Tampering Search Results

How To: Prevent file tampering in Windows

Do you actually trust your friends to not mess around with your files when you let them check their email or get on Facebook on your computer or laptop? You should think long and hard about that. If you insist on letting anyone get access to your computer, you should check out this tip from Tekzilla. Learn how to prevent people from messing with your files. Keep your files from being deleted or renamed, and keep them secure.

How To: Predict the outcome of a coin toss when you flip

Most of the time for official coin tosses the interested party calls the result while the coin is in the air. Often, the coin is allowed to land on the ground to prevent tampering. Assuming that you are in a flipping situation where you are flipping it into your hand and calling it when it gets to the hand, it is pretty easy to guess the result accurately. This video will show you how to do so by rubbing the coin quickly to determine whether it is bumpy-side (tails) up or smooth-side (heads).

How To: Tie a Thief Knot

This video shows you how to tie a Thief Knot. This knot looks a Reef Knot to the casual observer and so can be used to determine if a thief is tampering with your belongings bag - secure it with a Thief Knot, and if you find it re-tied with a Reef Knot, you know someone has been messing with your stuff. This is used in sailing, boating, general use, camping and bondage.

How To: Change the lock pattern on my Android phone

In this video tutorial, viewers learn how to change the lock pattern on an Android phone. The lock pattern allows minimum security on the phone to prevent other people from tampering with your mobile files. Begin by going into the Settings and click on Location & security. Under Screen unlock pattern, select Change unlock pattern. In order to change the unlock pattern, users will have to type in the current unlock pattern. Now type in the new unlock pattern and press Continue. Then retype the...

How To: Open Third-Party Apps from Unidentified Developers in macOS

Apple has a built-in way to protect you from opening up potentially malicious apps on your computer in Mac OS X Lion, Mountain Lion, Mavericks, Yosemite, El Capitan, and macOS Sierra. This setting, named Gatekeeper, will never stop you from installing apps from the Mac App Store, but it could from anywhere else. If it's an app you're sure you want to install on your system, here's how to do it.

How To: Bypass File Upload Restrictions Using Burp Suite

When attempting to gain access to a server, there may come a point when you need to get around file upload restrictions to upload something. If we can find a way to get around the restrictions, then we can upload anything we want to the server, effectively compromising it. That is what we'll be doing here today, so let's get started!

News: Meet Samsung's Crazy, Innovative & Flawed Galaxy Fold

After years of rumors and waiting, Samsung's first foldable smartphone is finally a reality. The phone itself is a bit wild, but with Samsung going so far out of their comfort zone with this one, there were some bumps in the road that caused a delayed release. The launch has been pushed back yet again, but when it does hit stores, it could end up being one of the most influential devices in years.

How To: Steal Usernames & Passwords Stored in Firefox on Windows 10 Using a USB Rubber Ducky

A lot of people still trust their web browsers to remember every online account password for them. If you're one of those users, you need to adopt a more secure way of managing passwords, because browser-stored passwords are hacker gold mines. With a USB Rubber Ducky and physical access to your computer, they can have a screenshot of all your credentials in their inbox in less than 60 seconds.

Next Page
Prev Page