Here is our entry for the Greek building contest. It is a model of the theater at Epidaurus. Here are our favorite images and descriptions out of those we used to build it: 1 2 3 4 And here are just a few screenshots. (I promised myself not to get too carried away with signs ...more
Cross-Site Request Forgery (CSRF, pronounce "sea-surf") is a common web exploit. However, for unknown reasons it's not used very often. It plays on a given website's trust in a web browser by executing another website's form action, for example, sending money to another person ...more
I've been a diehard Chrome user since its inception, and even more so since Android was released. The ability to sync bookmarks, passwords, and web history across all of my devices made the switch a no-brainer, but what really made me fall in love was the amount of extensions ...more
There's always an iPhone in our list of top phones for privacy and security, due in large part to advanced security measures like Face ID, consistent iOS updates, and easy ways to prevent unwanted access and excessive data sharing. However, some of those options actually do th ...more
Welcome back, my aspiring hackers! In this series on Linux for aspiring hackers, I'm trying to provide you with the basic skills needed to be capable in Linux as a hacker. One area that's critical that we haven't covered yet is building and managing an Apache web server. Apac ...more
Ever use an open hotspot on your Note 3, only to find out that it's severely restricted to what sites you can access? While getting online with free Wi-Fi is great for those who have a limited data plan, when that one site you absolutely need to visit is blocked, you're left f ...more
We are most certainly not machines. We all need some downtime every once in a while to set our sanity scales back in balance, which in turn, makes us more productive workers. This is a premise that several forward-thinking employers fully understand, but these types of compani ...more
Oh, LifeHacker, we love you. You've brought us so many handy HowTo's: Hack Wireless Internet, Bypass Blocked Websites, Convert a Laptop Into a Projector, Watch TV & Movies on the Web For Free, 10 Must-Know Google Privacy Settings, and more. And now, another great one: LifeHac ...more
Ads can detract from your mobile browsing experience, especially if they appear out of nowhere as popups or large annoying banners that take up almost all of your screen. If those weren't bad enough, some ads appear as extremely loud videos that can even disrupt others around ...more
If you want to play games that aren't in the iOS App Store, Apple makes it pretty tough for you. Usually, the only solution is to jailbreak your iPad or iPhone, but that's something most avoid because it will void the warranty and may cause potential bricking issues. In some ...more
Google recently rewrote their search algorithm to make "low-quality sites" disappear from your front page results, putting the emphasis on better, more relevant answers with original content and in-depth information. And now Google has added a new feature to their search syste ...more
Prank Calls, Masked NumbersWho is calling your phone or your child's? Pranksters use a lot of tricks to make sure they can get on your nerves. Being able to trace prank calls is important because you're not going to learn much from your Caller ID, since most prank callers use ...more
There are so many hackers around these days, and they are becoming very smart. So smart that they have successfully taken down many government websites. The most recent attack was on the Department of Justice (DOJ). To read about the history of these hackers, check out Wikiped ...more
There are nearly 100,000 unique onion service addresses online with over two million people using Tor every single day. Join me as I explore a small fraction of what the Tor network has to offer. It's puzzling to imagine about 100,000 .onion websites in existence. Readers who ...more
When it comes to your security, you want the best of the best. Why settle for mediocre service with something as valuable as your protection? Malware continues to make its way onto the Play Store, leaving millions of devices vulnerable. You need an app that will shield your de ...more
With over a billion monthly active users, it seems that Facebook is nowhere close to being dethroned as the most popular social media service in the world (sorry, Ello). While their stats may be impressive, it doesn't mean that Facebook is as good as it can be. Complaints abo ...more
A few months ago, iOS 12.1 came out with a handful of useful new features, and iOS 12.2 goes even further. While some of iOS 12.2's new features for iPhone are much welcomed, there are some that we'd be better without. Apple's iOS 12.2 started beta testing on Jan. 4, 2019, an ...more
It's been a while when the major web browsers first introduced HTTP Strict Transport Security, which made it more difficult to carry Man In The Middle (MITM) attacks (except IE, as always, which will support HSTS since Windows 10, surprised?). SSLStrip and the HSTS Chronicles ...more
Giving up your Wi-Fi password can be giving up more control than you think. Because of the way Chromecast and other IoT devices communicate, anyone on the same Wi-Fi network as your device can often make it do whatever they want. With a script called "Cast All the Things," we ...more
Chrome apps and extensions are powerful tools for students: they can help optimize your web browsing experience by helping you take notes, check your grammar as you compose documents and emails, and even help you squeeze a little more juice out of your laptop's battery by free ...more
Most of us skip through documents like privacy policies and EULAs (end-user license agreements) because they're long and boring. But, as Congress just passed the SJR34 bill in early April, you're probably a little concerned about your personal data, so we summarized the privac ...more
Hackers rely on good data to be able to pull off an attack, and reconnaissance is the stage of the hack in which they must learn as much as they can to devise a plan of action. Technical details are a critical component of this picture, and with OSINT tools like Maltego, a sin ...more
Smartphones are more like computers than actual telephones. Unfortunately, thieves, hackers, and other bad actors know this and are always looking to make money off your personal data. Thankfully, your Galaxy S20, S20+, or S20 Ultra has tools to combat these threats — as long ...more
There's a lot of misinformation about VPN services, and it stems from the fact that not all of them are created equal. Some focus on privacy, others on security, and a few VPNs are seemingly even purpose-built for the polar opposite: data collection. We made this guide to help ...more
A few weeks ago, Facebook published a blog post called "Proposed Updates to our Governing Documents," which outlines a few changes in their policies and user voting system. These changes would essentially take away users' right to vote on future changes to Facebook's data use ...more
Analysis of photographs and social connections can be a huge component of social engineering. Understanding who a person is, as well as who they know, can establish links within a company. This information could be used by hackers to execute elaborate social engineering attack ...more
Conducting phishing campaigns and hosting Metasploit sessions from a trusted VPS is important to any professional security researcher, pentester, or white hat hacker. However, the options are quite limited since most providers have zero-tolerance policies for any kind of hacki ...more
It may sound irrational, but I bet a lot of you actually avoid doing any work at work—but not on purpose. You might be simply struggling with motivation, or you might just be overdosing on the caffeine. Whatever the issue, getting focused takes lots of time and effort. But we ...more
Many FarmVille farmers want money fast, or experience fast, or want to level up, or want to speed things up— make and earn things faster. No matter how long they play, they're not getting what they want, and that is to outshine everybody else. But you can't reach the top by si ...more
In this video tutorial, Chris Pels will show how to configure an ASP.NET web site to use a specific version of ASP.NET/.NET Framework. First see how to identify what version of the .NET Framework a web site is associated with by viewing the script map in Internet Information S ...more
In this video tutorial, Chris Pels will show how to extend a standard ASP.NET server control and customize it for a specific purpose. Specialized controls provide an convenient way to implement standardized user interface elements for multiple web sites for individuals or team ...more
Learn to add and manage bookmarks of your favorite web sites to the Safari web browser using your Mac.
See how simple it is to create data-driven web sites using ASP.NET 2.0, Visual Web Developer 2005 Express Edition, and SQL Server 2005 Express Edition. Watch this video tutorial to learn how to create a database, add its data, and display that data on a web page.
In this video tutorial, Chris Pels will demonstrate how to create a custom user control in ASP.NET that can be used throughout a web site or across many web sites. Start out by learning the basics of creating a user control that will be used in multiple pages including validat ...more
In this ASP.Net video tutorial, Chris Pels will show how to use nested master pages to create individual master pages that represent different standard content layouts for a web site. First, see how several major commercial web sites use a standard set of content layouts. Next ...more
How to Use Your Mac as a Server: Turn your Mac Mini into a server! Yes, that's right, with a little know-how and a little spunk, you can turn an inexpensive Mac Mini computer into a server to provide services over you network. You won't even need the Mac OS X Server, just the ...more
Aperture's extensible architecture supports third-party export plug-ins that make it easy to export your photos directly to various web publishing sites, print service providers, and other software applications. You can find many of these plug-ins on www.apple.com.
In this Flash tutorial you will start from scratch and build a navigation bar and then convert one of the buttons to a drop down button. You will also learn how to link the buttons within the drop down to sites and pages out on the web.
If you are stuck using a computer in a place with safety filters, you can use this tutorial to bypass those controls and get to your YouTube account. So, whether you are in a school, library or your parents have parental controls activated, just follow along and you will be ab ...more
Why T-Shirts T-shirts are a great way for people to express themselves, and like other art forms, unique t-shirt designs are becoming more and more popular. Websites that specialize in just t-shirts are popping up all over the internet with tons of opportunities for designers ...more
Right out of the box, iPhone is incredibly easy to use. If you want to get the most out of every feature, you’ve come to the right place. This video tutorial straight from Apple will teach you how to browse the web with Safari on the Apple iPhone 3G. The iPhone redefines what ...more
In this episode of Web Design TV Paul Wyatt shows you how to create a horizontal drop down menu in Dreamweaver CS3 using an Ajax widget. Drop down menus are a huge part of web design and website development, so if you use Dreamweaver to develop your sites, get familiar with Sp ...more
How to Use Your Mac as a Server: Turn your Mac Mini into a server! Yes, that's right, with a little know-how and a little spunk, you can turn an inexpensive Mac Mini computer into a server to provide services over you network. You won't even need the Mac OS X Server, just the ...more
Using Flash CS4 to make websites is a great way to make them dynamic and interesting, it can also be a daunting challenge to both new and experienced web designers. This quick video demonstrates how to create a cursive font with mask typography that resembles real cursive hand ...more
Don’t you just hate it when you try to go on a website while you’re at work—and find out your boss has blocked it? Here’s how to thwart The Man. With these tips, you'll be able to check your facebook or myspace at work (or whatever sites your employer may be blocked). All you ...more
Different ways of using a proxy bypass to access blocks sites is shown with ease in this video. Many places explained to be blocked with internet security such as libraries and schools. Using a search engine such as Google you need to search for a proxy site. After a proxy sit ...more
Looking to buy a home? Why leave your current digs? Using technology has made it easier than ever before to find the home of your dreams. Learn how to buy a home online with help from this how-to video. What you will need: • A computer with internet access • Friends and fam ...more
Big business is on the web these days and you don't have to build a shopping website or blog to get involved. In affiliate marketing, online merchants pay independent parties – called publishers, to promote their products on the publishers’ web sites. The basic steps for becom ...more
Nowadays many schools and colleges have blocked the social community sites from accessing them through school computers. The video shows how one can access to these sites using a command prompt. Follow these steps and access the blocked sites: 1. Go to the start menu and ope ...more
Watch this video tutorial to learn how to book the best hotel room for your money. You've spent all year saving up for your dream vacation. The last thing you want is to end up in a hotel room that ruins the whole trip. You Will Need * Time to research * A computer with inte ...more
So you really want to join the circus? Okay, here's what you need to do. You Will Need * Determination * Discipline * A skill valued by a circus * Training at a circus school (optional) * A headshot and full body shot (optional) * An audition tape (optional) Step 1: Be realis ...more
Video chatting over the Internet is an inexpensive way to keep in touch with your family and friends. This video will show you how to set up web video chat. Step 1. Buying a webcam If you don’t already have a webcam, you’ll need to get one. A webcam for video chatting can be ...more
Weird gifts from friends and family aren't the only things you can score on your birthday. With a little advance planning, you can get lots of freebies. You Will Need * Time to sign up for various birthday clubs * Proof of your birth date Step 1 Many chain restaurants offer a ...more
Circumvent your school's Internet filter with a proxy. This hacker's how-to will show you how it's done. For all of the details, and to get started learning how to acess MySpace and other blocked sites like YouTube and Facebook when on a computer at your own school, take a look.
Circumvent your school's Internet filter with a proxy. This hacker's how-to will show you how it's done. For all of the details, and to get started learning how to acess YouTube and other blocked sites like Facebook when on a computer at your own school, take a look.
Command prompt and other commands can save you lots of time on your computer. Use these shortcuts to bypass longer keystrokes and access blocked sites. There are many things you can do with cmd prompts and this tutorial will tell you about all of them. Learn step by step how t ...more
Whether you're interested in learning Microsoft Excel from the bottom up or just looking to pick up a few tips and tricks, you're in the right place. In this tutorial from everyone's favorite digital spreadsheet guru, ExcelIsFun, the 23rd installment in his "Highline Excel Cla ...more
If you frequently fill out online forms, and are looking for a way to save time, you're in luck: With this video tutorial, you'll learn to use your keyboard, instead of your mouse, to fill in online forms and visit web sites. Make time for this time-saving tutorial.
Safari makes it easy to browse multiple web sites in the same browser window using tabs. In the latest version of Safari in Leopard, you'll find even greater flexibility in the way you deal with tabs. For a survey of the new features available to users of Apple Safarin in the ...more
With this useful video, you will learn some tips and tricks about how to delete your web browser history, passwords, cookies, also cache form data and temporary internet files. This is especially for Internet Explorer and of course, Mozilla Firefox. Deleting these files usua ...more