Sites' Current Search Results

How To: Obtain a cartoon avatar of yourself for online sites

Want a cartoon avatar of yourself to load onto all of those websites you belong to? Well, in this video, see how to obtain a cartoon avatar of yourself to display on Twitter, FriendFeed, your blog, and your corporate logo (if you want to go that far). The process is fairly simple. The first step is to take a good picture of yourself with decent lighting (try to do this alone as it will help). The next step is to visit cartoonme.com and submit the photo to the site. Pay them via PayPal (3.50 E...

How To: Get a 'Select All' Button for Webpages in Safari on Your iPhone

It should be simple to select and copy all text on a webpage in Safari, but it won't work as it does in other apps. Usually, you can press-and-hold down anywhere on a page and choose "Select All" from the edit menu, but that functionality is disabled in Safari and WebKit-based browsers by default — including in the latest iOS 14 version. Luckily, there is a workaround to getting a "Select All" button back.

How To: Remove a Participant in a Zoom Video Call & Ban Them from Joining Again

As more and more people use the video conferencing service Zoom, the chances of trolling behavior and attacks only increase. But it's not just "Zoombombers" you need to worry about. A heated discussion between family, friends, or colleagues could turn sideways real quick, and sometimes the best course of action is to remove the participant from the group video meeting altogether.

How To: Use Your Saved Chrome Passwords to Log into Apps on Your Galaxy

If you use Google Chrome on your computer, you've undoubtedly saved a ton of passwords since the browser always prompts you to. But Samsung uses their own password service on their phones by default, so you'll have to change a setting if you want to use your Chrome passwords to log into apps and sites on your Galaxy.

How To: Enumerate MySQL Databases with Metasploit

It's been said time and time again: reconnaissance is perhaps the most critical phase of an attack. It's especially important when preparing an attack against a database since one wrong move can destroy every last bit of data, which usually isn't the desired outcome. Metasploit contains a variety of modules that can be used to enumerate MySQL databases, making it easy to gather valuable information.

How To: Find Passwords in Exposed Log Files with Google Dorks

You may not have thought of dorks as powerful, but with the right dorks, you can hack devices just by Googling the password to log in. Because Google is fantastic at indexing everything connected to the internet, it's possible to find files that are exposed accidentally and contain critical information for anyone to see.

How To: 10 Privacy Settings in iOS 13 That Everyone Should Double-Check

Apple has seemingly always made it a priority to show how much it cares about user security and privacy — enough that it has a page dedicated to it, proclaiming that "privacy is a fundamental human right." It's true that there are few issues more important than user privacy when it comes to technology, and Apple only makes things better in iOS 13.

How To: View the Battery Percentage Indicator on Your iPhone 11, 11 Pro, or 11 Pro Max

There are plenty of jokes out there about the battery indicator on iPhones. Some people complain about their iPhones dying randomly at 11%, while others see hours of use at the 1% mark. Despite its inconsistencies, that battery percentage is a useful tell for how desperate you need a charger. There's just one problem: the icon is hiding on your iPhone 11, 11 Pro, or 11 Pro Max.

How To: Create & Manage a Spark Team to Collaborate on Email

Last year, Readdle released a major update to their popular intelligent email client Spark, which brought a number of new features and improvements, including the ability for team members to collaborate on emails. You can draft new emails and privately discuss existing ones with your team, invite team members into email threads, and create and share links to specific emails.