Question Book Search Results

How To: View Your Friend's Tweets in the Contacts App on Mac OS X Mountain Lion

A hidden feature residing in Mac OS X Mountain Lion is the ability to view and also reply to your friend's tweets through the Contacts application, previously known as Address Book. The only way to do this, though, is to provide your Twitter account login data to the Contacts app. To integrate your Twitter, just go to System Preferences, then click on Mail, Contacts & Calendars and choose Twitter. Put in your Twitter login information and then click on Update Contacts. Twitter will use your e...

How To: Make an Incredibly Realistic and Completely Functional Armored Gauntlet

If you've decided to forgo the super heroes and television characters and go medieval this year for Halloween, David J. Guyton has just the thing to take your costume over the top. To promote his new book, he built this awesome gauntlet armor—and made a step-by-step tutorial. David's is made of brass because it's meant to be a prop (would work well with Steampunk), but if you wanted to make it legit, he suggests trying steel instead. He started with a paper template, which he used to trace th...

How To: Find Out What Personal Data Your Mobile Apps Are Leaking with Mobilescope

If you use apps on your smartphone, chances are you have no idea what those apps are doing with your information. Just this year, there have been several scandals involving apps transmitting user data, like Path uploading users' entire address books onto its servers, HTC's Security Flaw, and Brewster exposing users' personal information (even Ashton Kutcher's). A new service called Mobilescope wants to make sure you always know where—and to whom—your data is going. Lots of apps copy your cont...

News: Inklewriter Lets You Write and Share Your Own 'Choose Your Own Adventure' Books

Remember those Choose Your Own Adventure novels? If your school was anything like mine, they were so popular you were lucky to find one to check out at the library. But there's no worries now, thanks to this handy HTML5 app, which makes it easy to write and share your own 'choose your own adventure' novels. inklewriter is a free tool designed to make writing interactive stories simple. Basically, you start typing and inklewriter helps you organize your story, making it easy to add, remove and...

How To: Turn yellow teeth into perfect pearly whites using a layer mask in Photoshop

It's not brain surgery, but teeth whitening systems still hits the pocket books hard. However, there is a cheaper alternative to have the whitest teeth in the neighborhood, and it's called Photoshop. With Adobe Photoshop, you can have whiter teeth in seconds! Really. It's definitely the best tooth whitening remedy for those behind the camera lens. But remember… Photoshop is only a digital cure. You still might have to hide that smile in public… or consult a dentist.

How To: Draw an anime style angel

In this how to video, you will learn how to draw an angel. First, start out with the basic sketch of the drawing. Remember, eyes go in the middle of the head. Drawing the head first will help proportion the rest of the body. Use long strokes with the wrist to draw the hair. Try to make the hands the size of the face and try to make the fingers look like fish sticks. It is easier to draw if you study anatomy books. Next, erase the sketch and start going in with further detail. Exaggerate the w...

How To: Walkthrough Dante's Inferno on the PlayStation 3

Dante's Inferno. Most people know this as the first book to Dante Alighieri's fourteenth-century poetic epic, the "Divine Comedy", an allegory of medieval hell. But gamers can experience the torment of sin without the pages of a book. Dante's Inferno is a third-person, action-adventure game from February 2010, playable on the Xbox 360 and PlayStation 3. The story follows Dante (now a Templar knight) as he makes his trek through the nine circles of Hell. His goal: To find Lucifer and reclaim t...

Hacker Fundamentals: A Tale of Two Standards

If you read my article on the OSI model, you got a good overview on communications from that model's perspective, but how does that relate to TCP/IP? We're going to take it a step further, getting into the idea behind the two address concept. How does an IP address and a MAC address work together? If you want to hijack sessions and all sorts of lulz like that, you need to understand these concepts. Let's get into it, mates!

How To: Get better grades

The only things that will get you into a good college is persistence, a will to learn, and of course… grades. If your grades are lacking that oomph they need to impress the schools and your parents, there's a few ways to aid in improving your scores. With a little effort and focus, your next report card will sport better grades.

How To: Dress appropriately for a job interview

This is a humorous video with tips for young people on how to dress and act to make a good impression in a job interview. Dressing inappropriately for the interview will make the interviewer wonder what you might wear to work. Be well groomed, remove any piercings and be sure any tattoos are covered. A suit is not really necessary; a shirt with a collar and khaki pants are fine. Your appearance shows the interviewer that you are more interested in the job than in expressing your own personal ...

How To: Handle a bridezilla

Is a Bridezilla driving you crazy? Whether the bride gone wild is your sister, daughter, or BFF, you can stop the insanity. Here are some tips offered on how to deal with an out-of-her-mind bride.

How To: Make Your Android Phone Read Articles, Books, News, and Other Text Out Loud to You

For the avid multitasker, listening to audiobooks and podcasts is the ultimate way to passively absorb knowledge while performing other activities — but there are other options. You can turn any written text on your Android phone into speech that's read aloud to you, so there's virtually no limit on what you can soak up audibly from your headphones or speaker.

How To: The Simple Way to Stop Your iPhone from Sending Unwanted Audio Messages

Your iPhone's audio messages may get you in trouble if they haven't done so already. It's way too easy for your iPhone to start recording without your knowledge, only to send a friend or family member a conversation you're having about them. (Awkward.) Luckily, protecting yourself takes only the flick of a switch.

How To: Share Any Password from Your iPhone to Other Apple Devices

In iOS 11, Apple made it easier for you to share passwords with friends. Back then, it was just Wi-Fi passwords, which made sense. "What's the Wi-Fi?" gets old after a while. But now, whether you're running iOS 12 or 13, you can share any password you want with any iPhone around, all with one of iOS' best features: AirDrop.

How To: Block Spam Texts with Samsung Messages

With so much of our personal data floating around the web, it's nearly impossible to get away from spam calls, texts, and emails. Unfortunately, this isn't just limited to the online world — filling in your contact information in a raffle ticket with the hope of winning that shiny new car in the mall, for instance, can often result in getting swamped with spam texts containing sketchy loan offers.

News: The 8 Best FaceTime Features in iOS 12 for iPhone

From its introduction and all the way through iOS 11, FaceTime has been restricted to one-on-one calls. Apple will be changing that in a future iOS 12 update with Group FaceTime, which adds support for up to 32 people total in group audio and video calls. But that's not all we'll be getting in iOS 12 — there are more features that FaceTime has or will be getting soon that you should know about.

How To: Use Maltego to Target Company Email Addresses That May Be Vulnerable from Third-Party Breaches

The easiest way around a security policy is to find users who don't follow it. The Have I Been Pwned database identifies accounts with information breached by major third parties like Yahoo and LinkedIn. With Maltego, hackers can locate breached accounts created using company email addresses, potentially giving attackers access to a company account if the employee reuses a compromised password.