User Centric Search Results

How To: Send different messages through Twitter

Twitter is a powerful social networking website which can be used to update you friends on what you are doing. To send different messages through twitter you will need a twitter account. Twitter account can be registered for free. Log in to your twitter account and go to your home page. There is a text box provided at the top with the text 'What are you doing?'. Enter the message you want in the text box provided. Click update and this message will be shown to all the people that are followin...

How To: Uninstall a program from your Android phone

In this video tutorial, viewers learn how to uninstall the program on an Android phone. Begin by clicking on Settings and select Applications. Click on Manage applications. Now users will be revealed a list of all the applications that are installed on the phone. Simply scroll through the applications and select the unwanted application(s). Users will now see the information about the application, click on Uninstall. Now click OK and click OK again when the application is finished uninstallin...

How To: Do hanging knee ups for your stomach

In this video tutorial, viewers learn how to perform hanging knee ups. This exercise targets the abdominal muscles. Users will need to use a smith rack for this exercise. Begin by hanging on the top of the smith rack. Users should have a bar behind the rack that will support the back area. While hanging, users will point the chin down and bring the knees up. Then raise the chin up and bring knees down. Continue performing this movement in a series of sets and repetitions. This video will bene...

How To: Change your computer password through the cmd prompt

This video teaches you how to change your computer's account password using the DOS command prompt. The first step is to get to the command prompt, you can do this simply by clicking run in the start menu and typing "cmd." You next type "net user" which will show you all of the user accounts on the computer. Choose the one you would like to change the password for and type "net user (account name)." It will then ask you for a new password, you may type anything you like here keeping in mind t...

User Testimonials: Why People Are Switching from iPhone to Pixel

Reading through various internet forums, it certainly sounds like the Google Pixel and Pixel XL are attracting more iPhone users than any of Google's previous Nexus devices. The sales figures seem to back that up, too, as the Pixel is outpacing last year's Nexus 6P, and pre-order demand has exceeded Google's expectations, causing delays in shipments. (We reached out to Google but they wouldn't give us any specifics on sales numbers or numbers of switchers.)

News: 5 Great Lock Screens That Put Your Android's Default to Shame

When it comes to customization, you just can't beat Android. Not only can you replace your home screen, switch your default apps, and apply icon packs, but you can even replace your entire lock screen by installing a simple app. Considering that the lock screen is the first interface you encounter when you pick up your phone, that last one might even be the biggest change you can make without root access.

How to Train Your Python: Part 4, Basic User Input

In the last iteration of how to train your python, we covered basic string manipulation and how we can use it to better evaluate user input. So, today we'll be covering how to take user input. User input is very important to scripting. How can we do what the user says if we can't tell what the user wants? There are multiple ways to take input, we can give the user a prompt and take input from them directly, or we could use flags/switches, and take their input before the script is even execute...

Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 6 (Gaining Access to Tokens)

Welcome back, my tenderfoot hackers! Hacker newbies have an inordinate fixation on password cracking. They believe that cracking the password is the only way to gain access to the target account and its privileges. If what we really want is access to a system or other resources, sometimes we can get it without a password. Good examples of this are replay attacks and MitM attacks. Neither requires us to have passwords to have access to the user's resources.