Fr Print Search Results

How To: Pick a door knob lock with a tension wrench &lock pick

Watch this video conning tutorial and learn how to pick a door lock. Maybe you locked yourself out of the house, or you're just a criminal trying to get in somewhere you don't belong. You will need a lock pick and a tension wrench. To make the lock pick in this video take a hacksaw blade and trace a lock pick onto the surface. Lock pick templates can be printed out all over the internet. Next grind it down to size either with a bench grinder or a dremel. To make a tension wrench take out the ...

News: Always-Updated List of Carriers That Support RCS Universal Profile

In November 2016, the RCS Universal Profile (Rich Communications Services) was introduced. The technology takes text messaging to the 21st century, emulating many of the features found in IM apps like WhatsApp and iMessage, but working through your phone number like regular SMS or MMS. The only thing is, your carrier needs to support RCS-UP to use the feature. Thankfully, the list is growing.

How To: Turn down an invitation

With careful wording you can avoid lying and still avoid going to something that you just don’t want to attend. Even without a good excuse you can politely decline without hurting anyone’s feelings or ending up in an embarrassing situation.

How To: Write Your Own Bash Script to Automate Recon

Automation has been a buzz word for quite some time now, but the principles behind it are as strong as ever. For a hacker or pentester, Bash scripting is one form of automation that cannot be ignored. Virtually any command that can be run from the terminal can be scripted — and should be, in many cases — to save valuable time and effort. And a Bash script just happens to be great for recon.

How To: Python 2 vs. Python 3 — Important Differences Every Hacker Should Know

Python is commonly touted as one of the best programming languages for beginners to learn, and its straightforward syntax and functionality makes that hard to argue with. But a lot of tutorials still use Python 2, which is outdated now. Python 3 introduces many new features, and it's important to be aware of them going forward, as well as the key differences between Python 3 and its predecessor.

How To: Own a Ton of Digital Movies? Let Others Watch Them for Free with Screen Passes

One of the benefits of Blu-ray and DVD is the ability to share discs with friends and family without any hassle. Want to show off your favorite movie? Just lend them your copy. A digital movie isn't so kind, as it's typically locked to the account that purchased it. But now there is a way to share your digitally purchased movies with friends and family — and it won't cost you or them a dime.

Vacationing for the 'Gram: How Instagram Is Changing Hotels & Restaurants

I noticed the neon yellow sign at the new location of Pho Bar in Chinatown right away. The sweeping cursive yellow letters spell out "Crazy Rich Broth"; the same phrase printed on the back of servers' shirts. It's the kind of minimalist but colorful design feature that is especially popular on Instagram at the moment — shots of patrons in front of a glowing sign.

How To: Scan for Vulnerabilities on Any Website Using Nikto

Before attacking any website, a hacker or penetration tester will first compile a list of target surfaces. After they've used some good recon and found the right places to point their scope at, they'll use a web server scanning tool such as Nikto for hunting down vulnerabilities that could be potential attack vectors.

How To: 10 Must-Have Chrome Tools for Lazy Students

Chrome apps and extensions are powerful tools for students: they can help optimize your web browsing experience by helping you take notes, check your grammar as you compose documents and emails, and even help you squeeze a little more juice out of your laptop's battery by freezing unused tabs and optimizing YouTube streams.

News: The Ultimate SCRABBLE Word List Resource

To some, SCRABBLE is just a board game to play during family game night or during a casual get-together. Others think of SCRABBLE as a mere hobby. But with any activity, there will always be fanatics—the ones who would rather sell their soul than stop—the ones with a constant yearning for self-improvement—the merciless.

How To: Draw letters

Drawing is easy for some, harder for others, but drawing letters is pretty simple for both the pro and novice artist. There's all kind of text styles you could conjure up, and they don't have to be boring fonts. Fire up your imagination to create different styles for drawing numbers and letters of the alphabet, adding individuality and pizzazz to names, messages, greeting cards and decorated items.

How To: Zoom in Firefox

No need to get up to get your glasses, or strain to see that tiny text because with a few clicks of the mouse you will be a master at zooming in and out when using Mozilla Firefox browser. Do something nice for yourself today.

How To: Speak basic Japanese

Learn simple Japanese phrases today in this video series with expert Yuu Asakura. Yuu gives you demonstrations for speaking and recognizing Japanese words in print. You will be able to ask questions conversationally, talk about your job, age, friends, and object around the room.

How To: Develop your own film

Whatever your particular bent on the art of photography may be, learn how to use the darkroom as one of your tools for developing and printing beautiful pictures. Our expert will walk you through the step-by-step process for developing film, including removing the film from the cassette, loading it on a spool, using the proper agitation method, prewetting, and the push-pull process.

How To: Audit Web Applications & Servers with Tishna

Penetration-testing frameworks can be incredibly useful since they often streamline certain processes and save time by having a lot of tools available in one place. Of course, the most popular pentesting framework is undoubtedly Metasploit, but there are many others out there that cater to particular needs. For auditing web applications and servers, Tishna comes in handy.

News: Score a New iPhone for Cheap with These Black Friday Deals from Walmart, Best Buy & More

After you've spent your Thanksgiving afternoon working through that turkey, mashed potatoes, and three different kinds of pie, you might find yourself heading to the mall to claim some unbeatable Black Friday discounts on iPhone 11, 11 Pro, and 11 Pro Max. You don't have to go in blind, though. Check out our guide below to make sure you're saving as much as possible on the iPhone you really want.

How To: Add, Remove & Reorder the Share Sheet Options on Your iPhone

On iPhones, the share sheet is a powerful yet largely underestimated tool. For the uninitiated, the share sheet is the menu that opens whenever you tap the share button (the box with the up-arrow). This menu features sharing options to first and third-party apps, as well as extra functions like saving, copying, duplicating, and more. Best of all? It's surprisingly customizable.

How To: Use Websploit to Scan Websites for Hidden Directories

Websites are often misconfigured in ways that allow an attacker to view directories that are not ordinarily meant to be seen. These directories can contain sensitive information such as private credentials or configuration files that can be used to devise an attack against the server. With a tool called Websploit, hackers can scan targets for these hidden directories without difficulty.