Shorter Versions Search Results

How To: Uninstall Applications in Windows 8

Windows 8 and its new Windows Store have simplified the process for uninstalling and cleanly deleting applications from your computer. Removing applications in older versions of Windows required a few more steps: My Computer -> Control Panel -> Add or Remove Programs -> Find the Program -> Click Uninstall.

How To: Draw a Rock Monster

A great regular character in all kinds of fantasy and science fiction art. There is always a rock monster. I go over my version. I love the variations on this kind of creature. If you like how to draw fantasy videos, or art videos, or drawing videos. This is a good source. Watch how I draw it in the video below.

How To: Bind Your Printed PDF Books Fast, Easy, and Cheap

Today, books in PDF are quickly accessible on the Internet, whether free or paid. You can easily read them on your computer or mobile device, but some still enjoy a printed version they can hold in their hands. Printing PDF volumes is a quick and easy task, but the only problem is binding them into a sturdy book, especially when they're pretty thick.

News: This DIY Mini Tesla Coil Packs 380,000 Volts of Lightning

At one point in time, Tesla coils were actually used for things like wireless telegraphy and electrotherapy, but as technology advanced, they shifted to a slightly more enjoyable purpose—entertainment. What's even more entertaining than using a Tesla coil? Building your own. One of the best portable Tesla coils out there is this mini acrylic version by Daniel Eindhoven, aka TeslaCommander. It's made almost entirely of acrylic plastic, minus the steel sphere, and copper wire and tubing. When t...

News: Crack a Master Lock Mathematically, Without a Shim

Apparently it is possible to reduce 64,000 possible Master Lock padlock combinations down to just 100. The entire process is clearly illustrated in the below how-to from Mark Edward Campos. For an enlarged version, click here. Looking for something a little more interactive? We have loads of lock-picking tutorial videos. Here's one that demonstrates the same method (math as opposed to shim) outlined in the above illustration.

How To: Use the new features in Microsoft PowerPoint: Mac 2008

If you've used PowerPoint in the past, you're probably used to version available on Windows, but you can do even more in PowerPoint 2008 for Mac. There are tons of new features that slideshow builders will love, but sometimes you can never know about them unless someone tells you about them. The Microsoft Office for Mac team shows you all the great features in this how-to video.

How To: Hack UnrealIRCd Using Python Socket Programming

UnrealIRCd is an open-source IRC server that has been around since 1999 and is perhaps the most widely used one today. Version 3.2.8.1 was vulnerable to remote code execution due to a backdoor in the software. Today, we will be exploiting the vulnerability with Metasploit, examining the underlying code to understand it, and creating our own version of the exploit in Python.

How To: Identify Web Application Firewalls with Wafw00f & Nmap

Web application firewalls are one of the strongest defenses a web app has, but they can be vulnerable if the firewall version used is known to an attacker. Understanding which firewall a target is using can be the first step to a hacker discovering how to get past it — and what defenses are in place on a target. And the tools Wafw00f and Nmap make fingerprinting firewalls easy.

News: Always-Updated List of Carriers That Support RCS Universal Profile

In November 2016, the RCS Universal Profile (Rich Communications Services) was introduced. The technology takes text messaging to the 21st century, emulating many of the features found in IM apps like WhatsApp and iMessage, but working through your phone number like regular SMS or MMS. The only thing is, your carrier needs to support RCS-UP to use the feature. Thankfully, the list is growing.

How To: Use Google Search Operators to Find Elusive Information

Google is an incredibly useful database of indexed websites, but querying Google doesn't search for what you type literally. The algorithms behind Google's searches can lead to a lot of irrelevant results. Still, with the right operators, we can be more exact while searching for information that's time-sensitive or difficult to find.

How To: Enable Dark Mode in Google Keep

Google Keep now has a dark mode. If your device is running Android 10, it kicks in automatically when you turn on the system-wide dark theme. If your device is not running Android 10, you will have to manually switch on dark mode for each app, including Keep. The benefits of dark mode include increased battery life, reduced eye strain, and improved readability.

How To: Top 10 Browser Extensions for Hackers & OSINT Researchers

While modern browsers are robust and provide a lot of functionality, they can be unlocked to do some pretty spectacular things with browser extensions. For hackers and OSINT researchers, these tools can be used to defeat online tracking, log in to SSH devices, and search the internet for clues during an investigation. These are a list of my top ten favorite browser extensions for hackers — and how to use them.

How To: Disable Message Effects from Auto-Playing on Your iPhone

Message effects in iMessage lets you add a touch of flair to otherwise bland communications. With the feature, you can complement a birthday wish with a stream of balloons, send a congratulatory text along with a shower of confetti, or make the chat bubble slam itself in the thread. If you're on the receiving end, however, they may be distracting and even jarring.