Secured Indexing Search Results

How To: Create DIY Filters for Your Cell Phone

In photography, using filters over lenses is a common practice and provides a great way to set the mood or to create an artistic image. The only problem is that they can be quite costly and there currently aren't many available for cell phones specifially. Fortunately, there is a simple solution to this, and all you need are everyday objects that can be found around the house. If you're a purist and don't want to rely on filters provided by camera apps, this is a great way to experiment with ...

SUBMIT: Holiday-Themed Cell Phone Photo by December 26th. WIN: Silly Photobooth Props

The holidays are here and all of us here at Phone Snap hope you're spending them under a nice warm roof with some yummy food and great company! For this week's Phone Snap challenge, we want you to utilize your cell phone to capture some holiday spirit. Whether it be the gifts under the tree, stockings hanging over the fireplace, Christmas lights outside, or everybody gathered together wearing their favorite holiday sweaters—we'd love for you to share with us!

How To: Make Marble Photo Magnets

Christmas is no more than a week away and you've still got some holiday shopping to do. Need an easy, thoughtful and personalized gift idea? Phone Snap is here to show you how to bring those cell phone photos off-screen with these DIY marble photo magnets. It takes less than five minutes to make and will look great on anybody's fridge!

Goodnight Byte: HackThisSite Walkthrough, Part 2 - Legal Hacker Training

Welcome to the closing of the second HackThisSite and programming Community Byte. First and foremost, I would like to ask that people start showing up on time to the Community Bytes. If you need help converting your time zone to PST, go to Time Zone Converter. When users do not show up on time, we have to go backwards and catch everybody up. This wastes time and will also make other users' experience less enjoyable when they have to watch and listen to the same thing 100 times. Punctuality as...

Secure Your Computer, Part 3: Encrypt Your HDD/SSD to Prevent Data Theft

Welcome to Part 3 in my series on protecting your computer from prying eyes (Part 1, Part 2). In today's segment, we will be going over drive encryption using the TrueCrypt program on Windows OS. Drive encryption is a technique that masks your data with a cryptographic function. The encryption header stores the password that you have entered for the archive, which allows the data to be reversed and read from. Encrypted data is safe from anyone who wants to read it, other than people with the ...

How To: Carve Saved Passwords Using Cain

I've previously mentioned how saving browser passwords is a bad idea, but I never went into much detail as to why. Passwords that are saved in your browser can be carved out and stolen very easily. In fact, even passwords you save for instant messaging and Wi-Fi are vulnerable. Windows is very inefficient with the way it stores passwords—it doesn't store them in key-vaults, nor does it encrypt them. You're left with passwords residing in memory and filespace that's unencrypted.

News: Easy Skype iPhone Exploit Exposes Your Phone Book & More

Like the recent XSS 0day exploit found in the Mac and Windows versions of Skype, a similar one has been found in the Skype app for iPhone. The vulnerability allows an attacker to send a message that contains malicious JavaScript code in the "Name" parameter. This code can steal your phonebook, crash the app, and potentially do a lot worse. The URI scheme is improperly identified for the web-kit browser. Instead of going to a blank browser page, it defaults to "file://". The code could steal a...

News: Digital Picture Frame Snatches Photos from Public Wi-Fi Networks

You're sitting in your favorite café enjoying a hot cup of joe, then you open up your laptop or turn on your tablet computer to get to work, but as always you get sidetracked and head straight for Facebook. Someone just tagged you in a photo, so you check it out, then you see it out of the corner of your eye—your Facebook picture digitally displayed on the wall in a nice, neat digital photo frame.

News: FaceNiff App Allows Android Users to Hack Facebook

Firesheep caused quite a stir when it was released last October, giving both hackers and non-hackers instant access to people's account information when on a public Wi-Fi connection. When logged into an insecure website on the same network as someone with Firesheep, you're giving them access to the cookies that keep you logged in. This is called session hijacking, and grants them easy access to your accounts, like Facebook, Flickr and Twitter. Now, there's an even easier way to do this—a mobi...

News: From Puppy to Adult in 40 Seconds (+ 3 Methods for Creating Time-Lapse)

What's cuter than a puppy? Not much, especially when you omit all the peeing, barking and furniture chewing, as Remedie Studio did with this sweet time-lapse homage to their beloved pup. Below, watch Dunder the German Shepherd grow from 8 weeks old to 1 year in 40 seconds. Inspired? Make your own time-lapse video and post it to the WonderHowTo company blog. We'll show off the best ones. Here are three different methods to get you started:

How Do You Create Your Own Job: An Example

On Thursday, March 9, there was a news story on the evening news about Khan Academy (NBC News). The story began when Sal Khan started tutoring his cousin in 2004. Since he was in Boston and she was in a different city, he decided to make and post videos on YouTube so anyone could watch the videos. Later he added videos for her brothers and for people that contacted him with requests for other videos. During this time Sal had a job that he later replaced with another job. Today Sal has 2010 vi...

Shortcut: 5 Secret Body Tricks

Body hacks. So simple, so ingenious. They're the shortcuts in life. We love them, the internet loves them. Back in 2008, somebody named Alicia Goh wrote a friendster blog post that has been passed along far and wide. Her tricks of the body include quick solutions for an itchy throat, a stuffy nose, a dire need to pee, and more. My favorites:

How To Live Underwater: A Nevada Family's Bubble Fort

Would you rather live far up in the trees? Or deep underwater? A Nevada family of scuba divers have built the ultimate childhood getaway: the Needham family's "Bubble Room" is an underwater fort that sits at the bottom of a lake in the Sierras. The room is an air-filled pocket, made with vinyl and anchored down by an octagonal framework of metal pipe.

News: The Fingers Intro Part 2

Hello again ! This is the second part to Fingers from a Hand Analysis perspective.Where as the first Video just covers basic introductions to the Fingers, this part two Video takes things a little bit further and examines ......Finger Shape ;- Length suggesting mental speed, Methodical or Speedy thinker ?Finger Width ;- Suggesting which level a persons interests may lay, Mental or Practical realms ?Finger Prints ;- Amazingly interesting area to explore , Fingerprints do not change.. They star...

News: Kids Kill Jimmy Kimmel at SCRABBLE

It's no secret that Jimmy Kimmel is a SCRABBLE man. He hosted and won the SCRABBLE 60th Anniversary Celebrity Doubles Tournament (SCRABBLE Under the Stars), and for the last couple of years, featured the National School SCRABBLE Champs on his late night show "Jimmy Kimmel Live!".

News: Pacific Shark News Reports

The Pacific Shark Research Committee is the sole spot to find ALL shark sightings in SoCal. They're incredibly diligent about indexing all the activity. It's kind of nerve wracking that my two favorite spots: Sunset and San O are the most popular for white shark sightings, but oh well.

News: Is your dog healthy enough for Travel

Be honest about your pet's ability to travel. If your pet is very young or old, or is ill, pregnant, or recovering from surgery, it may be better for all concerned to look into a pet sitter or kennel rather than take a chance on injuring your pet by taking it with you. If you are in doubt, ask your veterinarian. If your pet has not traveled before, try a short overnight or weekend trip first.

How To: Do a seated chest press exercise with resistance bands

The seated chest press can be done from any chair with a seat back. This exercise is great for shaping and strengthening the chest muscles. The chest is scientifically named the pectoralis. This muscle is used any time you push a chair up to the table, shut a car door, or push a shopping cart. There are two muscles that make up the pectoralis. They are the pectoralis major and minor. The pectoralis major is always the prime mover during chest exercises.

How To: Do leg extensions with exercise bands

The seated leg extension is used to isolate the quadriceps muscles. The quadriceps muscles are located on the front of the thighs. As you might have guessed, there are four muscles that make up the quadriceps. Each muscle works in unison to extend the knee. In everyday life, the "quads" are used when you jump, walk, sit, kick, or stand.

News: Signal, Snowden's Favorite Secure-Messenger App, Is Now on Your Desktop

Encryption is on everyone's mind these days, from the FBI's battles in court with Apple to WhatsApp's recent announcement of end-to-end encryption for their one billion users. Now you can add Signal, whistleblower Edward Snowden's favorite messaging app, back to that whirlwind discussion. Created by Open Whisper Systems, Signal is an encrypted messenger app that allows you to send text, images, video, and audio messages without the fear of prying eyes. They already have an Android and iOS app...

Exploiting XSS with BeEF: Part 1

BeEF is an XSS-exploiting framework that lets you "hook" or gain control of victim web browsers. In this part of XSS exploitation, we will be working on finding an XSS-vulnerable website. We can simply do this by Google Dorking.