Question Inquiries Search Results

Facebook Photo Privacy: Are You Safe?

Almost everyone uploads their very personal photos in facebook trusting facebook's privacy settings. But question is - is facebook's privacy settings really that trustworthy? Few months ago, while browsing facebook, I found that one can easily access your private photos using the same browser you used to browse facebook.

How To: Get Faster Access to Settings for Your Installed Xposed Mods on the Nexus 7

If you're reading this, chances are you're utilizing Xposed Framework to apply unique customizations to your device . We've covered various Xposed mods, like how to how to unlock KitKat's full screen capabilty and make your battery percentage easier to read on the Nexus 7, but today, we're showing you an Xposed module for Xposed. In order to access the modules on your device, you typically enter the Xposed Installer, go to Modules, then select your mod. Easy enough, right? Well, things just g...

How To: Make the Stock Weather Widget Transparent on Your Samsung Galaxy S4

The stock weather widget preloaded on your Samsung Galaxy S4 is really great, but there's one thing that's missing—options. The weather widget shows just the right amount of information at a glance, and it's not too shabby looking either, but for us softModders, it'd be really nice to have more options. Well, today I'm going to provide you with a couple. Interestingly enough, this is a topic I first covered on the Samsung Galaxy S3.

How To: Dimensional Analysis

What Is Dimensional Analysis? Dimensional analysis is used to convert units. It's the process of analyzing units to decide which conversion factor to use. It's used by multiplying units by conversion factors, rates equal to 1.

How To: Disable the Face Tag Feature on Your Samsung Galaxy S3 and Note 2

If you've got a Samsung Galaxy S3 or Galaxy Note 2, you probably either love or hate the Social Tag feature. Using facial recognition, much like Facebook does, it scans your photos and lets you tag a name to a face. If your device recognizes the face by itself, it will automatically tag it for you. If the person is in your contacts, it will give you the option of calling, texting, or emailing them. While it's a great feature for some, it doesn't always work perfectly. If the flash from the ca...

How To: Hackers Can Remote Wipe Your Samsung Smartphone—Find Out If Yours Is Vulnerable (And Fix It)

Security researcher Ravi Borgaonkar from Berlin has discovered that hackers can hide an 11-digit code in a webpage that can wipe out all of the information on your smartphone—contacts, photographs, music, applications, and anything else of importance. The attack takes no more than a few seconds and nothing can be done about it. NOTHING. This begs the question—are you susceptible?

How To: Privacy? What Privacy? Quora Now Publicly Shows the Posts You View: Here's How to Disable It

In an effort to help posters see the various ways that people discover their posts, Q&A site, Quora has decided to make who views each post, public, along with information on how each viewer came to see the question (ex: through an email, a followed tag, or other public stream). This would probably be an interesting, helpful, and universally liked feature, except for one thing...

News: Cancer Patient Beg-Off

Have someone shave all the hair on their head, but make sure to do it badly. Intentionally miss patches of hair on the eyebrows and head, and make sure to try to get some razorburn for that obviously-just-shaved look. You could also use an electric hair trimmer to leave a little bit of hair and make it even more obvious. Leave the hair on your arms or wherever else as if you forgot to shave it. The point is to be completely unconvincing.

How To: Become Fashion Friendly By Painting Your Nails

Do you wanna be that person who stands out in a crowd? Our society dictates our fashion sense. We believe we all must look like who ever is the "most popular" in the media (TV, film, magazines etc.). Our choice to express our self is very limited because of the stigma of what patterns, styles and colors belong to which gender. I have found by adding just a hint of feminine flair to my person that I am able to catch peoples eye's faster than a supermodel walking onto a runway.

How To: Keep Your PC Running Smoothly

Introduction This is one of the things I am asked the most and there are so many different answers. It is hard to just tell you without know your computer's current speed or what type of hardware it has. So here I will talk about how to speed up a slow computer and how to keep your computer running fast.

How To: File a Last-Minute 2010 Income Tax Return: Save Money, Get Free Tax Help & More!

Ever since high school, I've been preparing my own taxes. Each year it gets more and more complicated, which results in me filing later and later, avoiding it until I have the time or just can't wait any longer. I even resorted to using TurboTax online to help do some of the grunt work for me these past couple years, but that hasn't stopped me from being lazy about it. I have yet to file my 2010 taxes, but I will very soon. Tomorrow, in fact—before TurboTax raises their prices.

How To: Improve your oral presentation skills

The ComCoachVideo Tutorial is an online learning environment designed to help students improve their oral presentation skills. The website contains video clips illustrating effective and ineffective public speaking practices, as well as an interactive feedback component designed to foster students' ability to critically evaluate presentation segments.

Hack Logs and Linux Commands: What's Going On Here?

This morning, I received a message from a friend who was reading a hack log, and she had some questions about the commands used. This got me thinking, as Linux has a ton of commands and some can be archaic, yet useful. We are going to go over everything you need to know to read a hack log and hopefully implant the steps in your head for future use.

How To: Who Is Anonymous? How the Wall Street Journal and the NSA Got It Wrong

Over the past couple of weeks, there have been a series of high-profile hacks and leaks. From the rooting of CombinedSystems, to a secret FBI conference call leak, all the way to the distributed denial-of-service (DDoS) attacks on U.S. government sites—with a lot in-between. As governments move to close their long fingers around the free speech that exposes their secrets, this shadowy collective of loose-knit, but like-minded individuals are hell bent on preventing them. Or are they?

How To: Don't Get Caught! How to Protect Your Hard Drives from Data Forensics

With the mass arrests of 25 anons in Europe and South America, and the rumors of an FBI sweep on the east coast of America floating around, times look dicey for hackers. Over the past few days, a lot of questions have been posed to me about removing sensitive data from hard drives. Ideas seem to range from magnets to microwaves and a lot of things in-between. So, I'd like to explain a little bit about data forensics, how it works, and the steps you can take to be safe.

News: Introduction To Keywords & Google Keyword Tool

In this article I’m going to talk about specific issues about optimizing your website, making it more clear to Google and other search engines exactly what your website is about. As I've discussed in previous articles this is very important for people when they are searching. We're going to talk first about keyword phrases and how they fit into search engine optimization. You are going to be using keyword phrases in a number of different ways. First you have to figure out what your keyword ph...

News: Google+ Pro Tips Weekly Round Up: Refining Sharing

One of the primary goals of a social network is for you to share what you find interesting with your followers and friends, but on Google+, sharing has so many layers that it can be confusing for most people to really take advantage of it properly. Some of the tools in place that enable you do deal with spam and manage your privacy aren't very clear, so this week's round up is all about how you can share what you want with who you want on Google+.

News: Cooking on Google+ with the Social Skillet: Interview with Eric McKee

On Google+, one of the very first creative projects using the popular hangout feature revolved around cooking. Foodies +Lee Allison and +Eric McKee decided to start their own "G+ Cooking School", which has now expanded into the Social Skillet. Although neither have formal training, they're both quite accomplished cooks and skilled instructors. Using hangouts, they've taught their students how to create dishes like margherita pizzas and chicken marsala.

News: Enter The World of Catherine

Stuck in a relationship that is going nowhere? Do you wake up and it's nine years later and nothing has changed? Do you also dream of sheep? You know, in the non erotic sense? Well welcome to Catherine, a puzzle game of non-commitment and text messaging.

News: Is the Metascore Algorithm for Rating Video Games B.S.?

Guiding internet users to useful content is one of the most lucrative businesses in the world. This process is called aggregation. Google and other search engines form the top of the food chain, aggregating all of the content on the web in response to queries. There are all sorts of other important aggregators though, and you probably use at least one every day: Fark and Reddit for web content, Rotten Tomatoes for movie reviews, and Metacritic for a variety of media, but most importantly, vid...