Someone's Search Results

How To: How Cross-Site Scripting (XSS) Attacks Sneak into Unprotected Websites (Plus: How to Block Them)

XSS stands for cross-site scripting, which is a form of web-based exploitation that uses client-side vulnerabilities in a web page to execute malicious JavaScript codes. JavaScript is referred to as "cross-site" because it usually involves an external website containing the malicious code. That code is most commonly used to steal cookies with a website that the attacker created and hosted on another server. The cookies can then be used to escalate privileges and gain root access to someone's ...

“Man, there’s nothing to DO!”: 5 Underrated Inexpensive Summer Activities

The joys of summer are many! If you, like me, live in a place where the summer is short, you’re going to want to maximize your fun in the sun by doing as many awesome things as possible before the sun goes back to wherever the hell it hibernates during the cold and dark times. The most important ingredients for fun in the sun are friends and…well…the sun, so you can do almost anything with a group of exciting creative people, but here are my favorite el cheapo activities for summer.

How To: This Is the Quickest Way to Add a New Contact on Any Phone

The awkward silence when you're adding someone's name and number to your contacts is worse than usual since you're meeting a new person and this is part of their first impression of you. So don't get labeled as clumsy or slow before you even get a chance to network with your new contact — just whip out your phone and confidently showcase this trick instead.

Uncrackable: Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt and decrypt as you need. GPG is a great open-source version of Pretty Good Privacy (PGP), a similar application used for encryption, but licensing and patent problems led to the development of GPG in its wake.

Lockdown: The InfoSecurity Guide to Securing Your Computer, Part II

This is Part II in the Lockdown: The InfoSecurity Guide To Securing Your Computer series. Before beginning, check out Part I. This article will cover using alternate software to increase your security and will provide you with some information about websites and programs that test a computer's security. It will also guide you to software you can install or follow so you know what programs need to be updated on the computer. Lastly, I will talk about some features that should be disabled when ...

News: Google+ Pro Tips Weekly Round Up: Google+ Community Projects Take Off

This week seems to have gone by in a flash. Maybe it was the three day weekend, but I don't think it accounts for the flurry of activity I've been seeing on Google+. Updates, debates, and new initiatives are unfolding every day, and the best part is that most of them are coming from outside of Google. People love Google+ so much that they want to evangelize to others about it. What more could Google+ ask for?

Don't Get Doxed: 5 Steps to Protecting Your Private Information on the Web

If you follow the Anonymous, Occupy, and IT security scenes, you have no doubt heard about a dox release. What is it? How can it hurt you? And most importantly, how can you protect yourself from it? Some of these steps might seem common sense, while others will be an ah-ha! moment. Your private info is both your biggest weakness and your biggest weapon in your battle to remain anonymous. You must learn how to use it as both.

Scrabble Bingo Weekly Roundup: Creepy, Deadly Words for Halloween

Pumpkins, murderers, vampires, zombies, ghosts, witches, death… these are all the subjects of last week's Scrabble Bingo of the Days, which focused on words associated with Halloween and horror movies. Did you know there was actually a name for someone who suffocated another person? Did you know that Frankenstein, vampires, and ghosts can all be considered one thing? Did you know that there was actually a word for rotten dead flesh?

Google+ Pro Tips Round Up: Week 4

Last week, I demonstrated how to go a little deeper into your Google+ profiles, photos, and introduced cross-posting. This week, I'm highlighting a bunch of different unofficial resources that have sprung up that will help improve your Google+ experience, and give you the latest updates on Google+ Photos.

News: Naughty Prank Ideas

If one of your is really messy then you can try this prank on them. It actually happened with me and believe me it works!! If the person concerned just doesn’t clean up his or her mess and from table or bed and you really find it irritating since that is the situation with most of us when we live in school or college hostels or when we share a flat. So to teach a lesson stick a sign on the bed and the wardrobe, which would say that the wardrobe and the bed are meant for piling waste and when ...

How To: Wolf whistle

The wolf whistle is a commonly used way of getting someone's attention or showing appreciation for a particularly attractive specimen that's just caught your eye. We're going to show you all the tricks to help you master the wolf whistle. Wolf whistle.

How To: Smooth out a face in Photoshop

Learn to smooth someone's face out in Photoshop. Remove blemishes, freckles and more from a still image! This is a very common use for Photoshop but it's usually important in film and photography to make your subject look their best. Smooth out a face in Photoshop.

News: Living TV

Remove the real TV and replace it with one that looks exactly like the real one. The buttons have to be broken. Turn on something really embarrassing like porn or something (you can also video tape them doing something really embarrassing. Just say it is for the show) and turn it up really loud. Turn the TV off. Get glue and glue the plug to the outlet. Be watching them from another room or outside. Have someone’s parents or boss come over for dinner. And when they get into the living room tu...

News: "Don't Be A Quitter"

Take a pack of someone’s cigarettes, and carefully remove partial contents from a few of them. In one, pull out some of the tobacco with tweezers, insert a “Pop-It” (make sure it is closer to the end without the filter) and reinsert the tobacco with tweezers. I can’t guarantee this method won’t blow someone’s face off, so try it on a dummy first. In the second cigarette, grind up a little sun-dried dog turd, and sprinkle it in before replacing the tobacco. In a third, put in a little wad of a...

News: Mumblety Peg

Google Mumblety Peg and you'll realize this is a real game our grandfathers played in the schoolyard. The object of the game is to throw a knife at the ground by your foot. Whoever gets closes wins. Sticking the knife in your foot also wins. One variation is to throw the knife at the other person's foot. This would be the jack-ass version and of course, it wouldn't end until a knife was stuck in someone's foot.

News: Picnic wake up

Sneak into someone’s room while they are sleeping. Make sure they are really sleeping, like in a deep sleep. While they sleep pour honey all over them, put mustard on there face, molasses in their hair, etc. Just get them completely dirty and nasty. Just remember DON’T WAKE THEM YET! Take all their clothes and hide them and replace them with embarrassing clothing; like a costume or something. After you do that to wake him/her up have a bucket of ice (flavored optional) and poor it on them.

Next Page