Short Url Search Results

How To: Snorkel

If you love the ocean and love swimming, it's time you step up to the next level… snorkeling. Snorkeling is one of the best ways to explore the underwater life, without fancy equipment or expensive training. And all you need is a snorkel. If you want a better look at what’s underwater, all you have to do is snorkel.

How To: Get a Bollywood bride inspired makeup look

Feeling a little Bollywood? Misschievous shows you how to do a look inspired by Bollywood artists and brides. You can achieve the look by following these simple steps! 1. Apply a copper tone eyeshadow on your lid. Sharpen the edge and go light as you bring it inwards. 2. Define the edge by applying a Cranberry tone eyeshadow following the shape of the edge and buffing it out as you go up to the crease. 3. Using a darker shade like Mac's Beauty Mark, draw a semi-V shape following your crease. ...

How To: Make a mini uzi out of paper

Learn to make this easy mini paper Uzi gun for gaming with your friends! Supplies: Scissors, Scotch tape (Note: DO NOT USE MASKING TAPE OR DUCT TAPE; IT WILL NOT TURN OUT WELL), lots of paper. 1. Take one piece of paper and roll it up from top to bottom to make a short tube. Tape it. 2. Take another sheet of paper and do the exact same thing that you did to the first one and tape it as well. 3. Take a sheet of paper and roll it up from side to side (long ways). Make the hole in the middle abo...

How To: The Simplest Way to Remove the Background from Photos on iOS, iPadOS, and Android

It's super easy to add filters, adjust levels, and crop images using the default photo editor on your smartphone, but there's rarely any built-in tool for removing the background in a photo. A third-party app can help isolate people and objects in your pictures, and we've found a free one that's easy to use, works with high-resolution images, and is available for Android, iOS, iPadOS, and the web.

How To: You're Searching Your Safari Tabs Wrong — Use This Hidden iPhone Trick to Find Them Faster

I am constantly hitting Apple's limit of 500 open tabs in Safari on my iPhone, so it's safe to say that I have way too many tabs to sort through. With that many tabs open in the browser, it can be impossible to track down the one needed at any given moment. If that sounds like you, stop browsing tab after tab to locate the right one because there are hidden tricks to searching those tabs that make it easy.

How To: The Easy Way to Upload Files Anonymously from Your iPhone So They Can't Be Traced Back to You

If you need to share something online but don't want your personal information attached to the file, use an anonymous file hosting site. By uploading files anonymously, you keep your IP address safe and won't need to create any kind of account that could provide further logging. You can do this in a web browser, but it's much easier to do using a shortcut on your iPhone.

How To: Use Mitaka to Perform In-Browser OSINT to Identify Malware, Sketchy Sites, Shady Emails & More

Web browser extensions are one of the simplest ways to get starting using open-source intelligence tools because they're cross-platform. So anyone using Chrome on Linux, macOS, and Windows can use them all the same. The same goes for Firefox. One desktop browser add-on, in particular, makes OSINT as easy as right-clicking to search for hashes, email addresses, and URLs.

How To: Change a Phone's Coordinates by Spoofing Wi-Fi Geolocation Hotspots

In many urban areas, GPS doesn't work well. Buildings reflect GPS signals on themselves to create a confusing mess for phones to sort out. As a result, most modern devices determine their location using a blend of techniques, including nearby Wi-Fi networks. By using SkyLift to create fake networks known to be in other areas, we can manipulate where a device thinks it is with an ESP8266 microcontroller.

How To: Use This Zoom Hack to Make Everyone Think You're Still in the Video Meeting When You're Not

It's OK to want an extended break when you're working or learning from home. Maybe you want to play a video game, spend more time with your family, hang out with your dog, or FaceTime with friends. But how can you do that when you're supposed to be in a Zoom video conference or class? Thanks to one Zoom feature on your iPhone, it may be easier than you think.

News: UK Wireless Giant Three Promos 5G for AR, VR, & Smartphones with Wild Sci-Fi Video That's Better Than Some Movies

The entire wireless industry is working overtime to convince the world that 5G, and the higher prices associated with the faster speeds it affords, will not only be worth it but will deliver never-before-seen wonders. But few companies have produced such a stunningly well-done sales job as Three, one of the leading wireless giants in the UK.

News: Apple Just Released iOS 13.4 Public Beta 1 for iPhone, Includes New Memoji Stickers & More Convenient Mail Tools

After the lackluster update that was iOS 13.3.1, we beta testers were in need of some excitement. Thankfully, Apple delivered the goods with iOS 13.4 developer beta 1, introducing fun new features like fresh Memoji stickers and a new Mail toolbar. Of course, that update was for developers only, so we public testers are thrilled that Apple just released the first public beta today.

How to Hack with Arduino: Building MacOS Payloads for Inserting a Wi-Fi Backdoor

Arduino is a language that's easy to learn and supported on many incredibly low-cost devices, two of which are the $2 Digispark and a $3 ESP8266-based board. We can program these devices in Arduino to hijack the Wi-Fi data connection of any unlocked macOS computer in seconds, and we can even have it send data from the target device to our low-cost evil access point.

How To: Identify Missing Windows Patches for Easier Exploitation

No operating system is stricken with as many vulnerabilities as Windows, and it's often a race to release the latest patches to fix things. From an attacker's point of view, knowing which patches are present on a Windows machine can make or break successful exploitation. Today, we will be covering three methods of patch enumeration, using Metasploit, WMIC, and Windows Exploit Suggester.

How To: Find Passwords in Exposed Log Files with Google Dorks

You may not have thought of dorks as powerful, but with the right dorks, you can hack devices just by Googling the password to log in. Because Google is fantastic at indexing everything connected to the internet, it's possible to find files that are exposed accidentally and contain critical information for anyone to see.

News: The Second iOS 13.2 Public Beta Is Out, Includes New Emoji, In-App Camera Settings & More

We public testers are in luck. Today, Apple released the second developer beta for iOS 13.2. As is the case with most beta releases, developers get theirs first, while public testers are left waiting. Will we get our update the same day, or will we need to wait? As it turns out, Apple decided to throw us a bone. The second public beta for iOS 13.2 is officially here.

How To: Scan Websites for Interesting Directories & Files with Gobuster

One of the first steps in attacking a web application is enumerating hidden directories and files. Doing so can often yield valuable information that makes it easier to execute a precise attack, leaving less room for errors and wasted time. There are many tools available to do this, but not all of them are created equally. Gobuster, a directory scanner written in Go, is definitely worth exploring.