Conspicuous Search Results

How To: Get rid of a hickey

Ah the hickey, that red badge of passion! So spontaneous! So exhilarating! So erotic! So now what are you going to do to hide your love mark? This how-to video will show you what to do with an unwanted hickey. To make your conspicuous hickey less obvious you will need a spoon, freezer, comb, quarter, lipstick, pencil with erase, concealer, and a hot wet facecloth. With these tools your hickey is sure to disappear.

How To: Con a bartender out of $20 with a magic trick

Learn how to pull an awesome con in the bar with magician Brian Brushwood. Brian Bushwood is an American magician known for his bizarre magic and bar tricks. Watch this instructional video from Scam School to learn this con/magic trick. This magic trick is a sweet con. All you need is a bartender, a $20 bill, a pint glass, a lighter, a napkin, and a friend. You'll impress your friends with the sheer magic of it, and be $20 ahead.

How To: Replace the grommet strips on a tennis racket

Take a look at this instructional video and learn how to replace your bumper guard/grommet strips. This should be done for a number of reasons. One reason is if the bumper guard has worn through and you are now hitting graphite when you scrape it on the ground. Another is if the grommets are coming apart and the string has a chance at touching the frame. Or if you wish to add lead tape in a more conspicuous manner, replacing the strips and guards will help.

How To: Exploit DDE in Microsoft Office & Defend Against DDE-Based Attacks

In our previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when an MS Word document is opened. Because Microsoft built DDE into all of its Office products as a way to transfer data one time or continuously between applications, we can do the same thing in Excel to create a spreadsheet that runs malicious code when opened. The best part is, it will do so without requiring macros to be enabled.

How To: Prevent Snoops from Accessing Private Messages, Photos, Videos, & More on Your Nexus 7

My friends can be pretty shitty sometimes, but they're my friends nonetheless. On various occasions, they've secretly taken my device and made me look foolish by posting crude and embarrassing posts to Facebook, Instagram, or Twitter. With friends like these, who needs enemies, right? And it's because of these types of friends that we need to substantially upgrade the app security on our devices.

How To: Select a Field-Tested Kali Linux Compatible Wireless Adapter

When hacking Wi-Fi networks, having the right wireless adapter is essential. But hunting online for one can be a frustrating experience. To see how the handful of Kali-compatible adapters on the market measure up, I ran a series of tests to benchmark and compare their range, signal strength, and ability to enter monitor mode and perform packet injection. This should help you determine which adapter is right for your own hacking needs.

How To: Create a Wireless Spy Camera Using a Raspberry Pi

Surveillance is always a useful tool in a hacker's arsenal, whether deployed offensively or defensively. Watching targets yourself isn't always practical, and traditional surveillance camera systems can be costly, lacking in capabilities, or both. Today, we will use motionEyeOS running on a Raspberry Pi Zero to create a small, concealable Wi-Fi connected spy camera that is both affordable and easily concealed.

How To: The Easiest Way to Secretly Record Someone's Conversation with Your iPhone

Your iPhone's built-in Voice Memos app is a great way to record the audio around you, whether it be conversations, lectures, meetings, interviews, discussions, chitchat, gossip, or other kinds of talks. But if your goal is to record audio on the down-low without being noticed, you'll need to know the hidden shortcut.

How To: Install shoe molding

If you have hardwood floors in your house, take a look at your baseboards. Right in front of the baseboards there is usually a smaller, curved molding about ¾” tall. How does this short molding look? Is it painted over, chipped and/or just beat up in general? If so, you can easily replace this molding and make a huge difference in the overall appearance of your room. And, it is fairly easy to do.

News: Hide Your Secret Stash with a Completely Invisible Redstone Trigger

Are you looking to hide your chests in a not-so-conspicuous way, but don't know where to start? Do you want to finally have that safe and sacred place to store your diamonds, cake and beloved treasures? This tutorial incorporates this previous week's challenge on transforming houses. If you weren't able to participate in last week's challenge, you will still be able to get a feel for what everyone did!

How To: Detect Facebook Spam

Spam is everywhere and Facebook is no exception. In fact, spammers are constantly stepping up their game by tricking unsuspecting Facebook users to participate in quizzes, games, apps, or "new features" that are actually dangerous computer viruses, spyware, or other trojan horses in disguise. Their attempts even trick people into unknowingly becoming spammers themselves.

Next Page
Prev Page