Private Contact Search Results

How To: Keep email private with MixMaster

Email is one of the least private and least secure forms of communication, although few people realize this. MixMaster is one way to allow secure, anonymous communication even over the very public medium of email. This tutorial will get you started with MixMaster quickly and easily.

How To: Bypass an iPhone's Lock Screen in iOS 12 to Access Contacts & Photos

Apple may pride itself on its commitment to user privacy and security, but it isn't invulnerable. We now know there is a bug in the latest version of iOS 12 and iOS 12.1 beta that allows those in the know to bypass your passcode and access contacts and photos. This applies to both Face ID and Touch ID-enabled iPhones. Not only do we know about the bug itself, we know exactly how to exploit it.

How To: Add & Delete 'Friends' on Your Apple Watch

Accessing and getting in touch with your favorite contacts has never been easier thanks to the "Friends" feature on the Apple Watch. However, this only applies to users who are running watchOS 2.2.2 and lower. When Apple issued watchOS 3, the "Friends" option was completely removed. So if you're running watchOS 3 or higher, you won't be able to follow these instructions.

Siri 101: How to Make Siri Correctly Recognize & Pronounce Contact Names on Your iPhone

Siri makes it easy to call almost any contact on your iPhone with just a quick verbal command. I say almost because counterintuitive name pronunciations such as Caoimhe, which is actually pronounced "Keeva," will confuse the hell out of Siri. Luckily, there's a way to get Siri to understand pronunciations for the tricky names in your contact list ... it just takes a little grunt work on your part.

How To: View Your Friend's Tweets in the Contacts App on Mac OS X Mountain Lion

A hidden feature residing in Mac OS X Mountain Lion is the ability to view and also reply to your friend's tweets through the Contacts application, previously known as Address Book. The only way to do this, though, is to provide your Twitter account login data to the Contacts app. To integrate your Twitter, just go to System Preferences, then click on Mail, Contacts & Calendars and choose Twitter. Put in your Twitter login information and then click on Update Contacts. Twitter will use your e...

How To: Hook up your exercise bike to Google Maps

Tinkernut demonstrates how to hook up your exercise bike to Google Maps. Using a stationary bike can be good for your health but it can also be boring. You can spice up your exercise regiment by using Google Maps. You will need a USB keypad with arrow keys, a magnetic contact alarm with wires, soldering equipment, an exercise bike and a laptop computer. Connect the contact alarm to the up arrow key on the keypad by opening up the keypad and connecting the wires to the up arrow key by solderin...

How To: Play Borderlands online with Hamachi private network

In this video tutorial, viewers learn how to play the game, Borderlands online with Hamachi private network. Users will need to first download the Hamachi private network. Then open Control Panel, and select Network and Sharing Center. Under Tasks, click on Manage Network Connections. Click on the Advanced menu and click on Advanced Settings. Move the Hamachi network up and click OK. Now open the Hamachi and create a new network or create on. Type in the network ID and password. This video wi...

How To: Create your favorites list on an iPhone

In this video, we learn how to create a favorites list on an iPhone. Doing this will make it easier and quicker to speed dial! First, just tap on the "favorites" button. Then, click on the "+" button to add a new favorite from your contacts. You can then click "edit" to rearrange or remove favorites from your list. Click on the blue arrow next to a name to see the full contact details for that person. As soon as you add or remove someone from your favorites it's saved. That's all you need to ...

How To: Surf privately with the Safari web browser in Mac OS X

Apple's web browser, Safari, stores information like web history, Google's search history and cookies from websites. There may be certain instances where you want to keep this information private–for example, if you're on a public computer or have borrowed a computer from a friend, you may want to keep that information to yourself. For a step-by-step guide to using the private browsing feature in Safari, watch this OS X video tutorial.

How To: Build a simple contact microphone for $2

Looking to go electric on the cheap? In this video tutorial, you'll learn how to make a contact microphone out of a Piezo Transducer, available for $2 from Radioshack (part #273073A). You'll also need some sort of audio connector, which can either be salvaged from old electronics or bought from Radioshack as well. This video also covers how to make shock mount for the mic out of scrap styrofoam. Amplify most anything with this how-to.

How To: Protect private files from prying eyes with TrueCrypt

Check out this video tutorial to see how to keep your private files private, even if you have to email them to yourself at your office? TrueCrypt, an open source piece of software, lets you encrypt your files so they remain accessible only to you. This works on any platform; Windows, Linux, or Mac. So, watch this video to see the TrueCrypt download process, how to install it, and how to create an encrypted volume on your hard drive.

How To: Get your private pilot's certificate

Getting your pilots certificate may be on the expensive side, but after only a few weeks of training you can be flying all over the country! We show you some tips on the path to getting a private flying certificate in this video, and if you're afraid of heights, just do what Veronica did -- pretend it's a video game!

How To: Block Contacts, Spam & Unknown Senders in iOS 13's Mail App So Incoming Emails Go Straight to Trash

Apple's Mail app has always been a stylish yet simple way to check and send emails. Third-party apps up the ante with powerful tools and features to help keep junk and spam mail out of your eyesight. But with iOS 13, you don't need them since Apple gave the Mail app some much-needed superpowers. One of those being the ability to block senders from emailing you.

How To: Use Private Encrypted Messaging Over Tor

Tor is an excellent obfuscation network for web traffic, and while instant messaging over the network is very useful, it can be relatively difficult to configure. In this guide, we'll look at two synchronous communications platforms (instant messengers) which can be routed over the Tor network, Ricochet and XMPP.

How To: Block Spam Texts with Samsung Messages

With so much of our personal data floating around the web, it's nearly impossible to get away from spam calls, texts, and emails. Unfortunately, this isn't just limited to the online world — filling in your contact information in a raffle ticket with the hope of winning that shiny new car in the mall, for instance, can often result in getting swamped with spam texts containing sketchy loan offers.

News: New Siri Bug Lets Anyone Bypass Your Lock Screen to See Photos & Contacts

A new iPhone exploit has recently been discovered by YouTube user videosdebarraquito, who has found many other exploits and bugs in iOS over the years. This new exploit allows someone to bypass the lock screen and gain access to contacts and photos via Siri, Apple's digital voice assistant—but it only affects the iPhone 6s and the iPhone 6s Plus because it requires 3D Touch functionality.