Better sleep, smartphone news, and changes to your favorite forms of entertainment. There's been a lot going on over the last couple of weeks in the world of tech, and we thought we'd show you all of the need-to-know products, updates, and ideas that we think are most important.
What separates the work habits of the ultra-productive from us mere mortals struggling to check items off our never ending to-do lists? While the answer to that question is by no means simple, one undeniable factor in their success is a clearly defined, highly organized workflow.
Welcome back, my tenderfoot hackers! Not too long ago, I showed how to find various online devices using Shodan. As you remember, Shodan is a different type of search engine. Instead of indexing the content of websites, it pulls the banner of web servers on all types of online devices and then indexes the content of those banners.
Welcome back, my neophyte hackers! Many newbie hackers seem to be confused regarding the process or methodology to employ a successful hack. Most want to simply go straight to the exploit without doing the due diligence to make certain that the hack will work and you won't get caught.
Welcome back, my fledgling hackers! A short while ago, I did a tutorial on conducting passive OS fingerprinting with p0f. As you remember, p0f is different from other operating system fingerprinting tools as it does not send any packets to the target, instead it simply takes packets off the wire and examines them to determine the operating system that sent them.
For over 20 years, a tiny but mighty tool has been used by hackers for a wide range of activities. Although well known in hacking circles, Netcat is virtually unknown outside. It's so simple, powerful, and useful that many people within the IT community refer to it as the "Swiss Army knife of hacking tools." We'll look at the capabilities of Netcat and how the aspiring hacker can use it.
Welcome back, my rookie hackers! Many newbie hackers focus upon the technical aspects of hacking and fail to give enough attention to social engineering. In fact, I would say that technical hacks should ONLY be attempted if social engineering attacks fail. Why bother spending hours or days trying to hack a password if someone will simply give it to you?
You'd think the ability to block calls from certain numbers would be built in to most phones by now, but that's certainly not the case with the iPhone.
Welcome back, my rookie hackers! Several of you have written me asking about where they can find the latest hacks, exploits, and vulnerabilities. In response, I offer you this first in a series of tutorials on finding hacks, exploits, and vulnerabilities. First up: Microsoft Security Bulletins.
Welcome back, my hacker novitiates! Many of you have written me that you're having difficulty installing and running Metasploit on a variety of platforms. No matter if you're using Mac, Linux, or Windows, I strongly recommend you install BackTrack as your secondary OS, a virtaulization system, or on an external drive. This particular Linux distribution has many hacking and security tools integrated—including Metasploit.
YouTube is the third most popular website in the world, after Google and Facebook. Millions of subscriptions happen each day on YouTube, with over 800 million unique users visiting each month. In that timespan, roughly 4 billion hours of video are watched, with 72 hours of video uploaded every single minute.
Many social networks have become a part of our daily routine. Checking Facebook or sending out a Tweet are things millions of people do every single day. So, one would think that having a great app offering for Windows 8 would be a no-brainer. But, and this is a huge but, there are still no official Twitter or Facebook apps for Windows 8.
An internet connection has become a basic necessity in our modern lives. Wireless hotspots (commonly known as Wi-Fi) can be found everywhere!
There's nothing like buying an awesome new gadget, but it leaves you with one problem (besides an empty wallet)—what do you do with the ones you already have? There are plenty of ways to put your old gadgets to use, but if you'd rather get rid of them, you may as well get something out of it, right? Here are five places where you can recycle your electronics and replenish your cash stash.
Are you interested in beginning research of your family's history? I began this journey about 3 or 4 years ago and here is what I found. I've done almost ALL of my research online, and gotten farther, faster and more comprehensively than anyone else who has researched my family the old fashioned ways. This is the kind of thing that technology is made for. Here's how to use it.
This weekend, hackers broke into the servers of the popular shoe shopping site Zappos, giving them access to the personal information of 24 million Zappos customers. The user data taken included names, email addresses, billing and shipping addresses, phone numbers, the last four digits of credit card numbers, and encrypted passwords. However, full credit card data was not lifted, and passwords were cryptographically scrambled.
Okay, so you've decided to take the plunge, and participate in our Love. Earn program with a how-to article. But, for whatever reason, your article keeps getting rejected by WonderHowTo, and you're wondering, well, where's the love?
Learn how to choose the rabbit that's best for children. There’s probably not a kid out there who wouldn’t love a pet bunny, but rabbits and children can be a tough combination. To make the match a happy one, follow these steps.
Learn how to crash a wedding. If you have a free Saturday, we have a way for you to score free food, free cocktails, free dancing—and maybe even a hook-up.
Learn how to use a site: http://www.copyscape.com to check if people are stealing content from your website.
You can learn how to drive traffic to your website using links. The most important thing is to get people to your website. You can not spend hours and hours writing emails to people who steal your articles.
Here is a quick and easy tutorial on making miniature trees. Watch this instructional model making video to get started with the traditional method using Woodland Scenics and learn some alternatives using found materials like wire and scouring pads. They look great and are perfect for dioramas, doll houses, and model railroads.
Peerguardian2: Block the RIAA and Malicious IPs +Mac/Win. Doesn't block http traffic though, and it's not very accurate and won't make a difference.
UUNICEF Youth Adviser Joel takes lessons in Patois (the Jamaican language) from a young man. The language lesson includes how to say "hello, how are you?" "that girl is good-looking" and "see you later".
Learn how to watch flash videos from websites other than YouTube on your iPhone. Using a free download from videohamster.com
n this video you will see how to use content versioning for your site with Drupal.
Set to some background music this video shows you how to make a stork. Instructions also available in Spanish on website.
This video will show you how to use the Windows command prompt and ip-address.com to find the location of any website. This is a PC based trick and will not work with a MAC OS.
In this video series, watch as freelance designer Emily DeCola teaches all about marionettes. Learn how to work the strings, the different types of marionettes, how to string a marionette, how to build and operate a marionette, and how to control the puppet's face.
Learn how to care for fruit trees from a professional landscape designer. Our expert will educate on what tools you need and how to select and plant your new fruit tree. Learn valuable how-to tips for your fruit tree. See how to care for the tree by activating the soil. With all the luscious fruit dangling from the tree it can be an invitation for deer to come have a snack. Our expert will show how to protect your tree from becoming a treat. Pruning your fruit trees for maximum flowering and ...
Our expert, a professional landscape designer, will walk you through what you need to know to make the yard you want. One of the most important steps is to develop a plan. She will cover making a plan and how to pick the right plants for your yard. Our expert gives you tips on how to design a beautiful landscape that's right for your yard space and your climate. Learn how to design flower beds, how to accent your landscape with art and stones, and what materials you'll need to get started. Wa...
In this series of video clips you’ll learn tips and techniques for making your own rock and stone jewelry. Expert Candace Copeland demonstrates the process of making a necklace step-by-step, offering advice on choosing the beads, stones, gems and other supplies like tools and wire you’ll need to get started. She also offers examples of rock jewelry that makes a great gift for a man or woman. With these easy instructions and a little inspiration you’re well on your way to becoming a jewelry de...
Rum is no ordinary liquor. If you have a yearning for some rum, you need to know the basics of rum culture, like what rum is (and isn't), what kind of rums are available, and how is rum made. Once you know this information, you'll be a rum master. Rum is available in a wide variety of weights, ages, and blends. If you aspire to become a connoisseur of fine rums, start with the basics.
In this how to video, you will learn how to style documents with the Google Docs CSS editor. First, create a new document in Google Docs. First, click on the drop down menu for style. Type in a title in the document. Select heading 2 in the menu and type in the section title. Next, take off the style and type in the body for the content. Select some of the body text and click the hyperlink button. Type in the address and click okay. Now you can click this text to go to a website. Go to file a...
First of all you have to open the 'notepad'. Now you have to type in "<html>" in first line. Write "<head> in second line. Write "<title>this website contains text wrapped around images</title>". In the fourth line you have to type '<body bgcolor="#999999">'. This shall add a light orange color. Now find out the name of the image. Here the name of the file is 'image.png'. Then in the next line you have to type in "<img src="image.png">this text should hopefully wrap around the outside of the ...
How to find out information / details about your computer? To find out the information about your computer, you need to download software from the website PC World. The following are the steps to download the software:
This tutorial is in response to mail to Facebook. Scott Wilde leads you through the process. You can start by creating a brand new profile page. In this case, Mr. Wilde created a profile page for his dog Java Wilde so he could have a fresh new page without having to alter his initial profile page. Fan pages are different than your base profile. Your base profile is not indexed, it is not public, it is private and limited to 5000 friends. A fan page is unlimited up to millions of fans and it c...