Income Security Search Results

How To: Hack wifi using Wireshark

If you're trying to hack someone's wifi, a useful bit of software you may want to try is called Wireshark. Wireshark is a wifi packet sniffer, which is an essential step in actually breaking into someone's wireless system. Of course, this is illegal, so make sure you're only doing it to test a network's security, or for your own educational purposes. Check out the video, follow the steps and see how secure network is. Hack, hack, hack!

How To: Replace an old deadbolt and install a new electronic keyless entry device

If you've recently upgraded you doorknob to an elegant Schlage Plymouth Handleset, then it's time to match your front entry locks and install a new electronic high-security Schlage Plymouth Keyless Entry Deadbolt. This keypad is great if you never want to lock your bottom handleset (or doorknob). Watch this step-by-step installation video to see how it's done! You'll need a phillips head screwdriver or electric drill. To see how to install the matching handleset, click here.

How To: Protect your privacy on Twitter

In this video, we learn how to protect your privacy while using Twitter. Your personal information can get stolen in an instant with the internet. With Twitter, when you are doing updates showing where you are and what you are doing, someone could try to find you and potentially create harm to you. To help you avoid situations like this, you need to go to the security settings of your Twitter account. When you go here, you can change the account so that it only allows people you want to follo...

How To: Use Note Pad to get by school internet blocks

In this tutorial, we learn how to use the notepad to get by school internet blocks. First, open up Notepad on your computer, then type in "<html>" "<body>", "iframe src=http://www.youtube.com", then "height=100%", then "width =100%". To finishe, type in "<iframe>>/body><html>". Save this as hack.html as all files. After this, open up your browser, then you should be able to go to the website that you wanted to go to! This is a great way to get around the security settings that your school has...

How To: Test your system performance in Windows 7

In this video tutorial, viewers learn how to test their system performance. Begin by clicking on the Start menu and select Control Panel. Then click on System and Security, and select "Check the Windows Experience Index" under System. Now click on "Rate this computer". The system will then begin to run some tests. This will take about 1-2 minutes. The Windows Experience Index assesses key system components on a scale of 1.0 to 7.9. This video will benefit those viewers who use a Windows 7 com...

How To: Sell baseball cards

Tired of grandpa's baseball card collection rotting away in your attic? Well, unlike his pop bottle collection, baseball cards could yield a decent amount of income for you, if you know how to sell them. There are different outlets available for selling an individual baseball card or card collection. Know how to sell the fruits of your hobby and avoid getting ripped off.

How To: Use location and security settings in Android

Many applications, especially those found in the Android Market are more effective when they know your physical location; like an app that's going to find the nearest gas station, restaurant or ATM. One of the salient advantages of a Google Android smartphone over, say, an Apple iPhone, is the inherent extendibility of the open-source Android mobile OS. There are a seemingly infinite number of settings to tweak and advanced features to discover and use. This free video tutorial, in particular...

How To: Wear a sarong in a variety of ways

Fashion designer Cate Adair demonstrates dressing with a sarong for Modern Mom. She also discusses how to buy or extend a sarong when the one you find isn’t long enough. One important consideration for beginners is finding a sarong that can wrap around the body twice for security. One way she wraps is to simply wrap under the armpits twice and tie a flower or ornament with the corner. Another way is to put the full sarong on from the front, wrap each end backward and then over the shoulders...

How To: Make your Android phone unlock pattern visible

In this video, Mike Callahan shows us how to make our unlock pattern visible on an Android phone. First, unlock your phone and go to the home screen. Then, go to 'settings, location & security". After this, click the button that says "use visible pattern" so that the check mark and button are both gray instead of green. To test this, tap back on the home screen and lock your phone. Now, when you draw in your pattern you will be able to see it on the screen. This way you can see the pattern as...

How To: Change a drive letter in Windows 7

This video demonstrates how to change a drive letter to a certain drive in your Windows 7 computer. On you Windows 7 computer, go to Start > Control Panel. In the Control Panel, select System and Security then open the Administrative Tools. Look for and open the Computer Management tool. On the left side pane of the Computer Management window, select Disk Management. Look for and right click on the drive you want the drive letter changed. Select 'Drive Letter and Paths...'. Click change and s...

How To: Uninstall a program in Windows 7

This video by Butterscotch shows viewers how to uninstall a program in Windows 7. To begin, click on the start button at the bottom-left of the screen. Click 'Control Panel' in the boxes that pop up. Click 'System and Security'. On the left side of the window, there will be a link marked 'Programs'. Click on it. Click 'Uninstall a program' beneath the 'Programs and Features' heading. Highlight the program you want to uninstall, then click the 'Uninstall/Change' button near the top of the wind...

How To: Use a proxy to bypass parental control filters

The video shows us how to use a proxy to bypass the Internet Filters. Most of the times in our schools and colleges most of the websites including the social networking ones will be blocked for security reasons and makes us unable to log into those websites. In such cases even the ones from the YouTube, several videos will be blocked. So in this video, we will be shown how to bypass those filters and log into those sites. Firstly go to the website Proxapp and over there you will be asked the ...

How To: Install Ubuntu in a RAID 0 array

RAID, or Redundant Array of Independent Disks, lets you divide and replicate data among multiple hard disk drives for information storage security. This video tutorial demonstrates how to install Ubuntu in a RAID 0 array. Before starting, you'll need at least 2 hard drives and an Ubuntu alternate installation CD. RAID 0, or striped disks, let's you install an operating system, such as Ubuntu, on a partition, while using others for data storage, as illustrated in this instructional segment.

How To: Check for updates automatically in Windows 7

In this video you will learn how to update your version of Windows 7 and how to check the system settings for automatic updates. In order to do this you need to go in the Start Menu and then in the Control Panel. Then you need to click System and Security. The next step is to click Windows Update. A new window will pop-up and you will see two types of updates: Important Updates and Optional Updates. To install them just click on the blue link and then check the boxes. To check for updates you...

How To: Protect PDFs with a password in Adobe Acrobat 9 Pro

In order to secure a PDF with a password when opened in Adobe Acrobat 9 Pro, press the secure button and go into password security settings. Here you can change on what versions of this software the file will run on, the next option asks which portion of the document is to be encrypted when a password is placed. Further below here is where you actually choose the password, this ensures that only people who know the password will be able to see the contents of the document. Below this is the d...

How To: Bypass RealVNC authentication

VNC stands for Virtual Network Computing. It is remote control software which allows you to view and fully interact with one computer desktop (the "VNC server") using a simple program (the "VNC viewer") on another computer desktop anywhere on the Internet. The two computers don't even have to be the same type, so for example you can use VNC to view a Windows Vista desktop at the office on a Linux or Mac computer at home. For ultimate simplicity, there is even a Java viewer, so that any deskto...

How To: Hack websites with SQL injection

For Infinity Exists Full Disclosure's first Website Hacking episode, we demonstrate how to exploit a security vulnerability occurring in a website's database to extract password hashes. Sql (Structured Query Language) is a computer language designed for the retrieval and management of data in a system's database. The Attack, known as Sql Injection, manipulates Sql statements before they are sent to the Sql Server, allowing the Attacker to create, change, or retrieve data stored in the database.

How To: Get Extra Security with This VPN & Email Encryption Bundle

The first step to getting your life together? Getting your online security together. After all, security when you're shopping, video calling, and more means more than ever in a digital age when anyone can copy your info or try to pose as you on the web. This Premium Privacy Bundle featuring Zenmate and StartMail will give you a secure VPN and encrypt your emails, all at a bundled price. The security duo is on sale for 60% off for a limited time, which means it's just $44.99 (regularly $113).

How To: Use Your Saved Chrome Passwords to Log into Apps on Your Galaxy

If you use Google Chrome on your computer, you've undoubtedly saved a ton of passwords since the browser always prompts you to. But Samsung uses their own password service on their phones by default, so you'll have to change a setting if you want to use your Chrome passwords to log into apps and sites on your Galaxy.

How To: Android 10 Drastically Updated Location Permissions — Check Your Settings ASAP

With Android 10, there are now three options when an app asks to access your location: Allow, Deny, and Allow While In Use. That last one prevents apps from seeing your location unless you're actively using them, and it's the default now. But when you first update, most of your apps will still be allowed to access your location in the background — at least, until you do something about it.

How To: Beginner's Guide to OWASP Juice Shop, Your Practice Hacking Grounds for the 10 Most Common Web App Vulnerabilities

Web application vulnerabilities are one of the most crucial points of consideration in any penetration test or security evaluation. While some security areas require a home network or computer for testing, creating a test website to learn web app security requires a slightly different approach. For a safe environment to learn about web app hacking, the OWASP Juice Shop can help.