Produces Documents Search Results

How To: Hack Metasploitable 2 Part 1

This tutorial is for people who want to try different types of hacks in an environment that is the same for everyone so it will help people to ask questions and learn. This series assumes you know how to run a VM and network them together. This series also assumes that the services running on the Metasploitable machine are needed to be running.

How To: Tweak System Settings & Activate Hidden Features in Yosemite with TinkerTool

Most diehard Mac users have used TinkerTool at some time or another, and if you haven't, it's time to start. Whether it's to change your system's font or to disable UI animations, it seems like anything you could ever think about tweaking in Mac OS X is doable through TinkerTool. And now, developer Marcel Bresink has updated his app to work with Yosemite, so let's see what it can do now.

How To: Get an Unlimited Call Log on Your Nexus 5 or Other Android Phone

In the past few weeks, the internet has been abuzz with nightmarish horror stories of Comcast's questionable decision-making and downright terrible customer service. The central theme of many of these disputes with the nation's largest cable provider is that without evidence, the conglomerate will refuse to acknowledge its mistake and place the burden of proof on the customer.

News: The Government Is Stealing Your Data from Angry Birds, Candy Crush, Facebook, & Other Mobile Apps

If you're spending hours on your phone playing games like Angry Birds and Candy Crush Saga, or posting online to Google+ and Pinterest, you're probably being spied on. The latest releases from NSA whistle blower Edward Snowden reveal that the National Security Agency, and its UK counterpart, GCHQ, are mining the ad networks utilized in these apps to collect a trove of information on you.

Dark Side of the Prism: Get Alerted Whenever You Visit a Website Owned by a PRISM-Targeted Company

Since The Guardian published leaked documents exposing the depth of the NSA's spying powers, many people who've never put much effort into protecting their privacy are finally starting to pay attention. Evidence of public opinion concerning PRISM can be seen from the rise in traffic for pro-privacy sites like DuckDuckGo to the petitions demanding that the program be scaled back or done away with altogether. Some would argue that you waive your right to privacy by signing the terms of agreemen...

How To: Silence Your Obnoxiously Squeaky Bed with 4 Easy MacGyver Style Fixes

Any living creature will die if deprived of sleep for long enough. The longest documented occurrence of a person not fully sleeping and surviving is only 11 days. There is a rare disease where deep sleep is never achieved, affecting roughly 100 people worldwide. Patients usually only survive between 6 to 18 months after the onset of chronic insomnia, and only 3 to 9 months in a parasomnia state without any real REM sleep.

How To: Are Your Cloud Documents Safe from Hackers? Make Sure with These Free Cloud-Worthy Encryption Programs

The convenience of storing things on the cloud can definitely make life easier, but if you're storing sensitive files, it could be a total disaster if anyone hacked your account. Some encryption services can be expensive, but if you just need it for personal use, there are some really great ones that don't cost anything. Here are three programs that let you encrypt your cloud storage for free. BoxCryptor

How To: Paste Text and Images as Files Directly from Your Clipboard

If you're doing research that includes a lot of copy/pasting, it can get really tedious to open a new document every time you want to save something. Luckily, you can cut out the extra step and save text and images that are currently in your clipboard directly to a folder or your desktop—without the hassle of creating file after file. Here's how to do it on both Windows and Mac OS X. Windows

How To: New Malware App Turns Your Android Phone's Camera into a Data Stealing Spy

Robert Templeman from the Naval Surface Warfare Center in Crane, Indiana and several of his friends from Indiana University recently developed an Android application that is capable of gathering pictures and videos from mobile devices in order to reconstruct a user's environment in 3D. The malware would come coded inside of a camera application that the user would download. The malware, called PlaceRaider, would then randomly take pictures throughout the day and carefully piece them together ...

How To: Take a Screenshot on Any Smartphone or Tablet

Taking screen captures is a standard feature on iPhones and newer Android smartphones, but for some reason it's not very intuitive. Screenshots allow you to share your phone's screen with your friends, document technical problems for customer support, and even make how-to guides easier to follow. So, it's definitely worth remembering. Here's how you do it.

How To: Massage data in Houdini 10

Get a crash course on HScript Expressions, Variables, and Attributes in Houdini 10. If you don't even know what this means, then you probably need to check this video tutorial series out. Understanding how to massage data in Houdini is key to giving yourself the creative edge and allowing you to unleash mind-blowing visual effects. This 18-part video series covers a variety of simple yet essential weapons in your arsenal including Global, Standard and Custom Variables to Math and String Modif...

How To: Create an old faded newspaper effect in Photoshop

The video is about how an old stalled photographic image with faded backgrounds to a normal image. A nice clean digital image is taken and is mixed with a texture of a paper and produces a final composite image of all effects combined. The procedure is not that difficult but it needs to be followed in a proper order. First the paper texture is taken as a base and then the clean digital image is dragged onto this texture. The blending mode is adjusted from normal to multiplied blending mode, w...

How To: Clean the soleplate on a Rowenta electric iron with the ZD100 kit

We've all used electric irons before to get our clothes crisp and wrinkle-free, but what happens when you use a little too much starch? The bottom hot plate, called the soleplate, accumulates some gunky buildup. Even if you're not over-starching your dress shirts, your Rowenta iron may be getting some gunk on the soleplate, which doesn't produce a perfectly ironed shirt. That's where the Rowenta ZD100 cleaning kit comes in handy. If you get one of these, you could easily clean your iron yours...

How To: Use tomato cages in your garden

When it comes to gardening, there are various methods that can be used to help produce an area that you and others will appreciate. What might work for one person, may not work for another. Each has their own benefits, it just depends on the gardener and which works for them.

How To: Clean high voltage electrical cables with solvents

The best way to make sure you have the best connections on high voltage-lines is to clean them. Cleaning high-voltage wires with cleaning solvents is the best way to get the job done for a better flow of electricity. This video, produced by Polywater, trains electricians on the proper high-voltage cable cleaning procedures during splicing and termination. Methods are shown to remove different types of shields and compounds from insulation. The "Do's and Don'ts" of abrasion, solvent spraying, ...

How To: Grow your own vineyard

This video explains some important things you need to know if you are thinking about growing your own vineyard. First, think about the types of grapes you want to grow, depending on whether you want to make raisins, grape juice, jelly or wine. Talk to your extension agent to find out which grapes work best for your purpose. It's important to thin out the crop and not have too many leaves on the vines, or too many grapes, because a good balance will send the sunlight and nutrients to the plant...