Potential

News : Hacking SCADA

Welcome back, my hacker novitiates! Now, and more so in the future, wars will be fought hacker v. hacker. The number of soldiers, guns, tanks, and ships will be less important in your success in warfare than the number of well-trained hackers you have. Every nation and every ...more

How To : Conduct a Pentest Like a Pro in 6 Phases

Penetration testing, or pentesting, is the process of probing a network or system by simulating an attack, which is used to find vulnerabilities that could be exploited by a malicious actor. The main goal of a pentest is to identify security holes and weaknesses so that the or ...more

How To : Read the "Sun" or "Apollo" line on your palm

Not everyone has the "Sun" or "Apollo" line on their palm. For those lucky enough to have it, such a line indicates many potential gifts and popularity! Watch this video as Jim Winters explains how to identify the Sun line and what it indicates for the individuals who have them.

How To : Make a Fake, Pirate-Worthy Gold Bar on the Cheap

I loved the Gold Rush unit back in third grade. We went up to the American River and panned for gold, and my panning skills balled above all. I got like three tiny pellets. Of course, it was all fool's gold, aka pyrite, but it was still pretty legit. And this was before wearin ...more

How To : Block Apps from Logging Your Data on Android

With root access, you're granted greater control over your device, allowing you to do things that your Android system wouldn't allow otherwise. Things like installing Xposed mods are made possible with root, but other advantages address performance and security, like stopping ...more

How To : Model a human head using Maya

Maya can count itself among the most powerful and also most challenging programs in all of computing. It's 3D modeling potential is nearly limitless if you can master its intricacies. This video features a professional digital art teacher teaching you how to model a 3D head us ...more

How To : Build a Deadly Motion-Activated Airsoft Turret Gun

It's tough out there on the battlefield, especially when your stuck in the trenches and your comrades are dropping like flies. There's no hope. At least, until the next airsoft battle. So, enlist the help of a little unmanned airsoft artillery with this DIY motion-activated a ...more

How To : Do dumbbell clean and press

Learn how to do dumbbell clean and presses. Presented by Real Jock Gay Fitness Health & Life. Benefits This exercise converts a classic shoulder exercise, often done with a barbell or kettlebell, to take advantage of its leg-busting potential. Put squats between the elements o ...more

How To : Prepare leg of lamb for roasting

Lamb has the potential for great dinner recipes. Watch this how to video tutorial and find out how to prepare a leg of lamb to roast with UKTV Food. Learn to trim the leg of lamb for so that you get the most flavor from it.

Privacy 101 : Using Android Without Compromising Security

In this day and age, maintaining your privacy is a perpetual battle, and doing so with an internet-connected device like your smartphone is even more of a struggle. Every website you visit, every app you install, every message you send, and every call you make is a potential v ...more

How To : Play Apex Legends on Your Phone Right Now

With EA chief executive Andrew Wilson stating the official mobile version of Apex Legends won't arrive until the 2021 fiscal year, fans have to wait at least another year to enjoy their favorite battle royale game on the go. But for those who can't wait, there are ways to play ...more

Hacking macOS : How to Hack a MacBook with One Ruby Command

With just one line of Ruby code embedded into a fake PDF, a hacker can remotely control any Mac computer from anywhere in the world. Creating the command is the easy part, but getting the target to open the code is where a hacker will need to get creative. Ruby is just one wa ...more

How To : Get rescued from a deserted island

Whether your plane made a crash landing or your ship got lost on a three-hour tour, now you're stranded on a remote island. Here's how to get help. You Will Need * A freshwater source * Some dry sticks * Rocks and leaves * Clothing * A mirror or a reflective object * Cell pho ...more

News : You Don't Need Antibiotics for Pink Eye

Crusty, itchy, red eyes? There is a decent chance you could have conjunctivitis, or pink eye, an infection of the thin lining around the eye and the eyelid, caused by bacteria, an allergen, virus, or even your contact lenses. Whatever the cause — you call up your doctor to get ...more

News : 4 Years of Spectacularly Pointless Marble Machines

So very pointless, yet unquestionably spectacular. The best kind of "art" performs no other function than to delight the viewer, and Japanese YouTube user Denha's complex marble machines do just that. But are marble machines art? You can call them that—or toys, scientific cont ...more

How To : 60 iOS Features Apple Stole from Jailbreakers

Overall, iOS is more impressive than ever with its stability enhancements, security tools, suite of apps and services, and intuitive user interface. With each passing update, things just get better and better for iPhone users. But don't think for a second that this is all beca ...more

News : This Weekend, 40 Foot Marionettes Invade Berlin

This past weekend Berlin celebrated the 20th anniversary of the fall of the Berlin wall with a visit from France's Royal de Luxe street theatre company. Royal de Luxe creates insanely amazing large scale, mechanical street marionettes. Founded in 1979 by Jean Luc Courcoult, t ...more

How To : Flirt with text messages

How does text messaging figure into a dating relationship? Tracey Cox discusses the proper way to "text flirt" in any relationship. Learn the etiquette of text messaging and the potential relationship pitfalls associated with it. Flirt with text messages. Click through to watc ...more

Compared : The 5 Best Keyboard Apps for Android

Your phone's keyboard is one of the most commonly used apps. Whether you're typing out status updates, sending private messages, or just bombarding everyone in sight with as many emoji as you possibly can, you probably couldn't get by without a good keyboard app. Since Androi ...more

How To : The 4 Best Password Managers for Android

Over the years, the internet has become a dangerous place. As its popularity has increased, it has attracted more hackers looking to make a quick buck. However, as our dependency on the web grows, it becomes increasingly difficult to sever all ties. This means we have to prote ...more

Ranked : The 7 Best Paid Word Games for iPhone & Android

Word games can expand your vocabulary skills in all sorts of exciting and creative ways. Because of this, both the iOS App Store and the Google Play Store are awash with word games, making it hard to differentiate between good and bad titles. This is especially troublesome if ...more

How To : Play "Summertime" in D minor on guitar

Although mainly demonstrational, this video shows you how to play a song "Summertime" in D minor on guitar. This video is intended for advanced players who learn easily by watching or listening. Read the useful tips posted below to aid your guitar learning: This is a loose an ...more

How To : Manipulate User Credentials with a CSRF Attack

Web 2.0 technology has provided a convenient way to post videos online, keep up with old friends on social media, and even bank from the comfort of your web browser. But when applications are poorly designed or incorrectly configured, certain flaws can be exploited. One such f ...more

How To : Quiet an Overthinking Mind

We all carry a bit of anxiety around with us. Is our boss still annoyed because we could barely stay awake in yesterday's pre-dawn meeting? Will our friend hate us forever because we forgot to call them back two weeks ago? Whatever worries pop up in your mind, whether they're ...more

  • Hot
  • Latest