Infinite Access Search Results

How To: The Difference Between Http and Https

With more people joining the internet scene each day it's important that it's security is.. well it has to be good. Of course everything can be hacked and that's the way hackers work. They know there IS a vulnerability but they don't don't know the rest. in this article i'll try to explain the big difference between HTTP and HTTPS

How To: Install Jelly Bean 4.2's Photo Sphere Camera & Gallery on Your Samsung Galaxy Note 2

The rumors are flying everywhere about the Samsung Galaxy Note 2 getting updated to Jelly Bean 4.2, but as of now, we have no freakin' idea when. Among all of the features sported in the update, Photo Sphere is one of the more popular, allowing you to snap incredible and immersive 360 degree photographs. So, until that update comes, you're probably still marooned with Jelly Bean 4.1.2 on your Note 2, and that means no Photo Sphere camera.

How To: Disable Automatic Maintenance Windows 8

In this Windows 8 Tutorial you will learn how to disable automatic maintenance. Their are really two situations I can think of when you would want to disable automatic maintenance in Windows 8. The first being if your Windows 8 computer came with a Solid State Disk then you will probably want to disable automatic maintenance. The reason being is that a solid state disk does no benefit from defrags and the automatic maintenance automatically defrags your hard drive and this will take away from...

How To: Need a Remote for Your MacBook? Use Your Android Device

As most everyone knows, Android and Apple don't get along so well. Even the users don't get along well, with Android and iPhone users constantly berating and insulting each other online—any chance they get. I should know, since I was one of them, but I'm now rare breed who's learned to appreciate both. People just need to realize that they have their own unique strengths—Android with its customization and Apple with its simplicity.

How To: Fix Your Hacked and Malware-Infested Website with Google

While websites may run smoothly without any noticeable vulnerabilities, there's always the looming threat that any background weakness in the site can be exploited by hackers. Once a site is compromised, it can be difficult to get it fixed without the proper help. Google has recently launched a new series entitled "Webmasters help for hacked sites”, which teaches web developers and site owners how to avoid getting hacked and how to recover their website if it gets compromised in any way.

How To: Calculate Shipping Costs with UPS

This video demonstrates how to calculate shipping costs with UPS. UPS provides an easy-to-use online calculator to help customers accurately estimate shipping costs. By following a few simple steps, this tool can help customers control their shipping costs and avoid confusion during the billing process.

How To: Auto-Change Keyboards on Your Samsung Galaxy Note 2 Based on the S Pen's Position

Got a Samsung tablet with an S Pen stylus? Then you might be one of the many people irked about having to manually choose a different keyboard layout after pulling the S Pen out of the device. For instance, if you have a Samsung Galaxy Note I or Note II, when you pull the S Pen out, the keyboard layout stays the same. But if you'd like it to switch to a different keyboard, say, from the stock Samsung keyboard to something like SwiftKey, then you're out of luck.

How To: Share Your Samsung Galaxy S3's Screen with Other Devices

Sharing screens is a great way to showcase projects, photos, or videos without having to download and upload those files on the other devices. This is made easy with AllSharePlus. You can download the AllSharePlay application for your Samsung Galaxy S III or Tab 2 right here. If you would like to download it for sharing on your laptop, you can visit the Samsung website. For now, the desktop app is only compatible with Windows XP or Windows 7 and the devices shown above. Nevertheless, it is gr...

How To: This DIY Arduino Bicycle Safety System Includes Turn Signals, Brake Lights, Strobe, and More!

As dedicated bicyclists are well aware, riding can be very dangerous. Now that daylights savings time has ended in the United States, darkness appears quicker, and the night is especially dangerous for cyclists because of the low visibility that drivers have. Not only is darkness a danger, but also fog, blizzards, and heavy rain—all wreaking havoc on the vision. To combat this, bikers attach reflectors: clear front reflectors, red rear reflectors, amber pedal reflectors, and clear side reflec...

How To: Hack Your Car's Cassette Deck into a Wireless Bluetooth Music Player

Still have an old tape deck installed in your car? This nifty hack lets you upgrade to the digital age without sacrificing your love for cassettes. There's nothing wrong with some low-fidelity tunes in your car every now and then, but if you want to listen to the tunes on your iPod or smartphone too, it's a lot easier (and cheaper) than buying a new in-dash player that supports line-in connections. Just add some wireless capabilities to you tape deck! All you need is a cheap cassette adapter,...

How To: View Your Friend's Tweets in the Contacts App on Mac OS X Mountain Lion

A hidden feature residing in Mac OS X Mountain Lion is the ability to view and also reply to your friend's tweets through the Contacts application, previously known as Address Book. The only way to do this, though, is to provide your Twitter account login data to the Contacts app. To integrate your Twitter, just go to System Preferences, then click on Mail, Contacts & Calendars and choose Twitter. Put in your Twitter login information and then click on Update Contacts. Twitter will use your e...

How To: Find Out What Personal Data Your Mobile Apps Are Leaking with Mobilescope

If you use apps on your smartphone, chances are you have no idea what those apps are doing with your information. Just this year, there have been several scandals involving apps transmitting user data, like Path uploading users' entire address books onto its servers, HTC's Security Flaw, and Brewster exposing users' personal information (even Ashton Kutcher's). A new service called Mobilescope wants to make sure you always know where—and to whom—your data is going. Lots of apps copy your cont...

News: Hacker Points Out iOS Security Flaw That Allows iPhone Text Spoofing

Security researcher and iPhone hacker pod2g has brought attention to a flaw in Apple's iOS that allows the user to change the reply address of an SMS message. This bug has been a part of the iPhone's SMS since the first iPhone in 2007, but Apple has yet to address it. Basically, there's a section in the text payload called User Data Heading (UDH) that controls some advanced features, one of which is the reply address. By changing the reply address of a text message, you can make someone send ...

How To: Hack Your PC into a Mac! How to Install OS X Mountain Lion on Any Intel-Based Computer

Have a PC but hate Windows? Maybe you've just heard a ton about the new Mountain Lion OS X and want to see if it lives up to expectations. Either way, you can install Mountain Lion on your Intel-based PC in a few easy steps. All you need is a copy of the OS X and an 8 GB USB flash drive. The first step is getting Mountain Lion onto the flash drive. You'll need to format the drive with one partition as Mac OS Extended, Journaled and select Master Boot Record under options so that it's able to ...