Secure Australian Search Results

News: Signal, Snowden's Favorite Secure-Messenger App, Is Now on Your Desktop

Encryption is on everyone's mind these days, from the FBI's battles in court with Apple to WhatsApp's recent announcement of end-to-end encryption for their one billion users. Now you can add Signal, whistleblower Edward Snowden's favorite messaging app, back to that whirlwind discussion. Created by Open Whisper Systems, Signal is an encrypted messenger app that allows you to send text, images, video, and audio messages without the fear of prying eyes. They already have an Android and iOS app...

Exploiting XSS with BeEF: Part 1

BeEF is an XSS-exploiting framework that lets you "hook" or gain control of victim web browsers. In this part of XSS exploitation, we will be working on finding an XSS-vulnerable website. We can simply do this by Google Dorking.

News: The 'Electri-City' Tables by Ben Yates

I have an interest in using recycled materials in sculptures, particularly circuit boards and other wasted electronic and mechanical components with which I put together sprawling cities lit with fairy lights. These cityscapes can conjure an image of a parallel society built from what we throw away. Utopian or dystopian, the ‘Electri-Cities’ remain a feast for the eyes and the mind. What makes them particularly intriguing is the population of tiny model railway people—they bring a host of nev...

How To: Make a Simple Didgeridoo from PVC

Traditional Aboriginal didgeridoos are made from trees that have been hollowed out by termites. Finishing work to smooth out surfaces and decorate the didgeridoo would soon follow. Lucky for you, you don't have to spend lots of money or find a hollowed out tree to create a didgeridoo!

How To: Convert Images Into PDF

We always have so many file formats in our computer, we use MS Word to view .doc files, MS Excel to view .xls files, Adobe Reader to view PDF files, image viewers to view all kinds of image formats, and browser to view html files. It seems we need to install many programs to view so many kinds of file formats, and we have met a lot of people who wonder how to solve such problems. So can we transfer those files into one uniform and secure format? The answer is definitely yes, we are here to in...

How To: Perform a ring escape magic trick

Have you ever wanted to have the power to make things disappear? Ryan Oakes is going to show you how to obtain that power with this trick. You will need a cloth handkerchief, a shoelace, and three to four key rings. Sometimes we use materials that require adult supervision... like scissors so make sure you have friends and family around whenever you do magic tricks.

Lockdown: The InfoSecurity Guide to Securing Your Computer, Part I

This is a two-part series to locking down the computer to provide maximum protection. Even though this guide will sound intrusive, we are talking about reality here. Extreme measures must be taken to protect our computers, especially when we have confidential documentation or do internet banking, which many people do. We all have to use electronic devices at some stage, whether it be for business or personal use.

The Ultimate Guide: Diagnosing & Fixing Connection Issues, Part II

Hello everyone and welcome to Part II - The Ultimate Guide: Diagnosing & Fixing Connection Issues. In this tutorial we will discuss more advanced methods that I took in order to fix our home network. I have also attached a link to download the FREE eBook - so feel free to download it to you can refer to this manual when you are experiencing connection issues. I would also like to note that the manual has been loaded onto a free server - it will remain on the server until people stop downloadi...

How To: Create Strong, Safe Passwords

Movies like to show hackers breaking passwords with fancy software and ludicrous gadgets. The reality of busting passwords open is much more mundane. Simple as it may sound, most passwords are broken purely by guesswork. Check out this infographic from ZoneAlarm, as well as this list from the Wall Street Journal of the fifty most common passwords gleaned from the 2010 Gawker hack. If your password is on one of those lists, you need to change it. Right now.

Buy Products for Cheap on eBay: The Art of Arbitrage Bargain Hunting

In a recent arbitrage tip, we showed you the secret to making money fast by buying and selling the same thing over and over again on eBay. But there's one thing you need to know about the buying part—get the lowest price possible! This article aims to show you some of the best methods to making sure you're paying the lowest prices on eBay, so you're the best arbitrageur out there, with your profits higher than ever!

How To: Create a braided bun updo hairstyle

Transform childish pigtail braids into an evening updo. Take a braid and coil it around itself and for a tight look, secure it with a bobby pin. Do the same on the other side. Watch this video hairstyling tutorial and learn how to create a special updo with braids. Create a braided bun updo hairstyle.

How to Make a Jacob's Ladder: Chained Lightning

In this article, I'll show you how to create a simple yet accurate demonstration of the "rising ionized gas" principle. In other words, a transformer, two metal prongs and lots of evil laughter. Remember those large "towers" in the background of Frankenstein movies with a "lightning bolt" rising upwards every few seconds? That's called a Jacob's Ladder; one of the coolest awe-inspiring demonstrations of high voltage. Here's a video of the final product: Materials and Tools