Respectfully Request Search Results

How To: Customize Camera, Microphone & Location Permissions for Specific Websites in iOS 13's Safari

In iOS 13, Safari has become even more powerful, especially when it comes to privacy. The browser will warn you when you create a weak password for a new account. Your history and synced tabs in iCloud are end-to-end encrypted now. And there are per-site settings that let you choose which domains can and can't have permission to use particular device hardware or sensors.

How To: Download Your 2018 Apple Music Listening History Just Like on Spotify

Around the end of each year, Spotify offers a year-in-review service so its users can see what they listened to the past year and share their listening histories in fun infographics. Apple Music does not have such a feature, unfortunately, but there is a way to curb that FOMO feeling this holiday season by downloading your listening history not just for 2018, but for the entire lifespan of your account.

How To: App Ops Is Alive! Add It to Your Nexus 5's Settings Menu for Per-App Permissions Control

Android's permissions system is simple, transparent, and straightforward. When installing an app, you get a chance to review all of the permissions that the app has requested. These can range from accessing your location data to holding a "wakelock" in order to prevent your phone from entering sleep mode. But your only choice in this matter is to accept all requested permissions, or not install the app.

How To: Create a new meeting request in Microsoft Outlook

This how to video shows you how to setup a meeting using Microsoft Outlook. First, open the program. From here, click on calendar. Next, go to the upper left corner and select new. On the subject line, type in the subject of the meeting. In the body, type in what the meeting is about. Go to scheduling and go to the left and select invite attendees. From here, select the address book and search for people by their last names. Select who is optional and who is required. Click okay. You will see...

How To: Prevent airplane seats from reclining

There just isn't enough space on airplanes for any one, even those on the shorter end of the spectrum. Top flight nightmares are usually being seated next to a screaming child, a person of large girth, or behind that jerk who reclines their seat for the entire flight. Most people aren't going to respond well to even polite request for courtesy, so that's when a little chair subterfuge comes in handy. Come prepared with a plastic zip tie and this simple trick. Watch this pranking tutorial and ...

How To: Sick of Thumbs Up? Here's How to Change the Default Chat Emoji in Individual Messenger Threads

When you can't think of a way to respond in Messenger with words, emojis and stickers will do the trick. Since Facebook is all about the "likes," which use a thumbs-up icon, there's a shortcut to the symbol just to the right of the chat field. It's always there to send a quick like in response to something. But it doesn't have to be the standard Facebook thumbs-up sign — it can be any emoji you want.

How To: Hack SAML Single Sign-on with Burp Suite

Single sign-on (SSO) lets users login across different sites without having to manage multiple accounts. I'm sure most of us appreciate the convenience of seeing "Sign in with …" buttons that let us login with a single username. Hackers, however, see a possible avenue for exploitation, and you'll soon learn how an attacker can exploit a SAML vulnerability to assume another user's identity.

How To: Security-Oriented C Tutorial 0x0B - User Input

Hey readers! This tutorial will be the entry point for the introduction of buffer overflows. Something like requesting user input is a very common place for vulnerabilities to pop up and we will definitely have fun while trying to make programs crash. But for now, let's start with how we can get input from a user.

How To: Put together a resume as an ex-offender

Eric Mayo teaches us how to put together a resume as an ex-offender. Your resume should be a one page paper of all your skills and work experiences. If you don't have a lot of experience writing resumes, get help from friends who have experience. When you write it, add your name, address and telephone number onto it so you can be contacted. After this, you will want to list: objective, work experience, education/training, skills/strengths, and references. Remember not to list your references ...

How To: Create a pink 1920s film noir makeup look

In this video from Fashion Face, we are shown how to do a 1920's pink film noir makeup look that was actually requested by Courtney Love and originally created by a makeup artist for the brand Illamasqua. This is an extreme look, and there are a lot of tools and makeup involved, but it creates a really cool look, and provides some great tips.

How To: Do the Lady Gaga Poker Face bow hairstyle

Lady Gaga's Poker Face bow hairstyle! Lady Gaga’s hair bow was definitely a challenging request. I had to change it up to make it something more wearable for everyday. Well at least for me. I don’t think a HUGE-mongo bow on my head would work for me. A small petite one on the side is much more wearable. Watch this how to video to learn how to recreate Lady Gaga's bow hairstyle from the Lady Gaga music video Poker Face.

How To: Download Your TikTok Data & Activity Report to See What's Been Collected About You

If you're concerned about your privacy, TikTok might not be the app for you. Its shady practices with user data have been the subject of concern, criticism, and even legal action by the US government. Then again, it's just so addicting. If, like me, you're not going to stop using TikTok anytime soon, you should at least know how to view the personal data it has collected on you.

How To: Securely Sniff Wi-Fi Packets with Sniffglue

Sniffing packets over a network is an easy way for hackers to gather information on a target without needing to do much work. But doing so can be risky if sniffing packets on an untrusted network because a payload within the packets being captured could be executed on your system. To prevent that, Sniffglue sandboxes packet sniffing to provide an extra layer of security.