Unattended Search Results

How To: Make a light up bubble tube

Lava lamps are cool and retro, but they can be expensive and there is a risk of fire if you leave them unattended and they tip over accidentally. By using this tutorial by Shooting Eggs, you can make your own light up bubble tube using materials you might already have around the house, and it will be safer and a whole lot cheaper than the kind you'd buy. Make one of these babies, and your 1966 love den will be all ready to go.

How To: Switch the user ID and log off in Windows 7

Microsoft recommends a unique user ID and password for every user. In order to switch user ID or log off one need to click to the 'Start' menu as shown in the video. Press the move button at the shut down menu as shown. In the sub menu you can see the Change user and Log off. The window will typically shut down and restart on change of user ID or Log Off. In case you need to leave your PC unattended you can press 'Lock' from the same menu which will refrain anyone from changing your desktop s...

How To: Prune roses in January

Roses are beautiful flowers that hold many different representations, including love. Growing them can automatically add beauty to your home's garden and a scent that is very relaxing. Pruning them is important since leaving them unattended can cause problems. This tutorial will show you how to properly prune roses during a cold winter month, January. Good luck and enjoy!

How To: Slipstream Windows installations

Gigafide will show you how to slipstream Windows installations. You need to go to Vlite and download the program for Windows Vista. Install and run it. Select install at the main window. Use 7-zip to extract the ISO file. Next, go to that folder and run startcd.exe. You click next, agree to the terms and install it to the Vlite folder. Go to that folder, then Tools - x86 and select the file wimgapi.dll. Copy and paste that into the main Vlite folder. Go to Vlite, select your Windows Vista dis...

How To: Handle & mince garlic

This is a video showing how to handle and mince garlic. Make sure that the garlic is firm and not dried up. The skin is broken with a hammer to get the cloves loose. The skin is then peeled off of the garlic. The garlic is then cut into long pieces. Each slice is a 16th of an inch thick. Heat up olive oil and place the garlic into the oil. Let it cook for about a minute so that the flavor is drawn into the oil. Do not leave the garlic unattended. Garlic burns quickly. The garlic is removed an...

How To: Hack Wi-Fi Networks with Bettercap

There are many tools out there for Wi-Fi hacking, but few are as integrated and well-rounded as Bettercap. Thanks to an impressively simple interface that works even over SSH, it's easy to access many of the most powerful Wi-Fi attacks available from anywhere. To capture handshakes from both attended and unattended Wi-Fi networks, we'll use two of Bettercap's modules to help us search for weak Wi-Fi passwords.

How To: The Paranoid Mac Owner's Guide to Defeating Remote Snooping & Evil Maid Attacks

If you're worried about the security of your Mac, there are easy measures to prevent the most dangerous attacks. Named after the tactic of accessing an unattended computer in a hotel room, we can thwart "evil maid" attacks with Do Not Disturb and LuLu, free macOS tools by Objective-See that keep an eye on unattended computers and flag suspicious network connections that indicate a malware infection.

How To: Prank someone by changing their cell phone numbers

If you want to cause one of your friends some extreme discomfort and possibly ostracization, try doing this to them! This video will explain a simple prank that you can pull when one of your friends / enemies leaves their cell phone unattended in your presence. I won't give it away, but they are sure to feel the wrath of this one and will not be able to blame it on your concretely. Brilliant!

How To: Use the USB Rubber Ducky to Disable Antivirus Software & Install Ransomware

Ransomware is software that encrypts a victim's entire hard drive, blocking access to their files unless they pay a ransom to the attacker to get the decryption key. In this tutorial, you'll learn how easy it is to use the USB Rubber Ducky, which is disguised as an ordinary flash drive, to deploy ransomware on a victim's computer within seconds. With an attack that only takes a moment, you'll need to know how to defend yourself.

CES 2015: Monitor Your Dog's Activity All Day Long with FitBark, a Wearable Health Tracker

Animal lovers, especially dog owners, know that pets are a part of the family, but it's often incredibly frustrating to know if and when something just isn't right with our furry companions. If you're out and about most of the day, your dog will be so happy to see you when you come home that you may have no idea they were tired and listless all day long, which can be a sign of health problems for your pup. This is where FitBark comes in.

How To: Entertain Your Dog/Cat

Our dog has tons of energy and always wants to play. However, play time can be exhausting to the humans of the house. We found out a few months ago that the dog loves to play ‘chase the red dot.' Boredom leads to creativity, so we attached a laser pointer to her head with a bandana and small piece of tape. This kept her continuously occupied until we removed it after 20 minutes. I assume you could try this with a cat if you were daring enough – good luck with that. Caution: Laser pointers (ev...

How To: Safely Put Out a Grease Fire (And Prevent Them Altogether)

Hopefully you never have to deal with a grease fire, but if it happens, how you handle it is important. A grease fire isn't like a regular fire, and trying to put it out the same way can make it worse. Grease fires are caused by letting oil get too hot, so the best way to prevent them is to never leave your kitchen unattended. Oil smokes before it burns, so if you see your pan start to smoke, take it off the heat before it has a chance to catch fire. If you're outside grilling, you can add a ...

Food Tool Friday: Cut Your Cooking Time with a Pressure Cooker

Kitchen tools are a personal thing. One hard lesson for me to learn is that just because something is popular doesn't mean that it's right for me. Take the slow cooker, for instance. Many rave about it, but I never cottoned to the thing. However, the more research I do, the more I think the pressure cooker might be a game changer for my cooking style.

How To: The Good Samaritan's Guide to Returning Lost Smartphones

Sometimes, doing the right thing is way more difficult than it should be, like trying to return a lost smartphone. Despite having the best intentions, it's often hard to track down the rightful owner, especially if the device is armed with a passcode. On the other hand, there are plenty of people who see an unattended iPhone or Samsung Galaxy S3 as a chance for profit. In 2011 alone, the number of lost and stolen cell phones in America was worth over 30 billion dollars. That's right, billion....

How To: Steal macOS Files with the USB Rubber Ducky

If you need a tiny, flexible attack platform for raining down human-interface-device (HID) attacks on unattended computers, the USB Rubber Ducky is the most popular tool for the job. By loading the Ducky with custom firmware, you can design new attacks to be effective against even air-gapped computers without internet access. Today, you'll learn to write a payload to make "involuntary backups" through copying a targeted folder to the Ducky's USB mass storage.

Prev Page