Disastrous Search Results

How To: Change a flat tire on your bike

If you are a serious bike rider, chances are you have had or will have a flat tire at a disastrous time during a ride at some point. Knowing how to change out the bad tire and tube (and having a spare to replace them with) can make all the difference in saving your ride. This video will show you how to change the tire tube on you wheel while on the trail quickly and easily, getting you back riding.

How To: Fix a split fingernail using a tea bag

Don't you hate when you get a broken nail? Broken nails can be disastrous for a manicure. Next time this happens, don't reach for the clippers right away! In this tutorial, you will learn how to use a simple tea bag to fix your broken nail. This method will seal up the crack and allow you to repaint your nails so no one knows!

How To: Improvise over altered chords using melodic minor on the guitar

Altered chords are a great spice to add to any song, especially in Jazz and Fusion. But trying to improvise over them in a solo can be disastrous if you aren't playing on the key tones of the chord, you will just create a large amount of a-tonal and diminished notes that you might not want in your lines. In this great video you will learn one great technique to keep in mind when improvising a solo over an altered chord using melodic minor of the note a half step up from the root of the altere...

How To: Date multiple women at the same time

Depending on your juggling skills, it can be a dream come true or your worst nightmare. Watch this how-to dating video and learn how to date several women at once. To carry out this delicate project you will need more than one woman, organizational skills, and a silver tongue. Caution dating several women at once can have disastrous consequences.

How To: Prevent Windows 10 from Auto-Updating

In a bit of a strange decision, Microsoft has made it to where some users don't have a choice in the matter of applying failed automatic updates. When a Windows or driver update comes your way and fails to apply for any reason, your computer will continue to attempt applying the broken update at seemingly random intervals. The Pro and Enterprise editions of Windows 10 will allow you to delay or stop updates altogether when something like this happens, but the Home edition has no such setting.

News: T-Mobile LTE-U Gives Galaxy S8 Owners a Speed Boost in Select Cities

Last month, AT&T made headlines with its disastrous launch of its 5G Evolution network (spoiler alert: it wasn't actually 5G). T-Mobile responded to the embarrassing news by saying the company would be working on its own 5G network, and would take its time rolling it out. Well, T-Mobile may have just pulled an AT&T — T-Mobile is launching LTE-U in the US, and things seem pretty similar to the 5G Evolution's introduction.

How To: Shut Down Your PC and Send Other Commands Remotely Through Twitter Using TweetMyPC

Ever been halfway to work or school and suddenly remembered you forgot to log off your computer? A lot of people are constantly logged in to email and social media accounts, so if you have a mischievous roommate or sibling, this situation could be disastrous. That's where TweetMyPC comes in—it's a free Windows application that lets you send commands to your computer just by tweeting. Image by Twittermania

How To: Fix Delayed Notifications on Your Galaxy S8 or S8+

The Note 7 debacle taught Samsung an important lesson on cramming oversized batteries into their handsets, and they've applied it diligently to their Galaxy S8 and S8+. You might even say the company has gone a little too far in trying to achieve a balance between battery size and battery life, as it not only not only sets screen resolutions to 1080p by default and warns users about maxing out display brightness, but it also keeps close tabs on individual apps' battery usage.

How To: Clear Your Web Browsing History in a Hurry

If you've been visiting websites of ill repute, or if you've been Christmas shopping and don't want to spoil the surprise, it would be a disastrous situation if anyone were to come across your browsing history. Visited sites, cookies, and cache can paint a very clear picture of your recent internet activity, and depending on the situation, you may only have a few seconds to delete your history before someone else barges in.

How To: How the Headrest in Your Vehicle Can Potentially Save Your Life One Day

If you ever find yourself in a car that's submerged under water, your first instinct should be to try and open either the window or the door in the first few seconds of touching water. Unfortunately, if you wait any longer than that, the lopsided ambient water pressure subjected to the car will make it impossible to open the car door, and the now ubiquitous power windows will likely short out. Sure, you could wait until the pressure has equalized on both sides of the car, but this usually hap...

How To: Pack Household Goods Effectively

When the time comes to move home, the logistics of moving your belongings can easily become tiresome, tricky and even disastrous. However, with a little careful planning and foresight, the act of packing can be a simple process. The key to getting the most from your move is in efficiency, planning and care. Here, we take a look at the best ways to pack in order to ensure a safe and simple move.

How To: The Only Ingredient You Need to Make Boxed Brownie Mix

Boxed brownie mixes advertise their convenience compared to homemade brownies—with only a few ingredients, they promise a moist, chocolatey crumb. However, these "instant" mixes still require fresh ingredients and a baking time that matches that of homemade brownies. When you're craving a chocolate fix but you're coming up short on eggs, oil, and time, don't despair: you can still make brownies using a can of soda. Two Different Methods, One Soda Required

How To: Perform Directory Traversal & Extract Sensitive Information

With all the web applications out on the internet today, and especially the ones built and configured by novices, it's easy to find vulnerabilities. Some are more perilous than others, but the consequences of even the slightest breach can be tremendous in the hands of a skilled hacker. Directory traversal is a relatively simple attack but can be used to expose sensitive information on a server.

Tell Your Friends: How to Protect Yourself from Android's Biggest Security Flaw in Years

Researchers at the cyber security firm Zimperium have recently uncovered a vulnerability in roughly 95% of Android devices that has the potential to allow hackers to take total control over your phone with a simple picture message (MMS). The gritty details of this exploit have not been made public yet, but hackers now know the general framework for this type of attack, so you can be certain that they'll hammer out the details in no time.

How To: Enumerate SMB with Enum4linux & Smbclient

SMB (Server Message Block) is a protocol that allows resources on the same network to share files, browse the network, and print over the network. It was initially used on Windows, but Unix systems can use SMB through Samba. Today, we will be using a tool called Enum4linux to extract information from a target, as well as smbclient to connect to an SMB share and transfer files.

How To: Use Command Injection to Pop a Reverse Shell on a Web Server

Command injection is a technique used by hackers to execute system commands on a server, usually via a web application or some kind of GUI. This can happen when an application provides some sort of functionality to the user involving the use of system commands. When the input is not properly sanitized, commands not originally intended to be run are allowed to be executed.

Caution: Here's All the Apps That Were Buggy or Broken on iOS 12.0 Beta for iPhone

The iOS 12.0 beta earned admiration for its superior performance to last year's controversially buggy iOS 11. That doesn't mean it was free from problems before the stable release went live. During the initial iOS 12.0 beta testing phase, there were plenty of bugs and glitches, many of which affected the apps we use every day. However, none of these issues persist anymore since iOS 12 stable went live.

How To: Simulate a RAT on Your Network with ShinoBOT

A remote administration tool, or RAT, is a piece of software used for remotely controlling machines. They are commonly used by tech support to gain remote access for troubleshooting purposes, but RATs are also an important part of a hacker's advanced persistent threat (APT) toolkit. Unlike standard administration RATs, these tools are designed to be delivered stealthily and operate undetected.

Prev Page