Feel Y

How To : 5 Natural Ways to Remove a Crick in Your Neck

A crick is a sudden, spasmodic pain and stiffness in the neck caused by tight muscles that can absolutely ruin your entire day. It can last for more than one day and can be triggered by the smallest movement of the neck, such as a simple pandiculation, aka a yawn-stretch. Alth ...more

How To : Scan Websites for Vulnerabilities with Arachni

Welcome to my very first tutorial ever. Today I will be teaching you how you can use Arachni to scan vulnerabilities of web applications. I welcome all criticism good or bad as a teaching method for myself. Most of my experience I have acquired using the trial of fire method, ...more

How to Java : E4 (Methods)

Welcome back to another episode of Java Tutorials, In today's tutorial, we'll be learning about what methods are, proper syntax when writing Methods, and why they are beneficial in a program's code. Lets dive in. -------------------------- What Is A Method A method is ess ...more

How To : The Fastest Way to Make Spaghetti Squash Noodles

Spaghetti squash is a versatile vegetable, but it has a reputation for being intimidating to prepare... not to mention time-consuming. Heating it up in the oven can take at least 30-40 minutes, which is a definite time-suck for those who want to get dinner on the table, stat. ...more

How To : 5 Shortcuts to Making Killer Breakfasts in a Hurry

Personally, I think everyone should have the freedom to sit down and enjoy a delicious breakfast each morning... but that isn't always attainable, especially because of the prep work and cook time that tasty meals often require. Don't Miss: How to Make a Full Breakfast Withou ...more

How To : Security-Oriented C Tutorial 0x15 - File I/O

Hello readers, in this tutorial, we will be discussing how to perform file operations such as reading and writing. Types of File Access There are two methods of accessing files: file descriptors and file streams. We will be learning about file streams because it is a higher ...more

How To : C++ Hash Cracker

This is my first ever how-to so I apologize in advance for any grammar mistakes or spelling errors. Introduction This is what I'm planning on being a series of c++ coding articles. This one in particular are gonna be a series of programs for various password cracking methods ...more

Game Changer : YouTube Music Is Live for Android & iOS

In the wake of Apple Music making its debut on Android devices, Google has finally released its highly anticipated YouTube Music app. With these two tech heavyweights throwing their hats into the ring, the streaming music world is about to get rocked. This new standalone YouT ...more

How To : 'Hot Chocolate' Balls = Next-Level Instant Cocoa

Winter—or any cold, gray day, for that matter—is the best time for a warm cup of something hot. For me, hot chocolate is my "warm cup" of choice: rich and milky, deliciously sweet, and oh-so-comforting. On super-cold days when I can't feel my face, a nice, large cup of hot ch ...more

How To : Chrome Extensions Every Twitter User Should Know

When it comes to news, updates, and arbitrary nonsense, it's hard to find a better source than Twitter. And for some of us, the best way to consume Twitter is through the web (versus a mobile app). But as much as I prefer the standard browser version, it's easy to make it bett ...more

How To : Make a Cheap Cut of Steak Taste Like Filet Mignon

Living on a budget often means compromising what you want for what you need—or at least, for what's affordable. But that doesn't necessarily mean you have to compromise on flavor, especially if you know the right tips and tricks to make something spectacular out of the ordinar ...more

Hugging the Web (Part 2 : Surveillance Takeover)

Welcome back, curious hackers! In today's tutorial, we will be diving deep into the manipulation of Google Operators, commonly referred to as "Google Dorks" in order to access Surveillance Cameras and other control panels. "Why would I do that?" One might ask. Good question m ...more

How To : This Hack Turns Any Phone into a Black Light

Black lights come in all shapes and sizes, and they're useful in a variety of ways. They can help you spot fake currency, urine stains, interesting rocks, and deadly scorpions, and they can even help you view cool fluorescent artwork. Most black lights work using a filter or ...more

News : Just A Message

It's been a while, since I have just started High School. I have put a hiatus to my pentesting for a few weeks, and now, I am making a return. I have taken time to read about code, (even did a research article analysis on how humans can write "beautiful" code and something li ...more

How To : Sushi + Burrito = The Ultimate Handheld Meal

Sushirrito offers burrito-sized sushi rolls that are on the cusp of becoming the trendiest handheld snack to hit the foodie world. According to its website, Peter Yen created the Sushirrito brand, trademarked it in 2008, and opened his first restaurant in 2011 in the Bay Area ...more

How To : Morning Coffee Not Strong Enough? Do This Instead

Like a strong-tasting cup of joe, but want more caffeine out of it? Start double brewing your coffee. To paraphrase a big fan of the double brew process on Reddit, it'll make you feel like you can throw an orange at 60 percent the speed of light. It's that strong. Really. Don ...more

How To : Create a Bind Shell in Python

Hi guys, I'm gonna keep this short because I got assignments and a lot of notes to study and also other how-tos and forums to reads. lol...Since I'm keeping this short...no story time just scenario. And I want to thank n3stor for giving me the idea to post this. Scenario Let ...more

How To : Build a DNS Packet Sniffer with Scapy and Python

In my last how-to, we built a man-in-the-middle tool. The aforementioned script only established a man-in-the-middle. Today we'll be building a tool to utilize it. We'll be building a DNS packet sniffer. In a nutshell, this listens for DNS queries from the victim and shows the ...more

Tor for Android : How to Stay Anonymous on Your Phone

Keeping your online data and identity private is an uphill battle, but with the anonymity network Tor, you have a pretty decent line of defense from prying eyes. But while Tor is great for desktop users, since they can simply install a Tor browser or plugin, it's a bit more c ...more

How To : The Easiest Way to Smoke Food Without a Smoker

There's something primal about the smell of smoking food. Somewhere deep in the recesses of our souls, we remember a time when humans only ate by the fire. Or perhaps that's just something I tell myself. Either way, it's hard to smell smoke and food and not feel like you shoul ...more

How To : Make Easy Ice Cream at Home in Under 10 Minutes

Homemade ice cream is so good and you can make it with just a few ingredients and no special equipment. Most cookbooks and magazine recipes expect you to have an ice cream maker at home, but you can imitate the churning effect of an ice cream maker by shaking or tossing around ...more

How To : Cut Tomatoes the Right Way

Tomatoes are the perfect barometer for kitchen knives and knife skills. If you've ever watched an infomercial for a set of knives, you've surely seen the enthusiastic host waxing about how well the knives cut tomatoes. And if you've ever had your knives sharpened, you've most ...more

News : Hacking SCADA

Welcome back, my hacker novitiates! Now, and more so in the future, wars will be fought hacker v. hacker. The number of soldiers, guns, tanks, and ships will be less important in your success in warfare than the number of well-trained hackers you have. Every nation and every ...more

News : These Edible Flowers Will Literally Shock You

Eating flowers is a time-honored culinary tradition, from nibbling on nasturtiums to grazing on candied violets. And why not? They look beautiful and lend a unique floral flavors to salads, desserts, and anything in between. Don't Miss: Weird Ingredient Wednesday—Zucchini Blo ...more

How To : Make Party-Style Temari Sushi

If you've never heard of or eaten temari sushi, then you're in for a treat. These pretty sushi balls are good for parties and festive gatherings, and even though they are so colorful and striking, they are not hard to make. Just like every other type of sushi, they are customi ...more

How To : Fix Notification Delays on Android

Ever feel like you're receiving notifications way too late on your Android device? Many Android apps use Google's Cloud Messaging service to send and receive notifications, including Hangouts, Gmail, Pushbullet, Facebook, and even WhatsApp to an extent. To ensure that your ph ...more

How To : Be More Secretive Using Hide SMS and Call Recorder

Some people are of extremely secretive nature. They do not like sharing their personal events in their lives with anyone. Thus people around that person wont be able to figure out details on their life's personal matters. It is not like they want to hide some mysterious secret ...more

How To : Cook with Marshmallow Peeps

Is there anything more emblematic of Easter than marshmallow peeps? And yet, despite their popularity...does anyone actually like eating them? Okay, fine, I'll admit it: I love Peeps. They're fun, they're cute, and they're pure sugary, fluffy, tasty goodness. My favorite part ...more

News : Here's Your Official Look at the New HTC One M9

Today marked the official unveiling of the HTC One M9 at Mobile World Congress in Barcelona. The newest HTC flagship will be released by the middle of March globally, and come in gold, gunmetal, pink, and silver. And if you were wondering, yes all of the leaks were pretty much ...more

How To : Fall in Love by Looking a Stranger in the Eyes

Eye contact is key in conversations, job interviews, and honesty, and it can help you access others' thoughts and spot heavy drinkers. Locking eyes with someone can even help you fall in love, whether you know them or not. The powerful connection that occurs when you lock eye ...more

  • Hot
  • Latest