Social Abilities Search Results

How To: Phish Social Media Sites with SocialFish

Phishing is the easiest way to get your password stolen, as it only takes one mistake to log in to the wrong website. A convincing phishing site is key to a successful attempt, and tools to create them have become intuitive and more sophisticated. SocialFish allows a hacker to create a persuasive phishing page for nearly any website, offering a web interface with an Android app for remote control.

How to Hack Wi-Fi: Capturing WPA Passwords by Targeting Users with a Fluxion Attack

With tools such as Reaver becoming less viable options for pen-testers as ISPs replace vulnerable routers, there become fewer certainties about which tools will work against a particular target. If you don't have time to crack the WPA password or it's unusually strong, it can be hard to figure out your next step. Luckily, nearly all systems have one common vulnerability you can count on — users!

How To: Get the Poison Ivy Uma Thurman inspired makeup look

Poison Ivy is a villainess in the Batman comic books, a seductive femme fatale with poisonous blood and the ability to control plants. She makes excellent inspiration for a Halloween costume. Make you sexier and more beautiful. Hair: Poison Ivy is portrayed as a beautiful redhead, contrasting with the green of her outfit. Buy a red wig or use hair dye to dye your hair red. Body: Purchase a cheap green leotard, bodysuit, or swimsuit, along with 30 or so fake ivy leaves. Using a needle and thre...

How To: Improve your child's vocal resonance

This voice tutorial shows you how to start your baby with early childhood voice lessons. Early childhood voice exercises are a great way to nurture your child's musical ability. This how to video gives you tips so you can teach your baby to sing along with you.

How To: Block unwanted text messages on your Apple iPhone

If you're among the throng of Apple iPhone users to refuse to pay $5 for a monthly SMS allowance, then each text message you receive, whether you like it or not, will run you $0.20. In this how-to, Gary Rosenzweig shows you how to prevent unwanted text messages by turning off the ability for someone to send you a text message via email. Learn also how to request that text messaging be turned off completely in this video.

How To: Play the cello with proper bow control

In this tutorial you will learn a deceptively simple exercise that will give you more control over your bow arm. The bow is where we create most of our expressivity so more control means more ability to shape the sound of what you play. Watch this how to video and you will be able to learn proper cello bow control.

How To: Defeat the tough gnoma entite in Final Fantasy XII

Like the previous Final Fantasy games, the latest installment Final Fantasy XII on the Playstation 2 has hidden bosses to test the mettle of hardcore RPG gamers. The Gnoma Entite is a hidden boss you can find in the Midfault area of the Damasca Wasteland following a sandstorm. Take a look at this instructional video that shows you how to take on this boss even with characters with weak equipment and abilities.

How To: Perform David Blaine's card magic trick

Learn how to perform David Blaine's card trick in this instructional video by a fellow magician who figured out this magic trick and breaks it down step by step. In this trick, a chosen card seems to switch places with the one on the table. All it takes is a duplicate card, and the ability to perform a double lift. Watch this video magic tutorial and learn how to perfrom David Blaine's card change trick.

How To: Use 3D lights in CINEMA 4D if you know After Effects

If you know how to use After Effects, you're probably very familiar with the ability to add 3D lights to a scene, and allow them to interact with 3D layers. In 3D applications like CINEMA 4D, lights are an essential part of your project, but how do you make them look at a specific "point of interest" or object? This tutorial shows you how.

How To: Adjust color in iMovie '08

iMovie allows the average computer user the ability to quickly make movies out of your digital video footage or home movies. This is not the most professional way to color correct your footage, but it should be sufficient for the average Mac user. Follow along and see how to adjust color using iMovie.

How To: Create slideshows using iDVD '08

iDVD '08 has the ability to create DVD slideshows of your photos. This is a great way to show family and friends your vacation photos or other events, without using the web. Just create your slideshow DVD and pop it in the DVD player. See how to make one in this tutorial.

How To: Stop Third-Party Apps You Never Authorized or No Longer Use from Accessing Your Instagram Account

Unless you're completely new to Instagram, it's likely that you've linked your account with a third-party service at some point and forgotten about it. Those services still have access to data such as your media and profile information, so it's important that you not only know how to find these "authorized" apps, but that you know how to revoke their permissions.

How To: 60 iOS Features Apple Stole from Jailbreakers

Overall, iOS is more impressive than ever with its stability enhancements, security tools, suite of apps and services, and intuitive user interface. With each passing update, things just get better and better for iPhone users. But don't think for a second that this is all because of Apple's genius — many of these features were at least partly inspired by tweaks made by the jailbreak community.

How To: Secure Your Instagram Account by Adding 2-Factor Authentication & Managing Privacy Settings

The photo-centric Instagram app is a great way to share "evergreen" pictures and videos when compared to Snapchat and Facebook's new Messenger Day feature. But like all social media, keeping the account secure is an essential aspect, as it restricts unwanted viewers from seeing your content and can prevent unauthorized users from accessing your account. Instagram has several methods for locking down the account including a new two-factor authentication (2FA) mechanism.