Suspect Search Results

News: Police Use iPhones to ID Suspects via Face, Iris and Fingerprint Scans

Some cops already have the ability to extract data from your cell phone using handheld forensic devices, but soon police officers will have a new mobile data collection toy to play with—an Apple iPhone. Actually, it's an iPhone-based device that connects directly to the back of an iPhone, which is designed to give law enforcement an accurate and immediate identification of a suspect based on their facial features, fingerprints and even their eyes.

How To: Protect yourself & your mattress from bed bugs

In this video, we learn how to protect yourself and your mattress from bed bugs. These bugs live in your bed and hide anywhere in your home and even hotels. To see if you have them, you will see blood stains on your mattress and look on your skin for any bites you may have. If you suspect you have them, you should call a professional to help take care of the problem. Check the edges and corners of your bed to see if you have been infested with bed bugs, and look at the label as well. Be caref...

How To: Perform the "spellbound" card trick to impress friends

Andy Field shows his audience how to perform the Spellbound magic trick. The video is set up as a tutorial which means he is explaining to the viewers how the trick is performed, or in other words what his secrets are. The trick itself is fairly complex and to grasp the full understanding of the concept it is recommended that you watch the video. According to Andy, most people already suspect how he is doing the trick, but he just wants to confirm their hypothesis. The video is five minutes a...

How To: Deal with bed bugs in college

In this tutorial, we learn how to deal with bed bugs in college. There is no treatment for bed bugs, you just have to get rid of where they are living. If you suspect they are in sheets, blankets or clothes, you must wash these in extremely hot water or freeze them for 24 hours. Don't share grooming products or headphones, because these can transfer head lice from person to person. You can also get body lice that spread from clothing and feed on your skin. Pubic lice comes from sexual contact...

How To: Stop severe bleeding (British Red Cross)

Everyone gets cut every once in a while, but sometimes those cuts can be more serious than expected. It could turn into severe bleeding, and there's a certain way to deal with this type of bleeding in a victim. How would you treat someone who was bleeding severely?

How to Kill bed bugs: Bed bugs in cars

Having a bed bug infection in your car is extremely rare. However, if you suspect bed bugs in your automobile, check all of the cracks and crevices for any bed bug evidence. However, even if you don't find anything that doesn't rule out that they are there. What you can do is take your car to get fumigated. Other than that, the only thing that will absolutely kill the bugs is to let your car get very hot on a sunny, summer day.

How To: Pull Off the Greatest Cup Prank Ever

This could quite possibly be the easiest and funniest prank you could ever pull off on someone, all you need is a cup, straw, and lid. It is so unpredictable, No one will ever suspect a thing till they're completely wet. Find out how to execute this Funny prank by watching this video. Use this as inspiration for one of your April Fools Day pranks!

How To: Tie two ropes together with different knots

For those who didn't learn any knot-tying skills in scouts, or have forgotten them all now, this video demonstration shows how to do knots from basic to more advanced knots such as Sheet Bend, Fisherman's Knot, Square Knot and Thief's Knot. Knot tying is essential for camping, sailing, fishing, and even when you least suspect it. Watch this video camping and outdoor preparation tutorial and learn how to tie two ropes together with several different styles of knots.

How To: Kill bed bugs with glue boards & monitors

The CVC 3000 is a monitor. It is an active bed bug monitor that use attractants to lure bed bugs to it. It is another tool in bed bug management. It contains a carbon dioxide cylinder/cartridge. The capture slides will be trapped on a tray. The capture slides are one time use capture slides. They have to be replaced each time. The cartridge lasts 10 hours, and it has to be replaced every 10 hours. To use, you will need to place it near the area, where you suspect infestation. Just lie it flat...

How To: Detect counterfeit money

Look at the money you are receiving. Carefully inspect it for any strange colors, marks, or texture. Do not assume that a different color, texture, or design is simply a mistake made at the treasury. The bills there are all made the same based on the denomination.

How To: Prevent gas

While intestinal gas is a normal occurrence within the digestive process, it can also cause bloating, burping and flatulence. Follow these tips to remedy the problem.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 13 (Browser Forensics)

Welcome back, my novice hackers! In this series, we have been exploring how a forensic investigator can find evidence of illegal or illicit activity. Among other things, we have examined the registry and prefetch files for artifacts and have done some rudimentary forensic analysis. For those of you who are seeking career as a forensic investigator or security engineer, this can be invaluable training. For hackers, it might be life-saving.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 16 (Extracting EXIF Data from Image Files)

Welcome back, my greenhorn hackers! In many cases when a computer, phone, or mobile device is seized for evidence, the system will have graphic images that might be used as evidence. Obviously, in some cases these graphic images may be the evidence such as in child pornography cases. In other situations, the graphic images may tell us something about where and when the suspect was somewhere specific.

How to Hack Wi-Fi: Creating an Evil Twin Wireless Access Point to Eavesdrop on Data

Welcome back, my greenhorn hackers! Now that we're familiar with the technologies, terminology, and the aircrack-ng suite, we can finally start hacking Wi-Fi. Our first task will be to creating an evil twin access point. Many new hackers are anxious to crack Wi-Fi passwords to gain some free bandwidth (don't worry, we'll get to that), but there are so many other Wi-Fi hacks that are far more powerful and put so much more at risk than a bit of bandwidth.

Prev Page