Redirect Search Results

News: Unencrypted Air Traffic Communications Allow Hackers to Track & Possibly Redirect Flights

Considering how often many of us fly on commercial airlines, the idea that a hacker could somehow interfere with the plane is a very scary thought. It doesn't help to learn that at Defcon, a researcher found that the Automatic Dependent Surveillance Broadcast (ADS-B), transmissions that planes use to communicate with airport towers are both unencrypted and unauthenticated.

How To: Use This Trick in iPhone Games So You're Not Redirected to Other Apps When Accidentally Tapping Ads You Try to Close

When you're playing a game on your iPhone, the chances are good that you'll come across an ad you have to watch before you can continue — especially on free games. While it may be annoying to be forced to wait for 10 seconds or even up to a full minute, it can be even more frustrating when you accidentally leave the game to visit the ad's linked app or site when trying to hit the little "x" to continue gaming.

How To: Redirect edge flow in Blender 2.5

This video offers a few quick tips on tricks on redirecting edge flow (or edgeflow) when working within Blender 2.5. Whether you're new to the Blender Foundation's popular 3D modeling program or a seasoned graphic artist just interested in better acquainting yourself with the application, you're sure to be well served by this free video tutorial. For more information, including detailed instructions, take a look.

How To: Redirect email using cPanel

Let's say that you're in a hurry and just don't have time to set up email accounts and you're comfortable using your current email address. Well, here's what you can do. You can redirect your domain email to your current email address. This tutorial will show you how to forward email using cPanel. Redirect email using cPanel.

How To: Play the Comets and Craters iPhone tower defense game

Need a new iPhone app? Check out Comets and Craters, a new iPhone tower defense strategy game. These ten video tutorials cover all of the gameplay troubles you may have. Steve explains the features and gameplay to help you get the most out of playing Comets and Craters on your Apple iPhone. For those more seasoned Tower Defense players, the video's also provide some insight regarding scoring, upgrades, plus Tower and Enemy capabilities.

How To: Hack your Facebook status updates and profile page

Want to add a dislike button to your page? Or want to make an update about what you did last night, but don't want your grandmother to read it? This video shows you ten ways you can hack your Facebook page. You can also pre-schedule certain status updates, set your Facebook language to 'Pirate English', create a status update word cloud, tag your friends in updates, add symbols to updates, and even redirect your friends back to their own profile page!

How To: Keep your cat off of your furniture

Cats are the most popular pets in America, and everyone loves a soft and cuddly kitten. But, one of the biggest drawbacks to having a feline friend is that where we see a brand new sofa - they see a scratching post. In this clip, get some useful tips for helping your cat stay away from the furniture and redirect their scratching impulses. In this pet video Marc Morrone will show you the best way to keep cats off the furniture so they don't destroy them with their claws.

How To: Use UFONet

With the release of the Mirai source code, botnets are back in a big way. In the early days of botnets, zombies (infected hosts) would report to IRC (Internet Relay Chat) channels for CNC (command and control) instructions. Modern botnets have evolved, but they continue to use the same concepts as their predecessors.

How To: Make & receive free phone calls with Google Voice

Google Voice was recently made available to the general public and now everyone will be able to use it. If you are looking for a way to stay connected to your friends and family for free, check out this clip. Voice will redirect calls straight to your home phone or cell and allows you to text, too! You can connect up to four phones to your account, as well, so you can use Google in the whole house. Enjoy!

How To: See if an email is a scam

In order to find out if an email is a scam, you should avoid clicking on any links in that are in any emails. The links that are attached to emails, in this manner, usually have cloned the website of the institution where you do your banking. The link will look similar to your banking institutions site. Do not enter any of your personal information in emails in this fashion. Your bank will not contact you in this way.

How To: Make a free .Mac/iChat Account

In this video from AppleGenius0921 we learn how to create a free .mac account and AIM account to use with iChat. Go to iChat and go to Preferences. Click the plus sign in to bottom left. An account setup window will pop up. Click get an ichat account. It will redirect you to apple's site where you can create an apple ID. After you complete that step, go to the plus button again, and set up your new .Mac account that you just created within ichat.

How To: Fake Captive Portal with an Android Phone

Have you ever used an open wifi, which after you connect displays a website to enter your credentials to get internet? That website is called captive portal and widely used in airports, hotels, universities etc. Have you ever wondered what would happen if someone would set up an open wifi with the same name displaying a very similar web page asking for credentials? Usually if there are multiple wifi networks with the same name and encryption, devices only display the one with the highest sign...

How To: Phish Social Media Sites with SocialFish

Phishing is the easiest way to get your password stolen, as it only takes one mistake to log in to the wrong website. A convincing phishing site is key to a successful attempt, and tools to create them have become intuitive and more sophisticated. SocialFish allows a hacker to create a persuasive phishing page for nearly any website, offering a web interface with an Android app for remote control.

Exploit Development: How to Manipulate Code Execution with the Instruction Pointer

The one thing that separates a script kiddy from a legitimate hacker or security professional is the ability to program. Script kiddies use other people's tools, while hackers and security pros write their own tools. To that end, we're going to see how a stack overflow vulnerability allows us to flood a variable with enough input to overwrite the instruction pointer with our own commands.

How To: Got Beef? Getting Started with BeEF

With the the general computer users understanding of Information security rising (at least to the point of not clicking on unknown links), and operating system security getting better by default. We need to look for new and creative ways to gain a foothold in a system.

How To: Write an XSS Cookie Stealer in JavaScript to Steal Passwords

JavaScript is one of the most common languages used on the web. It can automate and animate website components, manage website content, and carry out many other useful functions from within a webpage. The scripting language also has many functions which can be used for malicious purposes, including stealing a user's cookies containing passwords and other information.

How To: Easily build a rain barrel

A whole is drilled into the cap of a barrel with a 3 1/4 inch bit and another one an inch or more below the top and one of 3 inches width on the next side. Spreaded adapters ends are wrapped with plumbers tape; to prevent water leaks. The ends are then screwed together and placed into the top hole in the barrel. The spiget is held into the side hole with a piece of pvc pipe and a garden hose is attached. A funnel is made with a piece of window screen mesh slightly bigger than a pvc pipe it co...

How To: Get Spotify, Pandora & Other App Controls in Waze to Stop Switching Between Audio & Maps

Who doesn't love listening to music or playlists when driving? The open road and an awesome playlist make for a perfect pairing, but it can become quite the challenge if you're trying to navigate at the same time. That's why Waze's built-in audio controls for compatible apps like Spotify and Pandora are so useful, so you can always keep your eyes on the map and road ahead of you.

How To: Everything You Need to Know About iOS 8 Beta 2 for iPhone, iPad, & iPod Touch

Apple has released the 2nd beta of iOS 8, exactly fifteen days after the first version was unveiled at WWDC and subsequently released to developers. I've already shown you some of the new features of iOS 8, like location-based app alerts, randomized MAC addresses, hidden Safari tricks, and a slew of new things in the Messages app. But if you've had the chance the explore iOS 8, let's go through some of the changes that Apple has made to the latest iteration of its mobile operating system.

How To: Fix the Latest 'Device Incompatible' Error on Pokémon GO & Harry Potter Wizards Unite

Both Pokémon GO & Harry Potter Wizards Unite are augmented reality games developed by Niantic, and neither needs much introduction. Pokémon GO, all by itself, created a worldwide phenomenon that still carries a strong fan base years later — Wizards Unite is working on doing the same. However, things are not all fun and games, as you might think in the world of monsters and magical creatures.

Prev Page