Target Individual Search Results

News: Have an NFC-Enable Phone? This Hack Could Hijack It

Some of us use our smartphones for almost everything. Manufacturers know this, so they try to make their devices as convenient as possible to use, but sometimes that convenience comes with a cost to security. The very same technology that allows you to easily share music with friends and make purchases can also put you at risk. Photo by sam_churchill

How To: Sell baseball cards

Tired of grandpa's baseball card collection rotting away in your attic? Well, unlike his pop bottle collection, baseball cards could yield a decent amount of income for you, if you know how to sell them. There are different outlets available for selling an individual baseball card or card collection. Know how to sell the fruits of your hobby and avoid getting ripped off.

How To: Make roulade

Roulade is a pork loin that is rolled around or stuffed with a fruity nutty mixture. This dish is not difficult to make but will seem like it is. The mixture is rolled and tied off in the meat and then a simple and sweet basting sauce can be cooked up in minutes to make this dynamic meal.

How To: Tile a custom ceramic tile shower

Start by putting tile backer board tape on all the joints on the wall board and then put mortar over the backer board tape. Let the mortar dry and then you can begin the tile job. Install a ledger board at the base of the shower stall about one tile high. Draw some vertical and horizontal lines on the wall to help keep the tile going straight. Also use tile spacers to help keep the tile going straight. Mix up some thin set mortar. Put the thin set mortar on the wall. Apply it with the flat si...

How To: Make individual cheese souffles

Maria makes "easy and elegant Cheese Souffles" that are perfect for an appetizer. a main course, or a light main course. The recipe can be made in advance and kept in a refrigerator right up until cooking; and, takes very little time to prepare.

How To: Install the software for a CNC router

A CNC router machine is probably the most useful tool a hobbyist can own, but the price for a CNC machine on the market is way more than the average hobbyist is willing to spend. You can build your own CNC with very basic tools, little knowledge of machinery, mechanics, or electronics, but be warned, these machines are inherently dangerous, so wear the proper protection and use common sense. At the very least, read the instructions and precautions on every tool you use.

How To: Stop Photos from Automatically Creating iCloud Links When Sharing Images & Videos from Your iPhone

If you use iCloud Photos, Apple's iCloud link feature is meant to make sharing multiple photos and videos faster and easier, but it's not as great as you might think. Luckily, there's a way to stop your iPhone from creating them automatically, as long as you're running iOS 13 or later.

How To: Add Rich Web Link Previews to Your Reminders in iOS 13

With iOS 13, Apple included some major updates to the Reminders app for iPhone. Among them is the ability to add web links to individual reminders, including a rich preview of the link that can be minimized if necessary. So now you can add an Amazon link in a reminder to buy a present or a webpage for a recipe in your grocery list, to name just a few examples.

How To: Phish Social Media Sites with SocialFish

Phishing is the easiest way to get your password stolen, as it only takes one mistake to log in to the wrong website. A convincing phishing site is key to a successful attempt, and tools to create them have become intuitive and more sophisticated. SocialFish allows a hacker to create a persuasive phishing page for nearly any website, offering a web interface with an Android app for remote control.

How To: Target Bluetooth Devices with Bettercap

An incredible amount of devices use Bluetooth or Bluetooth Low Energy to communicate. These devices rarely have their radios switched off, and in some cases, are deliberately used as trackers for lost items. While Bluetooth devices support MAC address randomization, many manufacturers do not use it, allowing us to use tools like Bettercap to scan for and track Bluetooth devices.

How To: Use SQL Injection to Run OS Commands & Get a Shell

One of the ultimate goals in hacking is the ability to obtain shells in order to run system commands and own a target or network. SQL injection is typically only associated with databases and their data, but it can actually be used as a vector to gain a command shell. As a lesson, we'll be exploiting a simple SQL injection flaw to execute commands and ultimately get a reverse shell on the server.

How To: Bypass an iPhone's Lock Screen in iOS 12 to Access Contacts & Photos

Apple may pride itself on its commitment to user privacy and security, but it isn't invulnerable. We now know there is a bug in the latest version of iOS 12 and iOS 12.1 beta that allows those in the know to bypass your passcode and access contacts and photos. This applies to both Face ID and Touch ID-enabled iPhones. Not only do we know about the bug itself, we know exactly how to exploit it.

News: The 8 Best FaceTime Features in iOS 12 for iPhone

From its introduction and all the way through iOS 11, FaceTime has been restricted to one-on-one calls. Apple will be changing that in a future iOS 12 update with Group FaceTime, which adds support for up to 32 people total in group audio and video calls. But that's not all we'll be getting in iOS 12 — there are more features that FaceTime has or will be getting soon that you should know about.

How To: Manipulate User Credentials with a CSRF Attack

Web 2.0 technology has provided a convenient way to post videos online, keep up with old friends on social media, and even bank from the comfort of your web browser. But when applications are poorly designed or incorrectly configured, certain flaws can be exploited. One such flaw, known as CSRF, allows an attacker to use a legitimate user's session to execute unauthorized requests to the server.