Personal Feelings Search Results

How To: Get Siri to Play Music for You on Spotify—Without Jailbreaking Your iPhone

While Siri's integration with the iPhone is becoming increasingly substantial, restrictions with the intelligent personal assistant are apparent when it comes to third-party apps like Google Maps, Netflix, and Spotify (unless your iPhone is jailbroken, of course). As an avid Spotify user, it's distressing that I can't use Siri to navigate through the music streaming service's extensive library. In the car, I use Spotify about 90% of the time and it can become increasingly frustrating to chang...

How To: Make a Windows-to-Go Ready USB Drive in Windows 8

In the Windows 8 Enterprise edition, you can use the Windows to Go feature to travel with Windows 8 OS, personal files, documents, settings and many more. All you need is an external hard drive or USB drive of 32 GB space or more and USB 3.0 support or more for fast Windows 8 booting. We need the storage media of above specification to create bootable USB to access the data anytime by plugging the media into different PC running latest version of Windows 8 PRO or Windows 7.

How To: Turn Any Wall Portrait into Your Own Personal Scooby Dooish "Eye" Spy Surveillance System

Remember how the bad guys in Scooby Doo would always use cut-out portraits to spy on people through walls? Well, unless your landlord is super cool, you probably shouldn't start cutting holes in your wall just yet, but you can make a higher tech version, thanks to NASA employee Mark Rober. Mark used a cheap picture frame and a portrait with the eyes cut out to make the "Scoob Cam," which also doubles as a surveillance device. He used an iPhone and an iPad to start a FaceTime chat, then taped ...

How To: Automatically Delete Spam Messages in Gmail

Most of the spam messages are commercial advertisements, phishing websites and get rich quickly messages that asks users to provide personal details and other confidential information.Spam filters in Gmail prevent its users from these spam messages and restrict them to enter in user’s Gmail inbox.Generally, it acts like a firewall between spam messages and Gmail Inbox.Gmail filters detect the sender’s email address and accordingly send the received messages in Inbox or Spam folder.

How To: Have Your Passwords Ever Been Leaked Online? Find Out with PwnedList

It seems like every other day there's a new security threat or data leak in the news. Whether it's your credit card PIN or your smartphone's apps leaking your email address, no one wants their personal information out there, especially passwords. And if you use the same email address and/or password for more than one site, the effects of someone getting hold of your credentials can be catastrophic.

How To: Turn Dried Out Markers into DIY Alcohol Ink That Works on Glass, Metal, and Plastic

Dried out markers are the worst. They take up space, and for some reason, even though they're totally useless, most of us have at least a few lying around just for the sake of not throwing them out. Luckily, Julie Finn over at Crafting a Green World has come up with a way to repurpose them into alcohol ink, a versatile type of ink that can be used on non-porous materials like plastic, glass, and metal. This is truly a tutorial for the pack rat in all of us. First, a little primer on what you ...

News: Windows 8 Reports Your Downloads to Microsoft, But Is It Really a Security Threat?

Security researcher Nadim Kobeissi has discovered that the Windows 8 SmartScreen feature, meant to screen downloads for malicious software, actually reports the data about which applications users are installing to Microsoft. He also says that "the Microsoft server is configured to support SSLv2 which is known to be insecure and susceptible to interception." The two main concerns are the ability of law enforcement to subpoena Microsoft for the information and of hackers to intercept user data...

News: Hacker Points Out iOS Security Flaw That Allows iPhone Text Spoofing

Security researcher and iPhone hacker pod2g has brought attention to a flaw in Apple's iOS that allows the user to change the reply address of an SMS message. This bug has been a part of the iPhone's SMS since the first iPhone in 2007, but Apple has yet to address it. Basically, there's a section in the text payload called User Data Heading (UDH) that controls some advanced features, one of which is the reply address. By changing the reply address of a text message, you can make someone send ...

How To: Wear comfortable clothes and still look cute and trendy

Track suits and Uggs are the way to go if you're feeling lazy, and just want to stay comfortable. But don't give up on looking cute at the same time, because it's totally possible. Watch these tips for feeling crummy and crappy, but looking cozy and cute. You don't even have to style you hair! With just a few changes, you'll go from grubby to cute and trendy.

How To: Lose weight fast using Jedi mind tricks (and without lifting a finger)

Everyone could benefit from shedding a few pounds, but what about those who need to lose a little bit more weight? Exercise isn't an option for everyone, with as busy as our lives are right now. It's hard to go running and do a few pushups when you have a hard enough time scheduling your day already. But if you're looking to shed a couple pounds here and there— without lifting a finger— this two-part video will help you out with some Jedi mind tricks!

How To: Grow a fig tree in southern New Mexico

In this segment of Southwest Yard and Garden, John White and Bill Alford are going to be talking about fruit production and how to harvest figs in southern New Mexico. Bill starts off by talking about his nine year old Black Turkey tree. He says he digs holes and arbor each spring, then uses half a cup of fertilizer per hole. The roots of a fig tree usually grow out past the outer parts of the tree so it's important to make sure you plant has adequate room to grow correctly. A person can mayb...

How To: Prepare and cook a meal as a Boy Scout

As a Boy Scout, when the First Class rank is attained, a scout has learned all the basic camping and outdoors skills of a scout. He can fend for himself in the wild, lead others on a hike or campout, set up a camp site, plan and properly prepare meals, and provide first aid for most situations he may encounter. A First Class scout is prepared.

How To: Enable the web server for your Mac Mini server

How to Use Your Mac as a Server: Turn your Mac Mini into a server! Yes, that's right, with a little know-how and a little spunk, you can turn an inexpensive Mac Mini computer into a server to provide services over you network. You won't even need the Mac OS X Server, just the Mac OS X Client, so there is no extra software to buy, just the Mac Mini and it's operating system.

How To: Accessorize a black dress

Are you going out in that little black dress that you've always wanted, but you don't know what to accessorize with? Well, The beauty of the little black dress is that you can accessorize it to reflect your personal style. A fashion designer shows you how to incorporate funky and classy pieces into your wardrobe.

Social Engineering: How to Use Persuasion to Compromise a Human Target

Social engineering makes headlines because human behavior is often the weakest link of even well-defended targets. Automated social engineering tools can help reclusive hackers touch these techniques, but the study of how to hack human interactions in person is often ignored. Today, we will examine how to use subtle, hard to detect persuasion techniques to compromise a human target.