How to Find Someone Address

How To : Everything You Need to Know About Pinning a Tweet

Pinning a tweet is a great way to get the point across because it's the first post people see when they visit your Twitter profile. When you pin a tweet, reply, or retweet, it sticks to the top of your profile, whether you create new tweets or not. It's the perfect spot to pla ...more

How To : Switch Accounts in Google Apps with One Swipe

Between school, work, and your personal life, there's a good chance you have multiple Google accounts. Most Google apps let you log into all of them simultaneously to receive applicable alerts when they arrive. Well, there's a dead-simple way to switch between these accounts, ...more

How To : Use Desktop Chrome Extensions on Android

For years, there has been a disconnect between the Chrome app on your smartphone and the Chrome browser on your computer. The latter was a powerfully fast browser which could be enhanced with extensions to add new features and functionality, while the former was just a fast br ...more

How To : Safely Browse the Web with Opera's Free VPN

Browsing the web can be dangerous. With all of the various threats out there, it isn't enough to just avoid bad links and visit only HTTPS websites. You need to take advantage of the tools available to you so you don't end up the victim of some scam. Fortunately, Opera is maki ...more

How to Be an Intern : Why Every Intern Should BYOB

A week into my internship, I experienced pretty serious back pain and slight difficulty breathing. I scheduled a doctor's appointment to make sure nothing was wrong, and I got a surprising diagnosis: bad posture. Yep, slouching at my desk had caused all of my maladies. In an ...more

News : HoloLens Challenge #16 Winner Brings the Cowbell

James Ashley, Atlanta-based Microsoft MVP and author of Beginning Kinect Programming with Microsoft Kinect, has been running monthly challenges since around the release of the HoloLens Developers Kits. Each month, those of us who follow what happens in the community can look f ...more

News : Use ProtonMail More Securely Through the Tor Network

ProtonMail has long been the favorite of journalists and security-conscious professionals, with Edward Snowden the most famous example. But these days, everyone cares about anonymity, so it's no surprise that ProtonMail currently has over 2 million users. And now the service i ...more

How To : Setup Practice Ctf's from Vulnhub on Kali Linux

Since Ive started to learn about nmap and metasploit and other tools I was learning well but I had one problem, I had nothing to practice it on. As a result I asked someone about my problem and they told me about Vulnhub. It's a great way to practice. Its good beginners and pe ...more

News : MIT Tech Protects Your WiFi Without Passwords

Researchers at MIT's Computer Science and Artificial Intelligence Laboratory have created Wi-Fi technology that identifies where you are, which may eliminate the need for passwords. Video: . The system, called Chronos, can determine where a user is with an accuracy of "tens of ...more

How To : Security-Oriented C Tutorial 0x12 - Scope

What's up readers? We have ever so slightly touched upon this concept of scope with variables but still don't really know what it means. In this tutorial we will learn the behaviors of variables existing in our programs and within functions. What Is a Variable Scope? A scope ...more

How To : Clear Your Web Browsing History in a Hurry

If you've been visiting websites of ill repute, or if you've been Christmas shopping and don't want to spoil the surprise, it would be a disastrous situation if anyone were to come across your browsing history. Visited sites, cookies, and cache can paint a very clear picture o ...more

  • Hot
  • Latest