Ultimate List Search Results

How To: Create a new contact on your BlackBerry phone

Learn how to add a new contact to the contact list in BlackBerry phone. This clip will show you how it's done. Whether you're the proud owner of a BlackBerry smartphone or are merely considering picking one up, you're sure to be well served by this video guide. For detailed information, including step-by-step instructions, take a look.

How To: Use the "word choice window" when texting with Swype

Sometimes there is more than one option for a particular finger Swype. When this happens, Swype will give you a list to choose from so that you can pick whichever word you were hoping to use. Swype is the fastest way to send texts and e-mails available and with a bit of practice you will have it mastered. Just think of Swype as the T9 of 2010 and you will catch on fast.

How To: Make a buttermilk substitute

Buttermilk is a great thing to have around in your kitchen. Unfortunately, most of us don't have buttermilk on our regular grocery list, so those buttermilk pancakes will have to wait for another day. Think again! You can easily make tasty buttermilk alternatives with common refridgerator items. This video will show three easy ways to make a buttermilk substitute.

How To: Create a WonderHowTo Widget

This simple tutorial takes you through the process of creating a widget from any list of videos from http://www.WonderHowTo.com. These customizable widgets can be created in various sizes and colors and then added to your blog or website. Enjoy.

How To: Make an ultimate cheese ball

This how to video has the Ultimate Cheese Ball recipe. It's as beautiful as it is delicious. This recipe uses a few different types of cheeses, but it's as simple as any recipe. Serve this cheese ball with crackers and it will be a big hit at your next party. Its a perfect appetizer at holiday and Christmas parties or even as a Christmas dinner recipe. Watch and learn how it is prepared.

How To: Brute-Force SSH, FTP, VNC & More with BruteDum

Brute-forcing is an easy way of discovering weak login credentials and is often one of the first steps when a hacker finds network services running on a network they gain access to. For beginners and experienced hackers alike, it's useful to have access to the right tools to discover, classify, and then launch customized brute-force attacks against a target. BruteDum does it all from a single framework.

News: Always-Updated List of Android 10 Custom ROMs for Every Major Phone

One of the coolest things about Android is the massive development community behind it. These developers keep on cooking up new things even after official support has stopped for an older device. It breathes new life into somewhat forgotten devices, which is always great news. With Android 10 out, it's time to see what phones will get the custom ROM treatment.

How To: Block Haters & Prevent Stalkers from Seeing Your Facebook Profile Straight from the Mobile App

Whether it's an ex you can't stand, that annoyingly political friend of a friend, or good old fashioned trolls, the block feature on Facebook can be a great way to de-stress your feed. It will keep people from contacting you, and it will also prevent them from viewing your profile altogether. It's not just a tool for the full desktop website — in fact, the blocked list is easy to manage right from your phone.

How To: Build a Directory Brute Forcing Tool in Python

While attempting to hack a web app, there may come a point where the attacker may have to escape the default directory in order to access unauthorized files. This is known as a directory traversal attack. Much as the name implies, this attack involved traversing the servers directories. But in order to move to an unauthorized directory, we need to know where those directories are. Today we'll be building a tool to brute force these directory locations based on HTTP response codes. Before we g...