Persons Develop Search Results

How To: Get Rid of Facebook Stickers from Your Timeline & News Feed

While stickers have long existed in the messages section of Facebook, they've only just recently rolled out sticker capability in comments for events, groups, and timeline posts. That means you can now reply with a cute sticker of a cat eating a slice of pizza on someone's status instead or writing something more thoughtful. While an animated sticker can show off enthusiasm and excitement that words or a too-simple emoji may not be able to convey, you can bet that your comment section will qu...

How To: iOS 8's Hidden Gallery Shows Every Pic, Video, & Attachment from Your Texting History

Viewing all of the attachments in a message thread within iOS 7 has never been particularly easy. To see every single picture and video dating back to the beginning of the conversation, you have to manually scroll through the entire conversation and refresh it until all of it appears on your screen. Depending on how long the conversation is, that could take some time.

How To: Get People to Trust You with Their Secrets

Prying into people's lives without them putting up their guard can be difficult, unless you can convince them that you already know them very well. Most people don't have many friends they can be honest with, and this can be exploited. Once they're convinced you already know their secrets, they'll start to fill you in on the little details.

Hack Like a Pro: How to Exploit SNMP for Reconnaissance

Welcome back, my rookie hackers! The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked sources for information is the Simple Network Management Protocol (SNMP). Many rookie hackers are not even aware of it, but it can prove to be a treasure trove of information, if you understand how it works and how to hack it.

Hack Like a Pro: How to Change the Signature of Metasploit Payloads to Evade Antivirus Detection

Welcome back, my budding hackers! I've written several listener guides on creating a malicious PDF or malicious Word document that would carry in it a payload with the Meterpreter, or reverse shell enabling you to own the system. One of the hurdles to using these techniques is the antivirus (AV) software on the target system. For instance, if you try to email a malicious PDF or Word doc, it's likely that the victim system will alert the victim that it contains a virus or other malware.

How To: Add Creepy Apparitions to Your Halloween Photos Using the Pepper's Ghost Illusion

Photographers have been using the Pepper's Ghost Illusion for over a century to play up the level of creepiness in their photos. Many of the pictures that claim to be real "sightings" use this technique to project a ghostly figure into the background of their images. Today, it's still used in theatre, "scary" rides at amusement parks, and haunted houses all over the world, which makes it a great photography trick for Halloween time. As shown in the tutorial below by Make's Jason Poel Smith, t...

How To: DYI Presents for Your Reunion

In an increasingly mobile and globalized world, it’s not uncommon to lose touch with people we were once close with. Juggling between job demands, family responsibilities and our own personal needs, it’s often hard to put the time to keep all of our relationships going. Nevertheless, every now and then we get to reminiscing and feel the time has come for a reunion with people from the past.

How To: Play Multi Table Sit and Go’S

Your average sit and go player will probably stick to the single, 9 or 10 person tables that are commonly found at all the popular online poker rooms. However, your more adventurous players aren’t afraid to try out the multi-table sit and go’s like the 180 man SNGs when they get a chance. But there are a few things players should keep in mind before starting out with the MTT SNG tournaments.