Management Application Search Results

How To: Back Up Your Nexus 7 Without Rooting or Adding a Custom Recovery

At some point, we all need to back up our device. Maybe it's time to take it in for repairs or maybe you're just cautious and paranoid. Maybe you're trying out a new ROM on your Nexus 7—then you definitely need to back up. The most secure way would be to use a custom recovery like ClockworkMod or TWRP, but if you're not rooted or planning to root, then you'll need an easy alternative.

How To: See Who's Clogging Up Your Wi-Fi Network with These Free Mobile Apps

Android has released a new application called ezNetScan, which is a free app that scans the wireless network you're connected to and gives you a full log of all of the devices connected to that network. This isn't new for smartphone users, let alone Android users. Fing has been around for a while and does practically the same thing that exNetScan does. It gathers information such as the IP and MAC addresses, device vendors, and ISP location. But while Fing is a great program, it does lack a f...

How To: Download & play web-based Flash games on your computer

There's a million web games spread throughout the internet now, and if you like to play them, you probably want to play them all the time. And if you play one flash game, you probably play another, maybe 10 or 20. But what if you don't have an internet connection one day? What if you can't play those web games anymore? Well, you can, and all you have to do is download them to your computer. Watch to see how to download and play web-based flash games on your computer without web access.

How To: Use the iBooks ereader app on an Apple iPad

Ipad is a revolutionary device from Apple with some amazing features. One of the major functions of Ipad is to serve as a E-book reader. Apple provides an application called Ibooks using which you can read ebooks on your device. You can also browse and purchase new ebooks using this applications. Launch Ibooks from your applications menu and it will take you to the collection of books that you already have on your device. Click the store button to visit the books store. From the store you can...

How To: Use BlackBerry Wallet to store personal information

Want to forget about always pulling out your credit card to purchase something on your BlackBerry? There's a little application that can do it all for you? But how? Best Buy has answers. The Best Buy Mobile team explains how to use the BlackBerry Wallet application. This application can store personal information such as credit card information and shipping addresses on a secure website for easy access when shopping online.

How To: Get around a broken HOME button on your iPhone

Looking to fix your iPhone home button? Do you have a broken HOME button on your iPhone? In this video, learn how to get around it with an application called "mquickdo", formerly known as iHome for jailbroken iPhones. This also works for iPhone 1G or 2G and iPod 1G or 2G. Mquickdo allows you to use a series of finger swipes to function as the home button. This includes putting your iPod to sleep, going back to the home page, the double tap music menu, exiting an application, and more.

How To: Use chickens to control garden pests in orgainic farms

Curtis Smith provides information on how to use chickens to control garden pests. Using chickens keeps the use of pesticides to a minimum and keeps plants healthier. In the organic garden, chickens are used because they'll eat any insect as well. The process is known as Integrated Pest Management, Curtis explains that its basically knowing your pest. It also reduces the amount of feed that has to be purchased for the chickens because they're eating the insects in the garden. It also controls ...

How To: List transferable skills on your resume

Learning to highlight transferable skills on your resume is good for recent college graduates or if you are new to a job field because it shows that you have good characteristics that can be applied to your new job. For example, showing your communication skills is very important. Research planning is also critical. Show that you set goals for yourself and that you have clear ideas. Also, giving examples of when you used teamwork in past work experience in your life or in your career is benef...

How To: Manage photos in Aperture

Instead of using Photoshop, why not give Apple's Aperture a try? Aperture is designed more for post-production work for professional photographers, letting you cull through shoots, enhance images, manage massive libraries, and deliver stunning photos.

How To: Manage color in Aperture

Instead of using Photoshop, why not give Apple's Aperture a try? Aperture is designed more for post-production work for professional photographers, letting you cull through shoots, enhance images, manage massive libraries, and deliver stunning photos.

How To: Watermark photos in Lightroom 2

Get your dose of the coolest Adobe Lightroom tutorials, tips, time-saving shortcuts, photographic inspiration, and undocumented tricks with Matt Kloskowski from Photoshop User TV. Photoshop Lightroom is the leading photo management software solution. See what leading photographers use to manage their photos, and how.

How To: Run Windows programs on a Mac using Crossover Chromium

In this how to video, you will learn how to run Windows programs for free on a Mac using Crossover Chromium. You will need to download Crossover and install it by downloading it and dragging it into the applications folder. You will also need Explorer XP. Go to the applications folder and show the package content of Crossover. Go to shared support as you will need a file here later. Open Chromium, go to support, Chromium, and Drive, and then drop Explorer XP into the folder. Open the info fil...

How To: Remove a Windows partition from your Mac hard drive

techstuff1227 narrates an HD-quality educational video about how to remove a Windows partition from a Macintosh computer using the Bootcamp software. To accomplish this easy task: open the Finder application, view your installed Applications, browse to the Utilities list and expand it to view the Disk Utility. Open the Disk Utility application. Once the hard drive information is displayed, click on the Windows partition, click on the minus (-) button, and a confirmation dialog will appear. Cl...

How To: Encrypt data w/o admin rights using Rohos Mini Drive

This technical video will show you all about the Rohos Mini Drive. See how you may work with an encrypted partition on a PC without admin rights using this free portable encryption solution. It securely protects your portable data on any USB device. Portable utility Rohos Disk Browser gives you opportunity to work with your sensitive data on a USB drive in the usual way on any PC (even at an internet cafe, where you don’t have admin rights).

How To: Get permanent residency in Canada through CEC

The CEC, Canada Experience Class, is a new program to help a person who has held residency in Canada gain permanent residency status. The program realizes that, by going to school or living in Canada while working, many people have the skills necessary to make the transition to live in Canada permanently. To qualify for CEC, you must be a temporary worker living in Canada for at least two years with two years of skilled working experience. A second way you can qualify is by being a foreign gr...

How To: Install the software for a CNC router

A CNC router machine is probably the most useful tool a hobbyist can own, but the price for a CNC machine on the market is way more than the average hobbyist is willing to spend. You can build your own CNC with very basic tools, little knowledge of machinery, mechanics, or electronics, but be warned, these machines are inherently dangerous, so wear the proper protection and use common sense. At the very least, read the instructions and precautions on every tool you use.

How To: Abuse Session Management with OWASP ZAP

It's always a good idea to know how an attack works at the very basic level. Manual techniques for exploitation often find holes that even the most sophisticated tool cannot. Sometimes, though, using one of these tools can make things so much easier, especially if one has a solid foundation of how it works. One such tool can help us perform a cross-site request forgery with minimal difficulty.

How To: Manipulate User Credentials with a CSRF Attack

Web 2.0 technology has provided a convenient way to post videos online, keep up with old friends on social media, and even bank from the comfort of your web browser. But when applications are poorly designed or incorrectly configured, certain flaws can be exploited. One such flaw, known as CSRF, allows an attacker to use a legitimate user's session to execute unauthorized requests to the server.

How To: Use Command Injection to Pop a Reverse Shell on a Web Server

Command injection is a technique used by hackers to execute system commands on a server, usually via a web application or some kind of GUI. This can happen when an application provides some sort of functionality to the user involving the use of system commands. When the input is not properly sanitized, commands not originally intended to be run are allowed to be executed.