Normal Outdated Search Results

How To: Stay as Anonymous as Possible Online

There are lots of people who want to stay anonymous online, and lots of reasons they want to do this. Staying anonymous on the internet isn't easy, and it's probably possible to trace almost anyone with enough time and resources. A lot of people think that they're completely secure with just one method of cover. For example, a lot of people thought anyone using the Tor network was nearly untraceable, but then things like this often cast doubt on just how secure these networks are. Unless you ...

How To: Bleach your jeans for a stylish faded look

In this tutorial, Tom Howard shows us how to bleach jeans the proper way. This is far better than just placing your clothes in the washing machine the normal way. To do this the correct way, put your water level low (for one item) in your washing machine. Now, make sure the temperature is around 50 degrees give or take 5 degrees. Now, add 1/2 c of chlorine, adding more if you want your jeans to be lighter. Now, leave this is to soak for about 20 minutes and wash your jeans for 30 minutes. Mak...

How To: Enumerate MySQL Databases with Metasploit

It's been said time and time again: reconnaissance is perhaps the most critical phase of an attack. It's especially important when preparing an attack against a database since one wrong move can destroy every last bit of data, which usually isn't the desired outcome. Metasploit contains a variety of modules that can be used to enumerate MySQL databases, making it easy to gather valuable information.

How To: Identify Web Application Firewalls with Wafw00f & Nmap

Web application firewalls are one of the strongest defenses a web app has, but they can be vulnerable if the firewall version used is known to an attacker. Understanding which firewall a target is using can be the first step to a hacker discovering how to get past it — and what defenses are in place on a target. And the tools Wafw00f and Nmap make fingerprinting firewalls easy.

News: Meet the Nokia 8 — The First Android Flagship from the Iconic Brand

Long before Apple and Android became household names, Nokia dominated the mobile industry. The Finnish company was one of the first to develop smartphones, and their classic N95 with 2G "high-speed" internet connectivity was declared the "best smartphone ever" by some in 2007. Outside of the US, before the iPhone became all the rage, owning a Nokia phone was a status symbol akin to wearing a Rolex or Omega watch.

News: Do the CDC's Suggested New Quarantine Rules Give Them Too Much Power?

When Kaci Hickox, a Doctors Without Borders nurse, returned to New Jersey from working with Ebola patients in West Africa in 2014, she was surprised by her reception. Instead of a quiet return to her home in Maine after four weeks on the front line of Ebola treatment, she was quarantined by the State of New Jersey in Newark. She later filed a lawsuit in U.S. District Court for violation of her civil rights, false imprisonment, and invasion of privacy.

How To: 8 Essential Tips from the Queen of Foolproof Cooking

Cookbook author, celebrity chef, television personality, and former White House nuclear policy analyst Ina Garten is familiar to many as the queen of foolproof cooking. Also known as the Barefoot Contessa, Ina hones in on techniques and tips that make time in the kitchen far less intimidating to folks of all skill sets. We've rounded up 8 of Ina's most useful cooking tips to help you out—from dinner parties to everyday cooking. Her philosophy is that it's always easier than you think!

How To: 10 Common Food Myths Debunked

Common knowledge is a funny thing: it represents a majority's opinion on a particular subject and somehow makes that opinion fact. If that 'fact' goes unopposed and unchallenged, then it is passed on and preserved from one generation to the next—regardless of whether it is true or not.

How To: Root Android L—The Easy Way

While the preview images for Android's upcoming "L" release just came out yesterday, the new firmware has already been rooted, as is standard with its openness. So if you were feeling reluctant to try Android L because it didn't support existing root methods, then you might want to reconsider.

How to Walkthrough Batman: Arkham Asylum on Xbox 360

Batman is one of the most iconic comic characters in history, so no wonder the video game Batman: Arkham Asylum is more than a hit. If you want to see the whole game to learn some tips and tricks to gameplay, this playthrough video series from VIP2GAMING gives you everything, from start to finish, on the Xbox 360.

How To: Hit a cut in golf

Kevin Batters gives tips for how to hit a cut shot in golf. When use to turn club we are implying for a right handed golfer a left to right spin and for left handed golfer a right to left spin. If Nicholson is cutting the ball he will going from right to left and any other player say Tiger Woods is cutting the shot he’ll be going from left to right. The secret of getting good cut shots is having good strong and fast left arm because as one trying to make a cut shot the left arm will be pullin...

How To: Restore your PC to factory settings by rebooting

Greg French talks to us about the different ways to reboot a computer to resolve issues in the computer. The first way is by pressing F8 key while startup after rebooting the system. When you insert a wrong driver for video card or something, sometimes when you boot the computer, it gives a black screen. Now he says you can resolve this problem by rebooting the computer and pressing the F8 key while startup. This will take you to a menu selection where you should select 'Safe Mode' and hit en...

How To: Keep Apps from Collecting Data About Your Phone by Spoofing Device ID Values

Apps can learn a lot about you just by reading information about your smartphone. They can easily track what device model you have, your phone number, and in some cases, your hardware MAC addresses. Many third-party apps will only track your device values for advertising purposes, but some might be trying to snoop on your data for ill intentions.

How To: Detect & Classify Wi-Fi Jamming Packets with the NodeMCU

The most common Wi-Fi jamming attacks leverage deauthentication and disassociation packets to attack networks. This allows a low-cost ESP8266-based device programmed in Arduino to detect and classify Wi-Fi denial-of-service attacks by lighting a different color LED for each type of packet. The pattern of these colors can also allow us to fingerprint the tool being used to attack the network.

How To: JB skate

JB skating combines roller-skating with a variety of dance styles. If you’re board of your normal Friday nights or looking for a fun and funky way to exercise, grab a pair of skates, watch a few videos and then try it for yourself.

How To: Use Svengali magic cards for advanced tricks

In this second installment of our series on the Svengali deck, our expert magician Malik Haddadi demonstrates more great tricks. Learn how to perform the grand maneuver known as the all alike trick, which transforms what appears to the audience as a normal deck of cards into a deck of cards which are all the same.