Heat Sensitive Search Results

How To: Charge Your Cell Phone with Fire

There are plenty of times when we need to charge our phones but don't have access to electricity. Whether the power is out do to storms, you're camping and run out of juice, or you're in a Tom-Hanks-like Castaway situation, it's important to have a charged phone in case of an emergency.

How To: Safely Put Out a Grease Fire (And Prevent Them Altogether)

Hopefully you never have to deal with a grease fire, but if it happens, how you handle it is important. A grease fire isn't like a regular fire, and trying to put it out the same way can make it worse. Grease fires are caused by letting oil get too hot, so the best way to prevent them is to never leave your kitchen unattended. Oil smokes before it burns, so if you see your pan start to smoke, take it off the heat before it has a chance to catch fire. If you're outside grilling, you can add a ...

How To: Dry Your Soaking Wet Shoes Faster — Without Shrinking Them in the Dryer

Wet shoes are uncomfortable, no one can deny that. Just think about walking around with soaking wet footwear ... and each squishy step you take. Makes you cringe, doesn't it? It can happen in heavy rain, at the beach, or from an unforeseen puddle on the street. And while you can't always avoid soggy shoes, you can rest easy knowing that the next time this happens to you, you know the secret trick to drying your shoes faster without damaging them with excessive heat.

How To: Steampunk Your iPhone! How to Add Your Favorite Art to Apple's Boring Back Glass Panel

Jake von Slatt of The Steampunk Workshop kept breaking the rear glass panel on his iPhone. So, he ended up making his own gorgeous replacement out of brass to replace the standard Apple logo ones who kept getting. The only problem was that it made his signal strength super weak, so he figured out how to transfer the etching onto a glass back. Here's the basic rundown of how he accomplished this feat...

How To: Add 20" human hair extensions

Jennifer Pompa suggests that the 20" easiXtend Elite is the extension to start with. It's an 8 piece extension made with human hair that's not been too processed and so looks very natural. Jennifer is wearing a Kim Kardashian look with flowing curls. The extensions can be purchased as Extensions. Blow dryer, flat iron or curling can be done to these extensions because it's real hair. The extensions come in many colors but also can be dyed to match your hair. To remove them, Jennifer unclips t...

How To: Eliminate last minute pimples with home remedies

This video is about how to get rid of pimples. It's a nightmare to wake up and discover a big, red pimple right on your face. Here are some tips to help you out. 1. Do not touch, or try to squeeze or pop the pimple. This can cause pain, redness, swelling, and even infection. If you keep doing it another possible problem that can develop is scarring which can be permanent. 2. Wash your face gently with a mild, medicated soap and water (the water should be warm, but not too hot). Do this for 30...

How To: Hide All Traces of Your Apps & Pictures on Android

Unlike some of the popular app lockers out there, a nifty app fittingly named App Hider completely erases apps, files, and their associated footprints from your smartphone. Think of App Hider as a micro-OS within your smartphone's system. This miniature ecosystem can operate copied apps independently, thus giving it an unprecedented layer of privacy and freedom within your handset.

How To: Use Websploit to Scan Websites for Hidden Directories

Websites are often misconfigured in ways that allow an attacker to view directories that are not ordinarily meant to be seen. These directories can contain sensitive information such as private credentials or configuration files that can be used to devise an attack against the server. With a tool called Websploit, hackers can scan targets for these hidden directories without difficulty.

How To: Exploit Remote File Inclusion to Get a Shell

A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website defacement to full-on code execution. For this reason, RFI can be a promising path to obtaining a shell.

Hacking macOS: How to Perform Situational Awareness Attacks, Part 1 (Using System Profiler & ARP)

The first few minutes after gaining access to a MacBook are critical — but where do we begin? Using tools built into macOS, we can develop an in-depth understanding of running background processes, detect antivirus software, locate sensitive files, and fingerprint other devices on the network. All of this can be done without installing additional software or modifying any files.

How To: Securely Sync Files Between Two Machines Using Syncthing

Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mitigate these risks, we'll use a secure, open source, and decentralized alternative.