Open Key Safe

How To : Create a Bump Key to Open Any Door

Lockpicking is a skill that takes years upon years to master. Locks come in all sorts of shapes and sizes, but have common ground in how they work. Most cylinder locks have "tumblers," which are metallic cylindrical objects that sit vertically to the actual locking mechanism. ...more

How To : Dial open a combination safe lock

In this video tutorial, viewers learn how to dial open a combination safe lock. Begin by turning the lock 4 times to the left. Then turn the lock 3 times to the right. Now turn the lock 2 times to the left and finish by turning it one more time to the right. Users should hear ...more

Safe-Cracking Made Stupid Easy : Just Use a Magnet

SentrySafe puts all sorts of measures in place to protect your valuables and important documents. This particular SentrySafe has an electronic lock, four 1-inch bolts to keep the door firmly in place, pry-resistant hinges, and it's able to withstand drops of up to 15 feet. Tha ...more

How To : Restore your PC to factory settings by rebooting

Greg French talks to us about the different ways to reboot a computer to resolve issues in the computer. The first way is by pressing F8 key while startup after rebooting the system. When you insert a wrong driver for video card or something, sometimes when you boot the comput ...more

How To : Use GPG4Win in Windows to Encrypt Files & Emails

I love cryptography. It is like a great gigantic puzzle for me to solve. However, it is more important than that. It is also how we keep secrets safe. Not just sorta safe either, but really safe. Until recently, if you wanted to use strong encryption you had to either learn d ...more

How To : Tether Your Nexus 5 Without Your Carrier Knowing

It used to be easy to hack tethering—root your device and install a third-party or modded tethering app. But snuck in amongst the changes in Android 4.3, a new data-monitoring service of sorts made its debut. There used to be a time when your data connection was yours. You pai ...more

How To : Prevent home invasions

Keep you and your family safe by equipping your home to prevent home invasion. Discourage home invasions by being cautious and making a break-in more difficult. Have a plan in the case your home is invaded. The best defense against a home invasion is careful planning. You Wi ...more

How To : Top 10 Things to Do After Installing Kali Linux

Kali Linux, by default, probably doesn't have everything you need to get you through day-to-day penetration testing with ease. With a few tips, tricks, and applications, we can quickly get started using Kali like a professional white hat. Most Linux distributions are highly c ...more

How To : Remove autorun.inf and boot.com virus on your PC

This tutorial describes the procedure to remove autorun.inf and boot.com virus. This virus is commonly called as resycled/boot.com virus, which could damage the system files and may steal important information from the system.This can be removed by any malware / spyware remove ...more

News : 3 Child-Proofing Products That Aren't Total Garbage

I'm a new parent and I just moved into a new home. The first thing I wanted to do was ensure my toddler's safety in his new digs. That meant buying a bunch of baby-proofing products from Amazon, realizing most were junk, then buying some more until I found solutions for all my ...more

How To : Download & Install iOS 11 on Your iPhone

The final developer version of iOS 11 was leaked a few days ago, but Apple quickly stopped signing it so nobody else could install it. With Apple's Sept. 12 event now over, the Golden Master (GM) version of iOS 11, the same version that will be released to everyone around Sept ...more

How To : Handle a Mac freeze

One of the most frustrating events in life is a computer freeze. When your Mac freezes don’t freak-out. Stay calm there are things you can do. And, hey, if you can’t do them, there is a professional out the happy to help you out...for a price. Hypnotized by the spinning beach ...more

How To : Fake Your Ios Version.

If you are like me and you have a old iPhone and you don't want to buy a new one, you can fake your ios version by fallowing this tutorial. Just to be safe i am not responsible for what you do with this or if you mess up and wreck your phone. Plus ios and iPhone all belong to ...more

Hack Like a Pro : How to Create a Smartphone Pentesting Lab

Welcome back, my novice hackers! More and more, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only using smartphones for voice communication, but also web services, email, SMS, chatting, social networking, photogr ...more

How to Make Coca-Cola : The Secret Formula Revealed

The battle between Pepsi and Coke has been a grueling one, with both sides securing their secret formulas for great tasting, addicting sodas behind lock and key. But even big time companies screw up every now and then, and one of the most guarded trade secrets in the beverage ...more

How To : 7 Ways to Bypass Android's Secured Lock Screen

If you somehow forgot the pattern, PIN, or password that locks your Android device, you might think you're out of luck and are destined to be locked out forever. These security methods are hard to crack by design, but in many cases, it's not entirely impossible to break into a ...more

Prev Page
  • Hot
  • Latest