Search Message Search Results

How To: Navigate Hands-Free Using Voice Commands

Google Maps, in conjunction with the Android operating system, is a powerful tool for navigation that is often underutilized. While it's no secret that it can get you to wherever you're going and back, some of you might not know that you can use Google Maps without even having to touch the screen. Not having to touch your display means you can concentrate on other things, you know, like driving or eating that jelly-filled donut.

News: Microsoft Beat Google to the Punch with a "Now on Tap" Clone for Android

One of the biggest new features in the soon-to-be-released Android 6.0 Marshmallow is something Google is calling "Now on Tap." Essentially, this service will be able to scan the contents of any screen on your Android device, then after you long-press the home button, it will provide you with relevant information about anything—from movie times to directions or dinner reservations.

Android Basics: How to Install Apps

Your average Android phone or tablet comes with quite a few apps already installed—even before you turn the device on for the first time. These pre-installed apps are certainly helpful when it comes to getting your feet wet with Android, but in many cases, they're not always the best apps available for accomplishing the tasks that they perform. Additionally, many third-party apps can add lots of cool functionality to your device, so you might say that sticking with only the pre-installed apps...

How To: Use Google to Hack(Googledorks)

hello my dear colleagues, I made a visit to nullbyte and found that there is not a complete tutorial about the google dorks, so I felt the need for this tutorial, and seeing that there are many newbies around, so here's a tutorial that will teach you how to use google to hack.

How To: Get Rid of Spam in Your Gmail Account

Spam emails are emails that are sent to you without your permission. They can quickly fill up your email account if you don't do anything about it. Each email server deals with spam in a different way. Gmail is good at separating the spam for you so that you can get rid of it more quickly. It is easy to delete the spam and if you want to take it a little farther, you can get some of the spam to stop coming all together.

How To: Understanding Signature Schemes: How Data Sources Are Authenticated, Secured, & Spoofed

One of the biggest problems in data security is authentication of data and its source. How can Alice be certain that the executable in her inbox is from the venerable Bob, and not from the not-so-venerable Oscar? Clearly Alice wants to know because if this file is actually sent to her by Oscar, the file might not be a game, but a trojan that can do anything on her computer such as sift through her email and passwords, upload her honeymoon pictures, or even turn on microphones and webcams. Thi...

How To: Block Unwanted Calls or Text Messages on Your iPhone

Trying to get rid of an ex or clingy friend? Just want to keep telemarketers from calling you all the time? You can use the iPhone app iBlacklist (for jailbroken iPhones) to create a list of blocked calls for your iPhone. Blacklisted phone numbers will not be able to send you either phone calls or SMS text messages, so you can continue to use your iPhone in peace. Customize your phone's reaction to blacklisted numbers and adjust the filters for your blacklist, as well.

How To: Access Casio G'zOne Brigade QWERTYShortcut

In this video, we learn how to access Casio G'zOne Brigade QWERTYShortcut. From your idle mode with the flip open, press the middle button. Then, press '9', which is settings and tools. After this, press '7' or scroll down to 'phone settings'. Then, press '2' for shortcuts and then press '3'. After this, go up to text message and select the center key to set. Now, from the main screen you will be able to start composing a message just by selecting any key. This makes it easy to write a text q...

How To: Bypass a blocked site with a proxy

Different ways of using a proxy bypass to access blocks sites is shown with ease in this video. Many places explained to be blocked with internet security such as libraries and schools. Using a search engine such as Google you need to search for a proxy site. After a proxy site has been found you will use it to access the blocked websites through another servers internet provider. The narrator explains that proxies are just a way to bypass internet blocks by avoiding using the blocked compute...

How To: Find out what an unknown device is in device manager

This video narrates and explains how to figure out how to install an unknown device using the device manager. The first step is to access the device manager through the control panel/system. Once in device manager you must select the show devices options. Once the device menu is visible you then find the unknown device section and copy the name of the device driver. The next step is to open Google search engine and paste the unknown device ID name. After the search is complete you will see ma...