Google is the biggest and best search engine on Earth, and if you are a webmaster and want your website to be a big success it would really behoove you to know as much about how it works as possible. The Google Webmasters series of videos and website were created to teach webm ...more
Dear Miss and Mrs. H, I love your blog! Its nice to get two completley different opinions on one subject. I have a couple questions for you both and then need some advice. Well I am a Housewife myself and have been married around 5 years. We don't have any children yet and h ...more
In this free video language lesson from Sunny Park of Mahalo, we learn how to say, pronounce and write the Korean words for "What time is it?" For details, and to get started using this handy Korean phrase yourself, watch this guide for Korean language learners.
Learn how to say "Can you drive me to the train station or airport or hotel?" in Polish.
Getting your hair cut can be incredibly frustrating. You struggle to describe what you want, and if the stylist gets it wrong, you're stuck with a haircut you hate. Follow these tips to make every day a good hair day. You Will Need *A hairstylist *A picture of your desired s ...more
It's a notoriously preconceived notion that a man has to ask the woman out. But why can it not work both ways? It does, and it's the best way to bag the man of your dreams, especially if he's the shy type. If you're tired of waiting for your prince to appear with a Manolo Blah ...more
On your trip to Poland, be sure to know you armed with the language skills to get around. In this instructional video, learn how to ask where a bus is headed, and how to pronounce it correctly in Polish. Ever wanted to learn Polish? Or are you planning a trip to Poland? Wonde ...more
Need money fast but don't want to take out a loan? Asking a friend or family member for money is a sensitive undertaking. If you take the necessary steps, you’ll get what you need and ensure them that their money will be repaid. You Will Need: • A list of friends • A calcul ...more
But it seems like all of the major social networks are determined to send you one anyway: Pinterest: Schemer: Quora: Twitter: Chime.in: To be fair, I actually like the Quora one, because it features interesting information that I wouldn't have thought of. The others just ...more
Sepp Blatter apologized to England and Mexico for the wrong calls, said goal line technology would be discussed in the future, but no instant replays. I think it's a fair compromise. I'm in the camp that thinks that instant replays would slow the game. Right now, watching a s ...more
Boy oh boy. This tutorial is actually thoughtful. Most impressive is that it has that rare thing: common sense. The only part of the video that makes me uncomfortable is the stat at the end that explains that 'women who wear lipstick are more likely to get a raise than those ...more
When someone you love asks for money it can be very hard to turn them down; especially since you are usually put on the spot. Check out this tutorial and discover ways that you can help your friend without having to spend a dime, and make things easier for everyone. You Will N ...more
a crew member will dress as a giant hot dog and drive to random places in a giant weiner car. while holding a hot dog and walking a weiner dog which is also dressed as a hot dog he will ask random people if they love weiners. the redundancy is hiarious!!! also the member dress ...more
THE Pentagon's top two officials have revealed that President Barack Obama had asked for preliminary military options to respond to the Syria conflict but the administration still believed diplomatic and economic pressure was the best way to protect Syrians from the Assad gove ...more
Despite the security concerns that have plagued Facebook for years, most people are sticking around and new members keep on joining. This has led Facebook to break records numbers with over 1.94 billion monthly active users, as of March 2017 — and around 1.28 billion daily act ...more
You've probably connected your Android device to dozens of Wi-Fi networks since you've had it, and your phone or tablet remembers each of them. Whether it's a hotspot at home, school, work, the gym, a coffee shop, a relative's apartment — or even from a friend's phone — each t ...more
A spare key is one of those things that never seems like a huge deal until you need it. If you've ever lost your keys, had them stolen, or locked yourself out of your house or car, you know how difficult and embarrassing it can be trying to get your door open. So, how would y ...more
If you want to play games that aren't in the iOS App Store, Apple makes it pretty tough for you. Usually, the only solution is to jailbreak your iPad or iPhone, but that's something most avoid because it will void the warranty and may cause potential bricking issues. In some ...more
Welcome back, my greenhorn hackers. When Wi-Fi was first developed in the late 1990s, Wired Equivalent Privacy was created to give wireless communications confidentiality. WEP, as it became known, proved terribly flawed and easily cracked. You can read more about that in my b ...more
When I see the words "free trial," I know I'm probably going to have to whip out my credit card and enter in the number to "not get charged." Then I end up forgetting about the trial and want to kick myself in the ass when I see my statement at the end of the month. In order ...more
Most of us have conducted an investigatory science project without even knowing it, or at least without knowing that's what it was called. Most science experiments performed, from elementary to high school students and all the way up to professional scientists, are investigato ...more
While password cracking and WPS setup PIN attacks get a lot of attention, social engineering attacks are by far the fastest way of obtaining a Wi-Fi password. One of the most potent Wi-Fi social engineering attacks is Wifiphisher, a tool that blocks the internet until desperat ...more
Do you ever wonder how all these celebrities continue to have their private photos spread all over the internet? While celebrities' phones and computers are forever vulnerable to attacks, the common folk must also be wary. No matter how careful you think you were went you sent ...more
Unless you have unlimited cellular data, you probably connect your iPhone to every Wi-Fi network you come across. It could be a local coffee shop, public library, or just a friend's place. Wherever it is, you'll need to ask for the access point's password if it's a secured net ...more
Ask ten different people how they feel about boxed cake mixes, and you'll likely get ten different answers. Some baking purists will berate them and throw them in the same category as garlic presses and knife sets sold on infomercials. Many people will say that they prefer not ...more
Hello Hackers! Welcome to my 2nd Post: This is a tutorial explaining how to hack android phones with Kali. I can't see any tutorials explaining this Hack/Exploit, so, I made one. (Still ,you may already know about this) Step 1: Fire-Up Kali: Open a terminal, and make a Troja ...more
Why unlock your Samsung Galaxy S3 to use with a different SIM card? One possible reason is that you love your phone, but not your cellular provider because of the poor service or an unreliable connection. If you purchased a Samsung GS3 with AT&T, T-Mobile, etc. on a contract, ...more
I've never had a black eye, but I was in a car accident that turned my entire ear dark purple a few years ago. Believe me; it was enough to get more than a few funny looks. Walking around with bruises is never fun, and it's even worse when they're on your face or neck. A blac ...more
Caller ID is great to have, but there are certain situations where you don't want the person you're calling to have your number. People who sometimes use their personal phones for work may not want clients knowing where to reach them outside of work, and anytime you're dealing ...more
Welcome, my hacker novitiates! As part of my series on hacking Wi-Fi, I want to demonstrate another excellent piece of hacking software for cracking WPA2-PSK passwords. In my last post, we cracked WPA2 using aircrack-ng. In this tutorial, we'll use a piece of software develop ...more
One of the most popular things to do on Snapchat is to earn a Snapstreak. This occurs when you and one other friend have sent snaps (not chatted) to each other within 24 hours for at least three consecutive days. One you've passed the three-day mark, then you and your friend w ...more
These days, if you're having friends over, they'll probably ask to log into your Wi-Fi network before asking for a drink. But if you've forgotten your password, it can be quite hard to find, since most devices obscure the characters with asterisks. But it honestly doesn't tak ...more
There are plenty of jokes out there about the battery indicator on iPhones. Some people complain about their iPhones dying randomly at 11%, while others see hours of use at the 1% mark. Despite its inconsistencies, that battery percentage is a useful tell for how desperate you ...more
You saw our post on the 18 coolest new features of iOS 7, but now that you've had a chance to play around with your updated iPhone, it's time to lock it down. There are a surprising number of new privacy and security-related issues in iOS 7's default settings, from allowing A ...more
Step 1: Introduction: Hello! Hackers In this tutorial I will tell you how to hack windows 7 administrator password. However you already know (I think) Specifically, it is used in school, computer labs or other workplaces, where, administrator is locked with a password, while ...more
As respectful as you may be, it's hard to resist looking through someone's iPhone when given the chance. You're not trying to snoop around, but it's just too easy to open up apps and read embarrassing emails or find scandalous Instagram follows. It's like looking through a dig ...more
With just a few taps, an Android phone can be weaponized into a covert hacking device capable of running tools such as Nmap, Nikto, and Netcat — all without rooting the device. UserLAnd, created by UserLAnd Technologies, is a completely free Android app that makes installing ...more
It can be extremely frustrating when you've forgotten the pattern you use to lock your smartphone, and even more so if someone has managed to prank you by changing it. Luckily, there's an easy fix if you know the username and password for the Gmail account you used to set up t ...more
Apple's iOS 11 is finally here, and while they showed off several of the new features it brings to your iPhone, iPad, and iPod touch back at WWDC 2017, they've only just touched the surface of what iOS 11 has to offer. There are a lot of cool new (and sometimes secret) feature ...more
Depending on who you ask, internet connectivity should be a basic human right. With Google recently embarking on a project to provide internet capabilities to remote corners of the world using balloons and satellites while Facebook attempts to do the same with unmanned drones, ...more
With a root bounty of over $18,000 up for the taking, developers were highly motivated to get the AT&T and Verizon Wireless variants of the Samsung Galaxy S5 rooted. Legendary hacker George Hotz, aka Geohot, has won the race and can now step up to claim his prize. Hotz is not ...more
Apple's Wallet app lets you store boarding passes, concert tickets, gym memberships, vaccination cards, movie stubs, rewards cards, insurance info, student IDs, and more in one place on your iPhone, and you just double-click the Home or Side button to access them. Unfortunatel ...more
The very first text message was sent on December 3rd, 1992 by Neil Papworth, an engineer for Vodafone, and it simply said "Merry Christmas." He may have jumped the gun on the whole Christmas thing, but you trying coming up with the first text message in history! Today, there ...more
Rooting an Android device used to be a nightmarish labyrinth of .zip files and command prompts, confusing seasoned modding veterans and newbies alike. Thankfully, the process has gotten simpler over the years, with various "one-click" rooting tool kits surfacing and working fo ...more
Recently, iPhone users have been bragging that they can set Live Photos as their lock screen wallpaper. While this is a great way to spice up a boring lock screen, Android users shouldn't feel left out in the cold. The highly customizable and feature-rich OS has a few tricks u ...more
While hitting snooze won't help you much if you fall back asleep, it can help you wake up more gently. However, your iPhone's default nine-minute snooze may be too long or too short for your preferences. If you tend to fall back asleep quickly, you might be better with a two-m ...more
OR rather How to make the Backdoor Persistent: Hello, my Cold and Merciless Hackers, Welcome to my 5th Post, In this tutorial I am going to show you how to make the backdoor we created in my guide here a persistent one. I finally found out a way to do this, as I was/am very ...more
The Galaxy S8 and S8+ might not have made it into the hands of the public yet, but we sure have come across a lot of the stock apps from Samsung's latest flagship phones. First, there was the new launcher, then Hello Bixby, and now, the extremely elusive Record Screen feature ...more
There are definitely some great things about iOS 7, but like any good piece of software, it's got some things to kink out—and how wallpapers work seems to be one of the biggest issues, since it's so much different than in previous iOS versions. We've seen tons of questions po ...more
A flat soda tastes awful. It's almost as bad as drinking a room temperature milkshake. Of course, you can always opt to buy single-serving cans or 20 ounce bottles, but that's always going to be more expensive than 2-liters. The problem with 2-liter bottles of coke is that th ...more
If you're an iPhone user, iMessage is great for cutting down on SMS costs from your carrier, but it doesn't always work right away. If there are no available Wi-Fi networks around to use, iMessage will attempt to send it over your cellular data, but if you're also in a bad se ...more
In my first installment in this series on professional hacking tools, we downloaded and installed Metasploit, the exploitation framework. Now, we will begin to explore the Metasploit Framework and initiate a tried and true hack. Before we start hacking, let's familiarize ours ...more
There's a lot of conflicting information out there when it comes to the best habits for charging a smartphone's battery, so let's clear some of that up right off the bat. Lithium ion batteries (the type used in most modern electronics) start to lose their ability to hold a cha ...more
When I got my first smartphone, it didn't take long before my friends and I created a game that we liked to call "Paste-Send." You see, instead of having to use T9 to type out text messages, the touch-based interface made copying and pasting incredibly easy. So that meant we c ...more
Most people don't ask for gift cards, but they're always a popular gift choice for notoriously hard-to-shop-for people—or the time-constrained gift-giver. While most gift cards are attached to certain stores, many folks will get a prepaid Visa or MasterCard card that allows th ...more
While Wi-Fi networks can be set up by smart IT people, that doesn't mean the users of the system are similarly tech-savvy. We'll demonstrate how an evil twin attack can steal Wi-Fi passwords by kicking a user off their trusted network while creating a nearly identical fake one ...more
Search engines index websites on the web so you can find them more efficiently, and the same is true for internet-connected devices. Shodan indexes devices like webcams, printers, and even industrial controls into one easy-to-search database, giving hackers access to vulnerabl ...more
Whenever your iPhone's ringer is on, you'll hear Apple's iconic "Connect Power" chime every time you connect it to a wired or wireless power source, which lets you know that charging has started. There's no way to disable the sound without turning on Silent mode, but there is ...more