You want to put out a live web server, but you don't want to be owned in the process. An expert eye for security is not needed if you take a few basic steps in locking down the hatches. Most successful attacks today are not the complex, time-consuming tasks you might think, bu ...more
Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm ...more
Save yourself back pain and injury by learning the correct way to pick up heavy objects. Watch this video to learn how to lift a heavy object. You Will Need * Common sense * Good posture * People to help * A dolly or mechanical lift WARNING: If you have a history of back pr ...more
Introduction This is one of the things I am asked the most and there are so many different answers. It is hard to just tell you without know your computer's current speed or what type of hardware it has. So here I will talk about how to speed up a slow computer and how to kee ...more
By now, you probably know that your iPhone secretly tracks and stores the locations you've visited in a backup folder on your computer's hard drive. The files are unencrypted, which means anyone with access to your computer or device can retrieve the information, which is down ...more
This tutorial shows you how to fix a frozen browser. One way to fix these pages when it happens to you is to go to the tools tab, and click on clear recent history. When the window opens it will ask how much you want to delete. Select everything. Now sometimes when you are usi ...more
Leon Rainbow demonstrates the basics of Graffiti. Leon Rainbow is a graffiti artist here to instruct on the history and basic techniques & skills of graffiti. If you are new to graffiti, this is a good introductory video.
Veteran writer Holly Lisle gives good advice on how to become a better writer by eliminating passive voice from your prose. Go through your manuscript, and delete as many instances of the verb 'to be' as you possibly can to tighten up your writing.
Though it could be argued that Apple's popular and widely used iTunes media player was responsible for the growth and explosion of podcasting, I would argue that iTunes is not the best way to manage and listen to your podcast subscriptions—if you're a iPhone, iPad, or iPod Tou ...more
Candles make great decorations and provide good mood lighting, but cleaning up dried wax drippings is never fun. Check out these simple tips for removing candle wax and it'll be history in no time.
Broken AVI video files are your worst nightmare. Nobody wants to watch a video and find out it's corrupted and not working anymore. But there could be a solution on Linux. This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out ...more
There are varied approaches to using SketchUp with CAD files. This video series presents one method we suggest as it is quick and creates a good clean SketchUp model. In the first video we import a CAD plan, group and lock it, delete extra layers and create a unique layer for ...more
I'm sure everyone has heard about Google's changing privacy policy on March 1. It's scattered everywhere, with notification bubbles on Google Search, YouTube, and the rest of their products. Click here to see the new privacy policy that will take effect on March 1, 2012. What ...more
In this video, we learn how to clear Firefox location bar and browsing history. To get rid of an individual one, use your keyboard to go to the one you don't want. Then, press shift+delete and that one will be deleted. To remove them all, go to tools then click on "clear priva ...more
In this tutorial, we learn how to clear your World of Warcraft cache. First, you will go to your computer, then the local disk (C:), then users. From here, go to the public folder, then click on 'games', and then 'Word of Warcraft'. Once here, you will need to delete the 'cach ...more
Video games and movies have a history of interaction dogged by failure. Video game movies and movie video games both tend to be terrible. There has never been a good feature film based on a video game franchise. Even documentaries about games, which should be rife given the ra ...more
There's no Cheat Engine involved in this Bejeweled Blitz hack. This hack relies on Firefox and a certain extension made specifically for Blitz. Watch this video tutorial to learn how to hack Bejeweled Blitz on Firefox (12/10/09). You need to make sure you have the Mozilla Fir ...more
We're back again with another WTFoto Challenge! Last week's Hobo Advice Challenge somewhat inspired this week's humdinger, where we want you to help us develop the BRO CODE. You could be a part of internet history. Follow the simple directions below and post your submissions o ...more
After the most troubled development in gaming history, Duke is back. And it's...certainly a game that's been in development for fourteen years. Quality aside, there's still some good achievements in the game. In the latest DLC for the game, "The Doctor Who Cloned Me", released ...more
Grand Theft Auto 4 was a landmark game. It gave yet another reboot to the already rebooted Grand Theft Auto series, arguably the most prestigious video game in the West. It has a 98 on Metacritic, making it by that measure the best game of modern times. Whatever your stance on ...more
Advancements in technology usually lead to the miniaturization of old technologies, and video games are no exception. Since at least 1990, game hardware manufacturers and enterprising DIY electronics enthusiasts have poured their efforts into making full-size video game consol ...more
Face it, there may be some sites that you have visited online that you aren't too proud of. So before your mom, brother, or even girlfriend make one single click you might want to check out this tutorial. In the video, you'll find out how to erase your entire web browsing hist ...more
I guess it takes the designer to explain, but it's the altitude that's affecting the unpredictable movement on the ball, not the ball itself. Defending himself, he says the ball's been around since December and no one's complained until now. I know it's a problem in Jo'Burg an ...more
In this video, we learn how to delete wall posts on Facebook. To do this, log into your Facebook account on your preferred browser. Now, click on your profile button so you see your profile. If you see posts you don't like that you want to delete click on the right hand side o ...more
This video shows you how to easily remove the tracking Cookies from your web browser. Normally, if you use AVG Free, it will detect the tracking cookies but not delete them. This video will show you how to manually remove that tracking cookies without using any software. The f ...more
Deleting cookies in your Internet browser allows you the freedom to surf privately. Cookies are little chips that store your information for different websites. For example, when you visit your e-mail, a cookie is attached to your browser that remembers your sign in informatio ...more
Access auto tune for your Audacity recording software with help from this video tutorial. Step-by-step instructions are gone over, and the following links will be needed: Audacity 1.3.10 Beta download page http://audacity.sourceforge.net/download/beta_windows VST Bridge down ...more
This is Part II in the Lockdown: The InfoSecurity Guide To Securing Your Computer series. Before beginning, check out Part I. This article will cover using alternate software to increase your security and will provide you with some information about websites and programs that ...more
It may look like a modern take on Oliver Twist but, we assure you, this is for real. Before you get too alarmed, however, you should note that the headline reads "how to steal cars" and not simply "to steal cars." We are, after all, dealing with the fine people at Machine Pro ...more
... Describing the style of John Bonham's drumming instantly conjurs up visions of the thunderous power he created. His contributions to rock music were revolutionary, and his talent unmatch ...more
Good news. Facebook has finally listened. After severe criticism for ignoring the world's privacy norms, Facebook will finally release simplistic, user-friendly privacy settings soon. Wired reports: “'Now we’ve heard from our users that we have gotten a little bit complex,' ...more
In this video tutorial, viewers learn how to clear their cache in Internet Explorer. Begin by opening the web browser. Then click on Tools from the top menu and select Internet Options. In the General tab under Browsing History, click on Delete. When the Delete Browsing Histor ...more
Get Google Chrome Download and install Google Chrome. Get Rohos Mini Drive Download and install Rohos Mini Drive. Open Rohos Mini Drive Open the Rohos Mini Drive main window and create an encrypted partition by clicking on Setup USB Key link. Tips Without first creating ...more
In this instructional video clip series, our expert in Chinese meditation and qi gong specialist will show you a wide variety of poses, breathing exercises and stretches designed to help you maintain good health and blood flow, keep peace of mind and reduce stress. Learn the h ...more
To become an American citizen you would first have to fill out an application, then take a naturalization examination. Providing that you have been a legal resident in the U.S. for more than five years, you would then have to appear at a court hearing. You have to be eighteen ...more
A wave of shock and anger swept across the country after Edward Snowden released private documents recounting the U.S. government's secretive mass surveillance programs. Although some of the fear was unwarranted (they don't read your emails or listen to your calls), many scram ...more
Clearing the cache on your computer is (usually) a quick and easy way to help speed it up. Deleting those temporary files frees up space, helping you computer run smoother, especially if you have not cleared the cache for a extended period. However, finding the different cache ...more
Yeah, yeah, yeah. Get your mind out of the gutter. Search histories can and should be managed. Many folks are uncomfortable knowing that every video they click and every phrase they search is being recorded and saved, and YouTube is no exception. Sure, sometimes, it can be he ...more
We're only years away from a complete Robot Revolution and Google Inc. will surely be leading the charge. Google knows more about me than my grandma and all my past girlfriends combined. I use Gmail for all of my emailing, Chrome is my browser of choice, and Google Maps is th ...more
If you've been visiting websites of ill repute, or if you've been Christmas shopping and don't want to spoil the surprise, it would be a disastrous situation if anyone were to come across your browsing history. Visited sites, cookies, and cache can paint a very clear picture o ...more
If you're looking to keep your conversations private, look no further than Telegram. Its cloud-based chats are secure and its optional end-to-end encrypted chats even more so, but you can't really prevent someone in the conversation from sharing your messages. However, you can ...more
Applications like Apple Maps, Google Maps, and Waze save every location you visit or search for as a way to speed up future searches and to find commonly-frequented places. But what if you go somewhere unsavory and don't want anyone knowing? You can at least make sure that an ...more
As a hacker, the final stage of exploitation is covering their tracks, which involves wiping all activity and logs so that they can avoid being detected. It's especially crucial for persistence if the target will be accessed again in the future by the attacker. To show you th ...more
Apple Music's Recently Played page is supposed to work as a hub to view your listening history, but it's a bit confusing. Thanks to iOS 13.2, the app now has a History page that allows you to view all of the songs you've listened to — in order — with just a few taps and swipes ...more
Among its many new features, Android P returns the spirit of lock screen widgets to users by presenting the current temperature and weather conditions underneath the clock. It isn't flashy, but it's a fun and useful addition that, unfortunately, does not always work. If your l ...more
We public testers are in luck. Today, Apple released the second developer beta for iOS 13.2. As is the case with most beta releases, developers get theirs first, while public testers are left waiting. Will we get our update the same day, or will we need to wait? As it turns ou ...more
Between the Cambridge Analytica scandal and the revelation that Facebook logs your calls and text history on Android, many are considering joining the #DeleteFacebook movement. But it can be difficult to leave the site, because so much of its content is only available to activ ...more
Privacy is a hot topic. In the wake of Facebook's data scandal, many want to safeguard their personal info. On the other hand, we all gain a certain amount of convenience by using services administered by huge companies like Google, Facebook, and Twitter. Google Assistant coll ...more
Android's settings menu is actually pretty daunting. There are options for nearly everything, so in the sea of various menus and submenus, it's easy to overlook important privacy and security settings. On Google's Pixel phones in particular, there are 20 such settings that you ...more
The number of passwords I have for different websites and emails is easily in the triple digits. And if I had to actually remember all of those individual passwords, I would be locked out of accounts on a daily basis. That's why I use the "remember my password" feature whenev ...more
What's up guys? Welcome to a sort of general walkthrough on how one might approach a reversing and analysis on a crypted malware. This is by no means a universal technique so don't assume that this will occur in every scenario, it's more of a demonstration than anything really ...more
Now that you've updated your iPad, iPhone, or iPod touch to iOS 8, there's a lot of cool new things to explore. If you felt a little overwhelmed from all of the detailed information available in our Coolest Hidden Features of iOS 8 post, then I've got a simple breakdown of all ...more
Telegram routinely boasts about its secure messaging for truly private conversations between two parties. However, default cloud chats in Telegram are only encrypted between client and server, not client and client, which means you have to be a little proactive in making sure ...more
Chrome is the browser of choice for millions of iPhone and Android users, largely thanks to its user-friendly interface and native Google support. But with concerns over sharing private information with massive companies growing, many people are starting to want a little less ...more
Your Pixel's Now Playing song discovery tool received a few updates in Android 12, and the feature is finally comparable to other music recognition services. The most significant upgrades for Now Playing on Google Pixel phones include the ability to favorite identified music ...more
Running out of storage space on your iPhone is annoying, but trying to free some up is downright aggravating. Until they figure out a way to throw a terabyte of flash memory in there, you're going to have to do some spring cleaning every now and then, especially if you're tryi ...more
When a photo or video is just too sensitive to leave laying around in your Photos app, you'll want to either delete it for good or hide it away in safe, secure location on your iPhone. As for the latter, Apple actually has a few tools available to make photos and videos hidden ...more
You saw our post on the 18 coolest new features of iOS 7, but now that you've had a chance to play around with your updated iPhone, it's time to lock it down. There are a surprising number of new privacy and security-related issues in iOS 7's default settings, from allowing A ...more
Welcome back, my budding hackers! Previous to this tutorial, we've focused mostly on hacking the target system. If we're successful in owning the target system, we'll then want to make certain that the system administrator doesn't know we were there, and that he or she cannot ...more
As with most social media platforms, Instagram can be a double-edged sword. On one hand, it's a great way to share and express yourself — but on the other, it can be just as effective at compromising your privacy. Thankfully, there are a few things you can do to protect yourse ...more