Hot Posts

How To: See Passwords for Wi-Fi Networks You've Connected Your Android Device To

You've probably connected your Android device to dozens of Wi-Fi networks since you've had it, and your phone or tablet remembers each of them. Whether it's a hotspot at home, school, work, the gym, a coffee shop, a relative's apartment — or even from a friend's phone — each time you type in a Wi-Fi password, your Android device saves it for safekeeping and easy access later.

Warning: Sensitive Info You Black Out in Images Can Be Revealed with a Few Quick Edits on Your iPhone

These days, most images we post online or share with others come from our smartphones. Whenever personal data is in them, such as debit card numbers, addresses, phone numbers, passwords, and other sensitive information, it's easy to jump into your iPhone's markup tools to black out the text before sharing. But a digital marker may not hide everything.

How To: Format a cover letter in Standard Block format

This video goes over cover letter formats, specifically in Full Block Style. Cover Letters accompany resumes in job applications. They should be sent ahead of the resume. They go over your experience, desires and objectives. The cover letter is important to both employers and employees. A human resources or HR department often receives thousands of letters that it must review before granting a job candidate a job interview or even reading their resume. This is a LIAD Production for World of W...

How To: The Easiest Way to Secretly Record Someone's Conversation with Your iPhone

Your iPhone's built-in Voice Memos app is a great way to record the audio around you, whether it be conversations, lectures, meetings, interviews, discussions, chitchat, gossip, or other kinds of talks. But if your goal is to record audio on the down-low without being noticed, you'll need to know the hidden shortcut.

How To: Properly fold a letter and look professional

From this video, learn a proper way to fold a letter professionally and place it an envelope. Basically take the letter and lay it in a flat surface, then find a spot in the paper which is almost a certain way up and then fold from bottom to that spot and crease it. Then fold from the top above the previous fold and then crease it so that it is a three fold letter. Make sure that the letter head is up when you place it inside the envelope. So that when a person opens the letter the letter hea...

HowTo: Get Paid To Be a Total Lazy Ass

Eric Abrahamson, a professor at Columbia University, writes in to Forbes on how to be the Michelangelo of work shirking. The article is intended to help managers better understand their team's lack of productivity, but it also provides 10 simple tactics for all the lazy asses out there. Introducing exhibit A, June, a total lazy ass who lasted almost a decade in her job before being laid off:

How To: CC in a Physical Business Letter

CC, which stands for "carbon copy", is a familiar phrase in email, but can also be used in business letters and legal documents. This can be especially useful for letters you want to spend up a company or organizational chain, letting each recipient know exactly who else received the same document.

How To: Find Vulnerable Webcams Across the Globe Using Shodan

Search engines index websites on the web so you can find them more efficiently, and the same is true for internet-connected devices. Shodan indexes devices like webcams, printers, and even industrial controls into one easy-to-search database, giving hackers access to vulnerable devices online across the globe. And you can search its database via its website or command-line library.

How To: Research the job market to find the best job for you

Researching the job market thoroughly and with the correct resources is important to the advancement of your career. Watching this video will establish how to research your career options, find information about companies and familiarize yourself with job titles that are a fit for the degree and/or certifications you have earned as well as your professional background. Find the perfect job today!

How To: Create a resume using PowerPoint

In order to use PowerPoint to create your resume, you will need to select "page setup", in order to change from landscape to portrait. Insert a text box in the center of the page and type your name in it. Next, click on the "format" tab. Next, select your alignment from the alignment center.

How To: Do Well on Your First Job Interview (For Students)

I know there are many students going for their first job that are new to the whole interview process. This is why I’m writing this article—to provide some tips on making your first interview experience simpler and hopefully successful. I’m currently in a university, but I had my first job when I was in ninth grade. I’ve held a few jobs and have undergone interviews many times. Sometimes they didn’t go so well, but I did learn from my mistakes. As I learned, I became better at interviews and s...

How To: Brute-Force Nearly Any Website Login with Hatch

The tactic of brute-forcing a login, i.e., trying many passwords very quickly until the correct one is discovered, can be easy for services like SSH or Telnet. For something like a website login page, we must identify different elements of the page first. Thanks to a Python tool for brute-forcing websites called Hatch, this process has been simplified to the point that even a beginner can try it.

Hack Like a Pro: How to Crack Online Web Form Passwords with THC-Hydra & Burp Suite

Welcome back, my hacker novitiates! In an earlier tutorial, I had introduced you to two essential tools for cracking online passwords—Tamper Data and THC-Hydra. In that guide, I promised to follow up with another tutorial on how to use THC-Hydra against web forms, so here we go. Although you can use Tamper Data for this purpose, I want to introduce you to another tool that is built into Kali, Burp Suite.

How To: Properly fold a letter and place it into an envelope

This video is about professional/business letter folding and mailing. Before starting this process your hands should be clean and dry so as not to ruin the look of the letter. To fold the letter correctly, you must take the bottom 1/3 of the letter and fold it upwards towards the letterhead - it should be folded about halfway to the top. Then crease the fold. Next you fold the top down and crease that fold also. To mail, you must place the lettehead, head down, face forward into the envelope....

How To: Write a chronological and functional resume

Writing a resume can be a strong asset to any job application, but the process can be stressful and confusing. With this easy to follow guide, even the most novice writer can create a professional resume with just a few short steps. Including phone numbers, education and work experience, this video tutorial takes you through different styles and forms on how to organize the perfect resume for you. It explains what each style is with simple visuals that anyone can easily follow and in no time ...

How To: Become a doctor fast

In this tutorial, we learn how to become a doctor fast. There are many ways to become a doctor, including shortcuts. The first shortcut is if you just got out of high school you can take tests that will test you on knowledge you can study on your own. Just from these you can get credits which will give you extra credit without taking all the time. You can also take summer classes that will get you ahead. If you do this, you will finish your bachelor degree 1.5 years faster. Using these tips y...

How To: Make Siri Say Whatever You Want Every Time You Connect Your iPhone to a Charger

Whenever your iPhone's on Ring mode, you'll hear Apple's iconic "Connect Power" chime every time you connect it to a wired or wireless power source, which lets you know that charging has started. There's no way to disable the sound without turning on Silent mode, but there is a way to make Siri automatically say whatever you want after a successful connection.

How To: Crack SSH Private Key Passwords with John the Ripper

Secure Shell is one of the most common network protocols, typically used to manage remote machines through an encrypted connection. However, SSH is prone to password brute-forcing. Key-based authentication is much more secure, and private keys can even be encrypted for additional security. But even that isn't bulletproof since SSH private key passwords can be cracked using John the Ripper.

How To: Permanently Delete Text Messages on Your iPhone

Deleting text messages on your iPhone may seem like a pretty simple task, but it's those really simple tasks that usually end up causing headaches later on. Data can stick around, even if you asked it not to, so there's always a slight chance that embarrassing and incriminating texts you supposedly deleted may end up in the wrong hands one day.

How To: Set Up Wireless Debugging on Android 11 to Send ADB Commands Without a USB Cable

From booting into Fastboot mode with a single command to installing mods without root access, there's no shortage of reasons to use ADB. The catch, though, you had to be tied to a computer with a USB connection. However, a new feature in Android 11 finally allows you to run ADB commands over Wi-Fi instead of being tethered.

How To: Use SQL Injection to Run OS Commands & Get a Shell

One of the ultimate goals in hacking is the ability to obtain shells in order to run system commands and own a target or network. SQL injection is typically only associated with databases and their data, but it can actually be used as a vector to gain a command shell. As a lesson, we'll be exploiting a simple SQL injection flaw to execute commands and ultimately get a reverse shell on the server.

Android Basics: How to Install ADB & Fastboot on Mac, Linux & Windows

ADB and Fastboot are probably the most essential tools for any Android aficionado. They can do everything from backing up your device to unlocking your bootloader with a few simple steps. This paves the way for many new tweaks and customizations that weren't possible before. The required platform works with the three most popular computer operating systems, too, which is good news for everyone.

How To: Find Passwords in Exposed Log Files with Google Dorks

You may not have thought of dorks as powerful, but with the right dorks, you can hack devices just by Googling the password to log in. Because Google is fantastic at indexing everything connected to the internet, it's possible to find files that are exposed accidentally and contain critical information for anyone to see.

Prev Page