Typical Types Search Results

How To: The Secret to Typing in All Caps on Apple Watch

There's no default keyboard on the Apple Watch, but watchOS has another way to let you type text out for emails, messages, music searches, and more on the small display, and that's Scribble. With it, you simply draw letters and other characters on the screen with your finger, then your watch converts that into plain text. However, it's not perfect, and getting the nuances of regular typing can be tough.

How To: Disable the iMessage Typing Bubble Indicator So Others Don't Know You're Currently Active in the Chat

Apple's iMessage is one of the main reasons to use an iPhone, and there's a lot you can do in chats without being overly complicated. But there's one issue that continues to drive people nuts, and that's the blue typing bubble indicator with the moving ellipsis (•••). Can you stop it? Not officially, but there are workarounds.

How To: The Fastest Way to Share Your Location via Messages on Your iPhone

Apple makes it simple to share your location with your family and friends using tools built into the "info" page for each conversation thread in Messages. With those tools, you can send your current location or share trackable real-time coordinates. But iOS always has a few hidden tricks to make things easier than they seem, and that's precisely the case if all you need to do is share your current location.

How To: Beat LFI Restrictions with Advanced Techniques

One of the most common web application vulnerabilities is LFI, which allows unauthorized access to sensitive files on the server. Such a common weakness is often safeguarded against, and low-hanging fruit can be defended quite easily. But there are always creative ways to get around these defenses, and we'll be looking at two methods to beat the system and successfully pull off LFI.

How To: Mark Episodes As Played in Apple Podcasts to Remove Them from Your Up Next Queue

A typical hours-long podcast can cover a broad range of topics, and it's not uncommon to stop listening halfway through an episode or to skip through the parts you don't want to hear. Unfortunately, in the Apple Podcasts app, unfinished episodes remain within the app's My Episodes list and will play again automatically once you've finished a previous episode.

How To: Perform a Pass-the-Hash Attack & Get System Access on Windows

Passwords on Windows are stored as hashes, and sometimes they can be tough to crack. In certain situations, though, we can get around that by using the hash as is, with no need to know the plaintext password. It's especially interesting if we can manage to get the hash of an administrative user since we can then authenticate with higher privileges by performing an attack known as pass the hash.

How To: Activate Siri on Your iPhone XS, XS Max, or XR

This year marks the first for Apple to exclude the Home button from any new iPhones. If you're going from a Home-button iPhone to a new XS, XS Max, or XR, you might be a bit stumped when trying to perform basic tasks, such as activating Siri. While you can't hold down the Home button any longer, there's a new method that's just as quick.

How To: Get the New iPad Pro Wallpapers on Any iPhone

The current iPhone lineup inarguably features Apple's best displays to date, but the stock wallpapers don't really do the screens justice. There are plenty of third-party wallpapers you can use, as well as ones you create yourself. However, if you want that typical Apple feeling, you're better off sticking with Apple wallpapers, and the iPad Pro has some beautiful ones that look awesome on an iPhone.

Exploit Development: How to Read & Write to a Program's Memory Using a Format String Vulnerability

Format strings are a handy way for programmers to whip up a string from several variables. They are designed to save the programmer time and allow their code to look much cleaner. Unbeknownst to some programmers, format strings can also be used by an attacker to compromise their entire program. In this guide, we are going to look at just how we can use a format string to exploit a running program.

How To: Use Portrait Lighting Mode on the iPhone X & iPhone 8 Plus

Apple introduced Portrait Mode with the iPhone 7 Plus, a feature which utilized the iPhone's dual cameras to create a shallow depth of field around a subject. This effect replicates the look of DSLR cameras, making your photos look more professional. Apple, of course, carries Portrait Mode to the iPhone X and iPhone 8 Plus in iOS 11, however, with it comes a twist — Portrait Lighting.

Snapseed 101: Use the 'Healing' Tool to Remove Unwanted Elements from a Photo

Snapseed is an app that you should definitely be using not only if you're really serious about photography, but also if you want to ensure that your online work sets the standard for social media. It's a great companion app to Instagram and VSCO, and it will save your day many times over when you find yourself on your phone, on-the-go, needing to edit an image beyond the typical everyday filters.

How To: Seize Control of a Router with RouterSploit

A router is the core of anyone's internet experience, but most people don't spend much time setting up this critical piece of hardware. Old firmware, default passwords, and other configuration issues continue to haunt many organizations. Exploiting the poor, neglected computer inside these routers has become so popular and easy that automated tools have been created to make the process a breeze.