Deliberately Tainting Search Results

How To: Change the video thumbnail on a YouTube video

Stuck with an unflattering video thumbnail on YouTube? Change it. Let this video be your guide. It's easy and this clip presents a complete, step-by-step overview of the process. For more information, including detailed instructions, and to get started deliberately choosing your own YouTube thumbs, take a look.

How To: Draw and fade your ball in golf

Mich Baker of Bogies to Birdies demonstrates how to draw and fade your ball in golf. To draw the ball, first set yourself up in the fairway. You want to close yourself down by aiming right down the fairway when drawing the ball. Set yourself up for a fade by deliberately using a driver. Instead of coming in to draw the ball, come out and across for the fade. When fading your ball, set yourself up so that you are really open. Aim down the left side of the fairway. To fade the ball, keep the ba...

How To: Create the Orton glow effect in Photoshop

In this video tutorial, viewers learn how to create the Orton glow effect using Adobe Photoshop. The Orton glow effect is achieved by combining a sharp image with a duplicate that is deliberately blurred or softened. The overall result is often characterized as a dreamscape, diffusion, or softening glow. It is an effect used for landscapes and portraits. This video provides voice narration and step-by-step instructions for viewers to easily understand and follow along. This video will benefit...

How To: Use height change in tango

In this tutorial, we learn how to use height change in tango. This will combine many elements of tango to change height deliberately for function and style. You do not want to change your weight and height without knowing it, because it can change how you dance and make it look completely different. Pay attention to your body and how your feet are placed on the ground. If your body weight is shifted too much to one foot it can change how you are dancing and the height of your overall self. Us...

News: Google's Camera App Is Getting a New Feature Photographers Will Love

Google Camera, the default shooting app on Nexus devices, is finally getting a feature we've been anticipating for years. As evidenced by a recent APK teardown done by Android Police, the beginnings of a new RAW capture mode have already been baked into the latest version of the app, which indicates that Google Camera will soon have the ability to store an unprocessed copy of the exact image your camera sensor captures.

How To: Block Someone from Using Their Camera During Zoom Video Calls

As a meeting host on Zoom, you can't control what a participant does during your live video call, but you do have the power to turn off their camera so that other people aren't subjected to distractions. So if you catch someone in your call purposely making obscene gestures or accidentally exposing themselves while using the bathroom, you can block their camera, as long as you know how.

How To: Use the Cowrie SSH Honeypot to Catch Attackers on Your Network

The internet is constantly under siege by bots searching for vulnerabilities to attack and exploit. While conventional wisdom is to prevent these attacks, there are ways to deliberately lure hackers into a trap in order to spy on them, study their behavior, and capture samples of malware. In this tutorial, we'll be creating a Cowrie honeypot, an alluring target to attract and trap hackers.

How To: Want to Appear Smarter? Stop Using Impressive Vocabulary

We've all been there: facing a lengthy, complex word that ignores the phonics we were taught in elementary school, unsure of not only its pronunciation, but also its meaning. These words, from autochthonous to esquamulose, are both terrifying and impressive. After all, if someone knows how to use them—and even say them—they must be quite smart. Yet before you begin stuffing every email and presentation with verbose prose, you might want to reconsider what others perceive to be intelligent.

How To: 5 Surprising Uses for Your Coffee Grinder

During my time living in dorm rooms and small apartments, I would find myself in need of many different appliances—a food processor for making hummus, a blender for vegetable smoothies, or even a mortar and pestle for muddling mojito-bound mint leaves. Luckily, there was one tiny, inconspicuous tool that solved all of these problems: the coffee grinder.

How To: Use Ettercap to Intercept Passwords with ARP Spoofing

ARP spoofing is an attack against an Ethernet or Wi-Fi network to get between the router and the target user. In an ARP-spoofing attack, messages meant for the target are sent to the attacker instead, allowing the attacker to spy on, deny service to, or man-in-the-middle a target. One of the most popular tools for performing this attack is Ettercap, which comes preinstalled on Kali Linux.

Hack Like a Pro: How to Hack Web Apps, Part 6 (Using OWASP ZAP to Find Vulnerabilities)

Welcome back, my tenderfoot hackers! Web apps are often the best vector to an organization's server/database, an entry point to their entire internal network. By definition, the web app is designed to take an input from the user and send that input back to the server or database. In this way, the attacker can send their malicious input back to the servers and network if the web app is not properly secured.

How To: Dropped Your Phone in Water? Here's How to Keep Your Wet Android or iPhone from Being Water Damaged

When it comes to busted smartphones, liquid damage ranks right up there with shattered screens as one of the most common issues owners have to deal with—as well as the most embarrassing. Thankfully, though, with the rise of waterproof phones such as the Samsung Galaxy S7 and even the iPhone 7, this is becoming less and less of a worry. But not everyone has a waterproof device.

How To: Target Bluetooth Devices with Bettercap

An incredible amount of devices use Bluetooth or Bluetooth Low Energy to communicate. These devices rarely have their radios switched off, and in some cases, are deliberately used as trackers for lost items. While Bluetooth devices support MAC address randomization, many manufacturers do not use it, allowing us to use tools like Bettercap to scan for and track Bluetooth devices.

How To: Create a Steampunk Persona

Before I really get into this article, it's important to note that you do not need a Steampunk persona (or "steamsona") in order to be a Steampunk, or wear Steampunk clothes. Some people like to pretend to be a different person when dressed up in Steampunk clothing, but that is entirely optional, and only to be done if it appeals to you. That said, even if you aren't actually acting as your character, it may still be helpful to have one in mind when putting together an outfit. Personally, I'v...

Prev Page