Securely Search Results

How To: Securely Sync Files Between Two Machines Using Syncthing

Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mitigate these risks, we'll use a secure, open source, and decentralized alternative.

How To: Browse Privately & Securely with This VPN

If you're looking to improve your browsing experience, then a VPN is the right way to go. If you're tired of censored or geographically blocked sites and wary of companies selling your data, then a good VPN can be your answer to a problem that limits every aspect of your experience online.

How To: Securely Sniff Wi-Fi Packets with Sniffglue

Sniffing packets over a network is an easy way for hackers to gather information on a target without needing to do much work. But doing so can be risky if sniffing packets on an untrusted network because a payload within the packets being captured could be executed on your system. To prevent that, Sniffglue sandboxes packet sniffing to provide an extra layer of security.

How To: Securely Erase Your iPhone When Selling, Trading, Returning, or Giving It Away

When it comes to give away or sell your iPhone, you can't just power it down, take out the SIM card, and hope everything will be okay. There's valuable data on your iPhone, and you need to get rid of it. Plus, if you don't perform all the necessary steps, chances are whoever ends up with the device won't even be able to use it. If you're selling it, that could ding your seller reputation.

How To: Use Business Chat on Your iPhone to Securely Interact with Companies via iMessage

Apple first announced Business Chat, a new way for customers to communicate with companies, at WWDC 2017. While Business Chat did not arrive with the initial release of iOS 11, Apple pushed it out in iOS 11.3 so companies can offer customer service in a whole new way, and it works pretty much the same in iOS 12 and higher as it did back then.

How To: Delete files securely in Mac OS X Leopard

Have sensitive data that you want to make sure you securely delete? Or maybe you're getting an external drive ready to recycle or to give to a colleague. In this video tutorial, you'll find instructions for securely emptying your trash and also securely delete the contents of an external hard drive. For more, and to learn how to remove data from your Mac computer securely, watch this video tutorial from Apple.

How To: Securely erase files on a Mac

Did you know that even after you've emptied your Mac's trash can, the data still has not been permanently removed from your system? Anyone who knew where to look could easily unearth this data. You can prevent this by using the secure empty trash option on your Mac. Whenever you put something in the trash, instead of pressing delete, go into 'finder' up top and press 'secure empty trash'. What this will do is replace the data that is left behind on your hard drive with random ones and zeros. ...

How To: Store passwords securely in Mac OS X

In this how-to, Gary Rosenzweig of MacMost.com takes a look at best practices for making and storing passwords. You should have a different password for every account, for example, use secure passwords and store them in using a security utility. Learn how to store your passwords securely with this tutorial.

How To: Wear a beret securely

In this video, we learn how to wear a beret securely. This is used to keep the beret on your head so it doesn't fly away. To do this, you will need the beret and bobby pins. First, place the beret onto your head and style your hair around it so it looks how you prefer. Next, grab your pins and place then inside the beret holes onto your hair. Use a couple of the pins to make sure the hat and hair are connected and secured tightly. When finished, move the hat slightly to make sure it is secure...

How To: Securely empty the trash in an Apple workflow

It's important to go through your computer and clear any kind of file that is not needed. This helps ensure that you have enough disk space in your computer to save other files in the future. This tutorial will show you how to create a workflow in your Mac finder send it to the trash and securely empty the trash. It's easy to do and can be done by anyone. Good luck and enjoy!

How To: Use Microsoft Excel macros securely

hether you're interested in learning Microsoft Excel from the bottom up or just looking to pick up a few tips and tricks, you've come to the right place. In this tutorial from everyone's favorite digital spreadsheet guru, ExcelIsFun, the 52.5th installment in his "Highline Excel Class" series of free video Excel lessons, you'll learn about macro security. For more information on how to use macros safely, watch this free video guide.

How To: Securely empty the trash in Mac OS X

This video tutorial shows you how to securely empty your trash in Mac OS X. 1. Click on the top Menu on your desktop. 2. From the drop down menu, choose "Secure Empty Trash". 3. You will be then be prompted with a messaging stating items will be permanently erased from your computer. If you wish to continue click the "Secure Empty Trash". 4. Depending on the amount of files, the process may take a few seconds to a few minutes.

How To: Shop securely online

This film will help you shop securely online. It has been prepared following police and Home Office guidelines. Shopping online can be more risky than shopping in person, so you will need to take a few extra precautions. Shop securely online.

How To: Remain Anonymous and Chat Securely with Cryptocat

I'm sure we've all heard about MSN and Yahoo! Messenger, right? They can be useful, but the setup can be quite time consuming for those who need to use it just once or twice—and the privacy statements are a real bother. For example, we must provide our real details. You could use Fake Name Generator, but if you get caught, you will have your account suspended. I don't have a law degree, but to my understanding the United States recently passed legislation that gives the authorities the power ...

How To: Remotely Control Computers Over VNC Securely with SSH

VNC is a great protocol that you can use on Windows and Linux machines to remotely control computers. This is useful if you need to control your computer when away from home, help your grandma check her email, or help a client with a disk cleanup. VNC is secure in the sense that it requires authentication in order to make the connection, but after that, the data is sent over the internet unencrypted. This means that an attacker could sniff your traffic and snoop everything that's going on. Th...

How To: Hang a flat screen television

As you might very well have discovered if you're here looking at this video, mounting a flat screen television is quite possibly the hardest part of the set up process. You need to get your mount securely to the wall and make sure it's in a position you like. Then there's the matter of getting the tv up there. This video will show you how to hang a flat screen.

How To: Assemble graham cracker gingerbread houses

Learn to make beautiful gingerbread houses with graham crackers. Graham cracker gingerbread houses are quicker to make than actual gingerbread houses. This is a fun and easy project to do with the kids. All you need are graham crackers and royal icing. Watch this how to video to learn how to securely assemble a Christmas graham cracker gingerbread house with royal icing.

How To: Build an Emergency Rucksack with a Poncho & Rope (The Horseshoe Pack)

There’s a good chance that you’ll be alone in life one day, and no... I’m not talking about a couch-bound, dateless loser with a pocket pussy and a bag of potato chips. I’m talking about alone. In the wilderness. Hungry. Cold. Lost. You can’t stay in one place too long, so it would be nice to have something to carry your belongings in. Maybe it’s post-apocalyptic land where you’re the sole survivor, and all the backpacks and rucksacks in the world are but mere ash. Either way, knowing this si...

How To: Remotely access your programs and computer using the Motorola Droid Bionic

The Citrix Receiver is an app that allows you to securely access your desktop and business applications directly from your Droid Bionic smartphone. You will first need to make an account at the Citrix site, and from there you can decide what you want to have access to on your phone. On the Android app launcher, be sure to pick the Citrix Receiver app so that you can login with your Citrix account.

How To: Prank Bury One of Your Friends Alive in a Box

This prank has it all. It's easy to do, requires few materials, won't cause physical harm to anyone or anything (hopefully), and will absolutely terrify your victim while amusing you for days. All you need is a securely passed-out person and a big box (flat piece of plywood optional). You cut out one side of the box so that it will cover the sleeping person like a coffin, then pound on the top to wake them. They will likely think that they have been buried alive and flip out like the guy in t...

How To: Toilet bowl train your cat

In this video, Julie teaches viewers how to toilet train their cats. This is, to clarify, training to use a human toilet. First, you will have to get your cat acquainted with toilet seats. Take a toilet seat (that is clean) and tape it securely to the top of your cat's litter box. Once your cat is used to that, buy a sitz bath (or a similar-sized container) that will fit under the toilet seat but above the toilet bowl. Fill it with cat litter and wait until your cat is comfortable with using ...

Prev Page