in iTunes

When you add accurate information about each song, it'll be much easier to browse and find songs in your library. Choose a song, go to the file menu, and click "Get info." You can even add comments of your own to a song's information. These are great tools you can use to organize your music.

How To: Save your DVD project in iDVD

When you save your iDVD project, you can save a version of the project in what's called a project archive. Archives contain all the files, menus, movies, and slideshows that make up your DVD. Once created, the archive can be saved to an external disk, copied to another Mac, or saved on your desktop.

How To: Dual boot Ubuntu Linux using Wubi

This is a easier way to install Ubuntu with out having to partition your hard drive. Wubi (www.wubi-installer.org) allows you to boot into Ubuntu by saving a file to the boot folder in Windows Vista or Windows XP. You can always uninstall Ubuntu easily without any complications to Windows Vista or Windows XP. This is not VM ware.

How To: Hide All Traces of Your Apps & Pictures on Android

Unlike some of the popular app lockers out there, a nifty app fittingly named App Hider completely erases apps, files, and their associated footprints from your smartphone. Think of App Hider as a micro-OS within your smartphone's system. This miniature ecosystem can operate copied apps independently, thus giving it an unprecedented layer of privacy and freedom within your handset.

How To: Root Your Pixel 3 on Android 10

When new Android versions come out, the modding community has to find new ways to root the OS. It's a fun cat and mouse game to follow, but it also means the process of rooting isn't exactly the same as it was the last time you did it. Android 10 changes how root works on a system level for some devices, but luckily, the developers are already on top of things.

How To: Apply OTA Updates on Your Rooted Pixel 2 or 2 XL

So, you rooted your Pixel 2 or 2 XL and everything seems to be working quite well. However, a month passes, and you get a notification to install the monthly security update. Like clockwork, Google has been pushing out OTA security patches every single month for a while, but there is a new problem for you at this point — as a rooted user, you are unable to apply the update correctly.

How To: Perform Local Privilege Escalation Using a Linux Kernel Exploit

Getting root is considered the Holy Grail in the world of Linux exploitation. Much like SYSTEM on Windows, the root account provides full administrative access to the operating system. Sometimes even a successful exploit will only give a low-level shell; In that case, a technique called privilege escalation can be used to gain access to more powerful accounts and completely own the system.

How To: Securely Sync Files Between Two Machines Using Syncthing

Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mitigate these risks, we'll use a secure, open source, and decentralized alternative.

How To: Extract & Back Up All of Your Text Messages on Android

It always helps to be prepared for the worst. This applies to our phones now more than ever, as we depend on them to be our record keepers for text messages from friends, family, and coworkers. If you ever lose or severely damage your phone, having a backup of your precious texts gives you the peace of mind of knowing that you can always get them back.