Mouth Security Search Results

How To: You've Probably Let Several Apps Read Your Gmail — Here's How to See & Delete Them

Thanks to recent reports, we now know third-party apps have a lot more access to our Gmail than we may have initially thought. In fact, these third-party apps have the ability to read our emails, not because these companies are necessarily shady, but because we agreed to it. Luckily, there's a way to view which apps have this access, as well as a way to boot those apps from your Gmail entirely.

How To: Protect Yourself from the KRACK Attacks WPA2 Wi-Fi Vulnerability

In October of 2017, Mathy Vanhoef released "Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2." This paper demonstrates a way to decrypt traffic on practically any WPA2 network, the most commonly used form of wireless security (seeing as all other forms of Wi-Fi encryption have already been broken). Practically all of the network-connected devices we use will need to be updated in some way in order to protect against this vulnerability, each of them in a different way.

How To: Protect Your Identity After the Equifax Cyberattack

Equifax reported on Sept. 7 that it discovered a breach on July 29 which affects roughly half of Americans, many of whom don't realize they have dealings with the company. Hackers got away with social security numbers, addresses, and driver's license numbers, foreshadowing a "nuclear explosion of identity theft." Let's explore what really happened and what you and those around you can do to protect yourselves.

iPhone Security: Apple Refuses FBI's Demands to Create iOS Backdoor

In a letter dated February 16th, Apple CEO Tim Cook responded to the FBI's demand that Apple create a "backdoor" to bypass the encryption on an iPhone used by one of the perpetrators of last year's terrorist attack in San Bernardino, CA. Cook began the letter by stating that Apple has "no sympathy for terrorists" and has cooperated in giving the FBI all of the information that it has available.

News: How Zero-Day Exploits Are Bought & Sold

Most of you already know that a zero-day exploit is an exploit that has not yet been revealed to the software vendor or the public. As a result, the vulnerability that enables the exploit hasn't been patched. This means that someone with a zero-day exploit can hack into any system that has that particular configuration or software, giving them free reign to steal information, identities, credit card info, and spy on victims.

How To: Change Automatic Maintenance Settings in Windows 8

In this Windows 8 Tutorial I will show you how to adjust the automatic maintenance settings. The automatic maintenance settings deals with thing such as software updates, security scans and system diagnostics. If the settings in your automatic maintenance settings panel in Windows 8 are not set at a time your computer is on it want run the maintenance unless you set the option that to wake up your computer up at the scheduled maintenance time.

How To: Find Out If the FBI Is Keeping Tabs on Your Apple Device (UPDATED)

It's no secret that there's a lot of surveillance going on these days. It's easier than ever to end up in a database, and even former government agents are speaking out about the atrocious amount of spying being done against our own citizens. They've targeted our laptops, cars, IP addresses, and now they're coming for our iPhones. AntiSec hackers managed to get their hands on a list of over 12 million Apple UDIDs (Universal Device IDs) from an FBI computer, and they published 1,000,001 of the...

How To: Draw a nerdy guy with glasses, braces and big ears

Portrait drawings are difficult for most artists, but one thing's for sure— drawing nerds is as easy as they come. Nerds are easier to draw because you can stray from the formality of portraits, putting your own spin on it, over-compensating the details, exaggerating the dorky features. It's a drawing class in its own, and Merrill shows you how to draw his version of the NERD!

How To: Draw a funny cartoon angel

In this how to video, you will learn how to draw an angel. First, draw the circles for the body and head. Add a leg and arm, as it will be drawn from a side view. Draw a rectangular shape for the harp and a circle for the halo. Lastly, draw the cloud below the body and wings. From here, you can fill in a detailed outline over the basic shapes drawn. This includes the fluff lines of the cloud, the feather lines of the wings, the mouth and hair of the angel, and the strings inside the harp. Onc...

How To: Perform a wolf whistle with your fingers

In this video, we learn how to perform a wolf whistle with your fingers. First, you will place two fingers straight out so there is a dip in them. Then, place these in your mouth and start to blow air out of your mouth. Make sure the fingers are all touching each other while inside of the mouth. Also make sure that the fingers are pushing the tongue back. When you learn to do this, it may sound rough in the beginning, but with practice, it will sound much better! This is a handy tool to learn...