User Friendly Website Search Results

How To: Protect your Wordpress blog from hacker attacks

Google is one of the most powerful forces on the Internet, and their technology can be the key to helping you find success in whatever your online endeavor might be, from web design to filmmaking. This video is a part of their Google Webmaster Series, offering help to webmasters the world over on how to best utilize Google in their work. This video will show you how to ensure that your Wordpress blog is safe from the hacker attacks that are so common for Wordpress users.

How To: Create links and change elements with AS3 in Flash CS3

Create links and change elements with AS3 in Flash CS3 Use buttons to change the appearance of a button, navigate to a different place in a time line and link to a website. Use action script 3.0. Publish settings. Need to apply actions. Create an event listener. Attach to a button that you want it to listen for something to happen. When it hears a mouse click, it will execute the function. Give the buttons instance names R_btn, G_btn, and B_btn.

How To: Use the iPad Photos App to view your pictures

The iPad is the reigning king of the tablet PC's (although it isn't one, strictly speaking) and allows users to do things that they never thought possible with a computer. One of it's coolest and most applicable Apps is the Photo app, which allow you to view high-fidelity photos in a fun and portable way. This video will show you how this App works and how to use it to impress your friends with your awesome photos.

How To: Make an ice text effect using Photoshop

Photoshop allows users to create all sorts of cool text effects, some of the most popular of which involve creating firey or icey text for titles. This video focuses on the latter, teaching you how to combine several effects in Photoshop to create really cool letters that look like blocks of ice. Give you titles some flair! But don't get flares anywhere near them...

How To: Stop a video from showing up in YouTube's search index

Ever wish there were a way to upload a video to YouTube without making it available to anyone with an Internet connection? While you might know about the option to make your uploaded clips private, limiting their viewing to 25 users of your choosing, you might not know about the newly introduced "Unlisted" status, which allows your videos to be viewed by only those people who know the video's direct URL. For more information, watch this free video guide from Tekzilla.

How To: Speed up Google Chrome with smart shortcuts

If you're a user of Google Chrome, you likely appreciate the browser for its speed. But were you aware the browser can be made faster still? This tutorial from Tekzilla demonstrates how to use smart shorcuts to speed up your web surfing. For specifics, and to get started using smart shortcuts yourself, watch this helpful how-to.

How To: Edit image color in Photoshop

This video will discuss how to implement color changes in Photoshop editing. This step by step approach will tutor the novice Photoshop user how to utilize the various tools and applications to achieve, colorization in photos, swap select and hue, colors and backgrounds of photos, describes layering using saturation and blend techniques. This video tutorial will describe and demonstrate the correct settings and tool usage for easy application of each editing and color manipulation.

How To: Operate a steadicam

A steadicam can mean the difference between a professional and steady wide shot of Victorian era London or a wobbly, user-generated content-esque portrayal of some old lamps and streets. Having control over how your camera moves is so vital to good film production.

How To: Block Those Annoying Cookie Consent Notices from Appearing on Websites in Safari

As a means to combat annoying and intrusive advertisements in Safari, Apple added native support for content blockers on the iPhone. Instead of being bombarded by notifications, banners, and pop-ups, content blockers prevent them from opening, which can also be said about those annoying cookie consent notices that many websites now have.

How To: Stop Websites from Asking to Use Your Location Every Single Time for Uninterrupted Browsing in Safari

If you surf the web on your iPhone, you no doubt run into this problem all the time: a website wants your location. It can happen when performing a location-based task, such as using a store locator, or whenever a web app just wants to deliver better ads or local recommendations. If you're tired of allowing or denying permission each time, there's an easy way to stop the annoying security pop-ups.

How To: Steal Usernames & Passwords Stored in Firefox on Windows 10 Using a USB Rubber Ducky

A lot of people still trust their web browsers to remember every online account password for them. If you're one of those users, you need to adopt a more secure way of managing passwords, because browser-stored passwords are hacker gold mines. With a USB Rubber Ducky and physical access to your computer, they can have a screenshot of all your credentials in their inbox in less than 60 seconds.

How To: Abuse Session Management with OWASP ZAP

It's always a good idea to know how an attack works at the very basic level. Manual techniques for exploitation often find holes that even the most sophisticated tool cannot. Sometimes, though, using one of these tools can make things so much easier, especially if one has a solid foundation of how it works. One such tool can help us perform a cross-site request forgery with minimal difficulty.

How To: Crack Shadow Hashes After Getting Root on a Linux System

After gaining access to a root account, the next order of business is using that power to do something more significant. If the user passwords on the system can be obtained and cracked, an attacker can use them to pivot to other machines if the login is the same across systems. There are two tried-and-true password cracking tools that can accomplish this: John the Ripper and Hashcat.

How To: Securely Sync Files Between Two Machines Using Syncthing

Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mitigate these risks, we'll use a secure, open source, and decentralized alternative.

How To: Perform Directory Traversal & Extract Sensitive Information

With all the web applications out on the internet today, and especially the ones built and configured by novices, it's easy to find vulnerabilities. Some are more perilous than others, but the consequences of even the slightest breach can be tremendous in the hands of a skilled hacker. Directory traversal is a relatively simple attack but can be used to expose sensitive information on a server.

News: Nova Launcher Receives Updated Google Now Page

One of the better additions in the stock Android launcher is the Google Now page. Residing to the left of the home screen, this page presents a host of information based on the user's interests, which Google bases on analyzed data. Recently, the Google Now page design received a makeover which Nova Launcher users can now enjoy.