Questions Pertaining Search Results

How To: Do Framed Glitter Nails

In this video , I shall share with you girls a very simple and fun way to go glitter nails to get a gel like effect and a framed look for this glitter ! Check out the video and you will be surprised how easy it is to get these simple and clean lines on the nails !

Spraffl: A New Location-Based Social Network That's Completely Anonymous

The long standing popularity of 4chan has been due to the entirely anonymous setup. The site's anonymous community and culture has provoked media attention, in turn inciting larger audiences. On the other side of the spectrum is Facebook—popular for its connectivity and easily identifiable names. With the brush of keyboard stroke, you can be connected with your entire high school class in a matter of seconds.

How To: Set Up Multiple Users on Your Android Jelly Bean 4.2 Tablet

The most recent update for Android's Jelly Bean has some pretty cool new features, like better panoramic photos, gesture typing, and wireless sharing. From a security standpoint, though, the best new feature is the ability to add multiple users to one device. You can create up to 8 different accounts on Android tablets like the Nexus 7 or Nexus 10, so besides saving time hiding or protecting sensitive data, it could also save you some money. You can share a device with your family, kids, or s...

How To: Who's Unfollowing Your Twitter Account? Find Out with These Tracker Apps (And Get Revenge!)

Feelings can get hurt on Twitter as fast as an update. Everything is fine and dandy because two people are mutually following each other, then out of nowhere, one person has unfollowed the other out for seemingly no reason. Twitter doesn't notify users when someone has unfollowed them, so there are millions of people out there who get used for their follow! Well, now you can find out who unfollows you on Twitter with these mobile apps.

How To: Make Your Dreams a Reality… In Your Dreams (By Lucid Dreaming)

Lucid dreaming, in which you're aware that you're dreaming, can be profoundly beneficial to us. It gives us freedom to do things we couldn't possibly do in the real world. It can show us the true potential of our brain power. You can even use lucid dreaming to question the nature of our own reality. For whatever reason, people everywhere are interested in this mysterious phenomenon...especially in achieving it. Whether it be visiting another planet or flying around, the possibilities in lucid...

How To: Get a Refund from Apple in iTunes or the Mac App Store

If you don’t have any little children to blame for an inadvertent or misguided app, book, or music purchase from Apple, you might still have a fighting chance. Apple has a very strict return policy, specifically stating that all sales and rentals of products are final for purchases made in the iTunes Store, Mac App Store, App Store, and iBookstore. But if you play it carefully and do a little digging, a return and full refund may still be possible.

How To: Customize Your USB Keyboard with a DIY Illuminated Base with Built-In Phone Stand

I've never really liked to type on a flat or low keyboard. Even the small flip-up stands underneath most keyboards were not good enough for me, as those little legs aren't usually more than 2 or 3 centimeters high. I'd like a minimum of 5 cm, so I decided to make this keyboard base for myself. Aside from giving me the right height and angle, this DIY keyboard base also features LEDs that light up my monitor, the table, and gives a nice background to my desktop. It's even got a built-in stand ...

How To: Get out of a speeding ticket with Officer Brian

If you do get stopped pull over to the right and make sure you are off the road. If it is at night turn your interior lights on. Keep your hands on top of the steering wheel until the officer tells you what to do. If he asks you do you know why I stopped you always answer no. He will then ask for your drivers license, registration, and insurance. If it is in your glove box or your wallet tell him what you are going to do. This shows respect for the officer. Before he goes back to his car make...

How To: Understand the menstrual cycle

This retro informative video gives a general overview of a woman's menstrual cycle. A curious young girl asks her family questions about having a period, what's normal, what isn't, who gets one, who doesn't. While this video feels a bit dated, and eschews medical terminology, it offers some basic insight to that time of the month. Check out this video and learn how to understand the feminie menstrual cycle.

How To: Mix an edible panties cocktail

Panties don't taste like fruit, unless the edible panties cocktail is the one in question. Raspberry vodka, orange vodka, cranberry juice, sweet and sour, watermelon liqueur, sour apple liqueur, and triple sec make up the edible panties cocktail. Follow along with bartender Jorge as he gives step by step directions for how to mix up this specialty alcoholic drink. Watch this video beverage making tutorial and learn how to mix the edible panties cocktail.

How To: Quickly Gather Target Information with Metasploit Post Modules

Post-exploitation information gathering can be a long and drawn-out process, but it is an essential step when trying to pivot or establish advanced persistence. Every hacker should know how to enumerate a target manually, but sometimes it is worth it to automate the process. Metasploit contains post modules that can quickly gather valuable information about a target, saving both time and effort.

How To: Enumerate SMB with Enum4linux & Smbclient

SMB (Server Message Block) is a protocol that allows resources on the same network to share files, browse the network, and print over the network. It was initially used on Windows, but Unix systems can use SMB through Samba. Today, we will be using a tool called Enum4linux to extract information from a target, as well as smbclient to connect to an SMB share and transfer files.

How To: Advanced Techniques to Bypass & Defeat XSS Filters, Part 2

Cross-site scripting can be one of the easiest vulnerabilities to discover, but to be successful with this type of attack, it is essential to learn how to get past filters. In the previous guide, we explored some ways to do this, such as abusing attributes and event handlers and tricking the application into accepting unusual characters. Now, let's take a look at more techniques used to defeat filters.

How To: Abuse Session Management with OWASP ZAP

It's always a good idea to know how an attack works at the very basic level. Manual techniques for exploitation often find holes that even the most sophisticated tool cannot. Sometimes, though, using one of these tools can make things so much easier, especially if one has a solid foundation of how it works. One such tool can help us perform a cross-site request forgery with minimal difficulty.

Hacking macOS: How to Remotely Eavesdrop in Real Time Using Anyone's MacBook Microphone

Google, Amazon, and Facebook are always listening. But what's worse? Hackers are listening, too. Windows PCs are particularly vulnerable, but with a few simple commands, a remote attacker can even take over the microphone on someone's Mac computer, streaming audio and listening to private conversations in real time without the victim's knowledge, abusing an overlooked security consideration.