Prevent Illegal Search Results

How To: Boost your brain

Could you boost your brain power by eating a banana? Improve your memory and IQ by pressing certain points on your body? Absolutely! In this video, we'll show you how to amp up intelligence using super simple natural remedies.

How To: Quickly fix hangovers

You've probably tried every alleged hangover cure--from cold showers to hot coffee--with little success. But a hangover remedy does exist! So watch this video and learn how to be a drunk without suffering hangovers ever again!

How To: Seal black iron pipe joints

Teflon tape or pipe dope can be used to create a seal on black iron pipe. Tim Carter of AsktheBuilder.com demonstrates how to do the job right and shares some helpful tips. This black iron pipe is used to transport natural gas to your furnace, water heater and stove. This pipe has threaded fittings at the connection point which need to be sealed with pipe dope or Teflon tape. Teflon tape should be wrapped onto the male end of the pipe in a clockwise direction. Pipe dope has the consistency of...

How To: Unclog vent pipes

Tim Carter explains why vent pipes are important and how a vent pipe works. These are excellent videos to watch if you need to learn how to prevent clogging in vent piping. If you notice a gurgle when flushing the toilet, it might be an indication that the vent pipe is clogged. Get up on the roof and put a garden hose down the pipe and turn on the water. Be sure to have someone inside checking for any leaks. The water from the hose hopefully will flush out the blockage and your gurgle will di...

Apple Card's Fine Print: The Rules & Restrictions You Need to Know Before Applying for Apple's New Credit Card

Apple Card has generated quite the buzz since its March 2019 announcement. The iPhone maker's new credit card pairs with Apple Wallet on your device, is simple to sign up for, includes enhanced security over other cards, has zero fees, and provides daily rewards right to your Apple Cash account. And as good as that sounds, the fine print can complicate things real quick.

How To: Keep Facebook from Tracking Your Location When You're Not Using the App

When you think of companies that represent pillars like "privacy" or "security," Facebook is pretty far from the top of that list. However, the social media empire is making strides — small strides — to win trust with how it handles your user data. One of those efforts involves a way to prevent Facebook from tracking your iPhone or Android phone's location when you're not using the app.

Kodi 101: How to Get Free Live TV Legally

When most people first become aware of Kodi (formerly known as XBMC), they hear about its ability to stream illegal content. But the real Kodi community knows that it's much more than just a haven for pirated material — it's an all-in-one media player that addresses the majority of home theater needs, particularly for those that decided to cut the cord.

News: Natural Antibiotic from Cystic Fibrosis Patient Knocks Out TB

A promising new antibiotic has been discovered in, of all things, another bacteria. Burkholderia bacteria live in diverse habitats, including soil, plants, and humans where they thrive by knocking out other microbes that compete with them for resources or threaten their existence. Scientists have discovered they accomplish this by producing a very effective antibiotic.

How To: Seize Control of a Router with RouterSploit

A router is the core of anyone's internet experience, but most people don't spend much time setting up this critical piece of hardware. Old firmware, default passwords, and other configuration issues continue to haunt many organizations. Exploiting the poor, neglected computer inside these routers has become so popular and easy that automated tools have been created to make the process a breeze.

How to Hack Wi-Fi: Capturing WPA Passwords by Targeting Users with a Fluxion Attack

With tools such as Reaver becoming less viable options for pen-testers as ISPs replace vulnerable routers, there become fewer certainties about which tools will work against a particular target. If you don't have time to crack the WPA password or it's unusually strong, it can be hard to figure out your next step. Luckily, nearly all systems have one common vulnerability you can count on — users!