Secure Users' Search Results

How To: Format an SD card

Is your SD memory card getting a little too full? Is it not working? Try reformatting it. It's the first and sometimes last step to troubleshooting card problems. So, if your SD card has become too cluttered, this guide will restore it to a like-new condition with a simple format.

How To: Drain down central heating in your home

First of all the tutor advises that this is a good idea to do it regularly. It is advisable to drain it out otherwise it shall stop the boiler from working. Before starting your work you have to switch off your boiler. Now allow the water to cool down because it is very hot. First find out the radiator and the drain valve attached to it. Now take a hose pipe which is long enough to drain the water from the radiator to your backyard. Slide the pipe over the inlet and then secure it the link. S...

How To: Prepare for a hurricane or typhoon

This video on typhoon preparedness comes from Andersen Air Force Base in Guam, where typhoons are common. The key to surviving a typhoon or other disaster is preparation. Stock up on enough food and supplies to last your family for about a week. Routinely check expiration dates on food, water and batteries and rotate your stock. Be sure window screens are in place and in good condition in the event the power is off for several days.

How To: Create an SSH tunnel for your Mac Mini server

How to Use Your Mac as a Server: Turn your Mac Mini into a server! Yes, that's right, with a little know-how and a little spunk, you can turn an inexpensive Mac Mini computer into a server to provide services over you network. You won't even need the Mac OS X Server, just the Mac OS X Client, so there is no extra software to buy, just the Mac Mini and it's operating system.

How To: Hack SAML Single Sign-on with Burp Suite

Single sign-on (SSO) lets users login across different sites without having to manage multiple accounts. I'm sure most of us appreciate the convenience of seeing "Sign in with …" buttons that let us login with a single username. Hackers, however, see a possible avenue for exploitation, and you'll soon learn how an attacker can exploit a SAML vulnerability to assume another user's identity.

News: Mastercard, Qualcomm-Powered ODG Smartglasses Use Iris Authentication for AR Shopping

As the level of data being generated grows exponentially, past the Information Age and into the coming Hyper-Information Age of immersive computing — as resistant as many of us are to the idea — personal data security is becoming a necessary consideration in our everyday lives. Recognizing this, Mastercard, Qualcomm, and Osterhout Design Group have teamed up to show what secure shopping could look like in the very near future with iris authentication.

News: Pinterest Takes Steps to Hack-Proof Your Account

The peaceful, pastel and doily-filled world of Pinterest is my oasis. My account conveys who I want to be and what I want to accomplish, so the idea of someone hacking it and ruining my favorite escape for me is heartbreaking. Fortunately, Pinterest has updated its security, implementing three new features to hack-proof your account.

News: Here's Everything You Should Know About Samsung Pay

Mobile payment systems have been around for almost 5 years now, starting with Google Wallet. But when Apple got into the game last year with their new Apple Pay service, things really started to take off. Around this time, Samsung responded by acquiring an up-and-coming mobile payments company that owned the rights to an incredibly innovative technology called Magnetic Secure Transmission (MST).

How To: Lock Your Files & Create Password-Protected Folders in Windows 7/8

Technology has progressed by leaps and bounds and has blessed people in a number of ways, but at the same time, it has troubled them also. Computers are now used in every aspect of life. No matter if you are a businessman, an employee, a student, or even a housewife, a computer can assist you in your routine work. You save your personal information, documents, and other similar sensitive stuff on your computer that can hurt you if they get compromised.

How To: Make the best padlock shim out of an aluminum can

The padlocks that secure most of America's high-school lockers are one of the easiest types of locks to open in the world for thieves and other miscreants. The easiest, cheapest way to do so is using a shim. These can be bought online, but why both when you can make one yourself out of an old soda or beer can? This video features a professional lockpicker at a conference explaining exactly how to make your own can shim and use it to open any padlock. You little devil you.

How To: Pack a suitcase like a professional concierge

In this video, we learn how to pack a suitcase like a professional concierge. First, you want to tuck in the edge of the case and pack the shoes at the very bottom. After this, tuck shoes or underwear into boots and shoes to help save room. Next, lie the jeans over the luggage and then fold shirts up to where you are rolling them from the bottom up and place them on the pants. Add in any more shirts, then place the waist band and bottom of the pants over the shirts. Use tissue paper on the to...

How To: Remove a boat from the water for transport & storage

Eddie shows us how to remove a boat from the water in this video tutorial. First, take down the canvases and wrap them up. Now, put the antennas down and drive the boat to the loading dock. Next you will need a large truck that has a hitch and trailer attached to it, and secure everything so the boat stays on and doesn't come off of the trailer. Take the drain plug out of the boat before you transport it, to make it lighter. Transport the boat to your house, and place bricks over the front so...

How To: Tie a multiple scaffold knot

Know your knots! With this free video tutorial, you'll learn how to tie a multiple scaffold knot. The multiple scaffold knot has a couple more loops in it to make it stronger and more secure than the regular scaffold knot. The knot is easy to tie provided, of course, you know how to go about making it. For an easy-to-follow, step-by-step overview of how to tie this useful fisherman's knot in a minute's time or less, watch this free video knot tyer's guide.

How To: Take apart and fix a 6th generation iPod Classic

In this how to video, you will learn how to open a 6th generation Ipod Classic. First, make sure to turn it off and make sure the hold button is on. Take a prying tool to undo the clips inside the device by sliding it in between the cover and back. Once the clips are undone, place thumb tacks on the sides and tops while popping the base out. Be careful, as there are cables inside that you do not want to break. The orange part is the battery while the blue object is the hard drive. Once you ma...

How To: Create a UnaBox

This video shows the viewer how to make a UNA box from pieces of hardwood, and 2 pieces of dowel. The box is made by building the normal box from the wood. The lid is then secured using a large piece of dowel so that it can pivot. Additionally to the first large dowel another smaller piece of dowel is secretly added to stop the box opening this has to be removed for it to open so makes it harder for intruders to open. The box can then be sanded, painted and used to hide small objects!

How To: Get familiar with a Mac in comparison to a PC

Check out this informative video tutorial from Apple on how to get familiar with a Mac in comparison to a PC. If you're used to working on a PC, this video will show you some of the basic differences between using a PC and a Mac. Once you get to know the fundamentals, you'll find that it doesn't take long to get familiar with the Mac.

How To: Hack a lock with a soda can shim

Don't know the combination to your lock securing all of your important gym socks? Maybe you just want to impress all of your friends by hacking a combo lock? Whatever the reason, this instructional hacking video will show you how to open a lock with a soda can shim the easy way.

How To: Set up a secure wireless router

In order to set up a secure wireless router, you will need to use the security that is available with your wireless routing. You will need to change the default ID names and password on your computer. Try to make sure that your passwords are difficult. Also, turn on the encryption: e.g. WEP.