How to Detect a Air Leak

How To : Snorkel

If you love the ocean and love swimming, it's time you step up to the next level… snorkeling. Snorkeling is one of the best ways to explore the underwater life, without fancy equipment or expensive training. And all you need is a snorkel. If you want a better look at what’s un ...more

How To : Use the Enchantment Table in Minecraft

Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. For about the past month, the folks at Mojang have been leaking pre-releases of Minecraft 1.9 and they've added many exciting things. Additions to the game include: potions, new mob ...more

How To : Build your own hovercraft

How a Hovercraft can be build.Brittany is demonstrating how to make a Hovercraft. Since hovercraft needs a base she is using plywood for it. She takes square plywood of 48*48 and finds out its center to cut plywood in circle. Don’t forget to wear safety goggle while cutting th ...more

How To : Evaluate a rental apartment

Make sure your next apartment rental goes smoothly by properly checking the property before signing a contract. This way you will avoid unexpected disappointments or problems that you were not aware off. Moving is hard enough, give yourself all the advantage you can by going i ...more

How To : Tune up your car

In this video series, learn from expert mechanic Nathan McCullough as he teaches and demonstrates how to tune-up a car and do a complete vehicle overhaul. Learn how to check your transmission fluid, air filter, power steering fluid, clutch fluid, brake fluid, radiator and cool ...more

News : LED Dress Detects Pollution

The LED pollution dress: the ultimate tech + fashion + eco-friendly accessory. Danish design company Diffus recently introduced the Climate Dress, a garment with hundreds of LEDs that light up when air pollution is detected. Dvice explains how it works: "Hidden somewhere ab ...more

How To : Brute-Force Nearly Any Website Login with Hatch

The tactic of brute-forcing a login, i.e., trying many passwords very quickly until the correct one is discovered, can be easy for services like SSH or Telnet. For something like a website login page, we must identify different elements of the page first. Thanks to a Python to ...more

How To : Download & Install iOS 11 on Your iPhone

The final developer version of iOS 11 was leaked a few days ago, but Apple quickly stopped signing it so nobody else could install it. With Apple's Sept. 12 event now over, the Golden Master (GM) version of iOS 11, the same version that will be released to everyone around Sept ...more

How To : Control Your Nexus 5 Without Touching the Screen

If you've ever seen one of those Samsung commercials from about a year back, you know that the Galaxy S series of phones come with a feature that allows you to do certain things by making gestures in front of your screen. They call this feature Air Gesture, and it enables you ...more

News : Life Becomes More Difficult for Driverless Hackers

The Cloud Security Alliance (CSA), a leading IT trade association, has published its first report on risks and recommendations for connected-vehicle security, ahead of when driverless cars are about to see volume production in the near future. The main idea behind the Observa ...more

How To : Track ADS-B Equipped Aircraft on Your Smartphone

Flight disruptions can cost billions of dollars, but most modern commercial flights rely on air traffic control systems that harbor serious vulnerabilities. The Federal Aviation Administration uses an infrastructure called NextGen, which relies on Automatic Dependent Surveilla ...more

News : How to Check Out the OnePlus 5 LiveStream

The hype is real surrounding the OnePlus 5. As of this post, over 300,000 people have registered for their chance to order the device next week. For everyone's sakes, I hope OnePlus has enough to meet demand. Whether or not you registered this week, there's a good chance you' ...more

How To : Automate Brute-Force Attacks for Nmap Scans

Using Hydra, Ncrack, and other brute-forcing tools to crack passwords for the first time can be frustrating and confusing. To ease into the process, let's discuss automating and optimizing brute-force attacks for potentially vulnerable services such as SMTP, SSH, IMAP, and FTP ...more

How To : 3 Tips to Better Tasting Beer

We are living in a golden age of craft beers. Originally invented by the ancient Egyptians, every culture now has its own tastes regarding beer. The process of making beer is so multi-faceted, it's a miracle that any gets made at all. However, there are lots of steps along th ...more

How To : Easily Generate Hundreds of Phishing Domains

A convincing domain name is critical to the success of any phishing attack. With a single Python script, it's possible to find hundreds of available phishing domains and even identify phishing websites deployed by other hackers for purposes such as stealing user credentials. ...more

  • Hot
  • Latest