Executed Search Results

Tasker 101: 5 Useful Profiles to Help Get You Started with Android Automation

When it comes to automation apps on Android, Tasker is still the king of the hill. For a price of $2.99 on the Google Play Store, it's a great buy for any would-be tinkerer that would like to get into automating actions on their Android device. Then, when you consider that there's a free 7-day trial version available, there's almost no reason that you shouldn't at least test the waters with Tasker.

How To: Use SELinux Targeted Policy to Secure Your Hosts

Hackers often rely on lazy system admins and unpatched vulnerabilities to get access to a host. Keeping intruders off of our machines requires us to update daily, only run the services we need, and read the code, among other things, but we can still make mistakes. Luckily for us, we can limit the damage caused by those mistakes by running SELinux.

Coinbase 101: Fees & Fine Print You Need to Know Before Trading Bitcoins & Other Cryptocurrencies

Coinbase is the primary go-to for many users when it comes to investing in Bitcoin (BTC), Ethereum (ETH), Litecoin (LTC), Ripple (XRP), and more, due to its user-friendly interface. But before you join them, know that the ease of use comes with a price. Coinbase charges fees for each transaction, and your bank might even add charges on top of that. Plus, there is some fine print to be aware of.

Analyzing the Hacks: The Girl in the Spider's Web Explained

The latest film addition in the American-produced Millennium series, The Girl in the Spider's Web, was just released on Blu-ray a few days ago. As you could expect, the movie has many hacking scenes throughout, just like the previous English and Swedish language movies centered around hacker Lisbeth Salander. Of course, with the quick pace of some scenes, the hacks can be hard to follow.

NR30: Next Reality's 30 People to Watch in Augmented Reality in 2018

Welcome to the first annual Next Reality 30, our list of people who've made the biggest impact on the augmented reality space in the last 12 months — and what a 12-month roller-coaster ride it's been. Apple introduced ARKit-powered apps last fall, Google launched ARCore for Android soon after, Snapchat began monetizing AR, and the Magic Leap One headset finally came out. These are historic times.

Locking Down Linux: Using Ubuntu as Your Primary OS, Part 2 (Network Attack Defense)

After installing Ubuntu as your primary OS, you should have protected against USB Rubber Ducky payloads, defended against hard drive forensics, and reduced the overall attack surface against physical strikes. When defending against network-based attacks, you'll want to minimize hardware disclosures, prevent packet sniffers, harden firewall rules, and much more.

How To: Do a multiplayer glitch in Saints Row 2

xFL1PPYx has found a cool and fun way to your stomp your online opponents in "Saints Row 2". In this video he shows a cool and easy glitch. The glitch allows you to become hidden behind a wall where your enemies cannot go. All you need to do is hit the corner with your bike and if timed and executed properly (as shown in the video) you can attain this ability and give yourself that extra edge to win.

How To: Do soccer drills to maintain possesion of the ball

This is a helpful soccer video because it gives you tactics from both sides of play. Taken from a training routine from the Spanish Football Federation, the video improves your team's ability to retain possession of the ball while also breaking down offense moves in terms of what defense can do to prevent them.

How To: How Cross-Site Scripting (XSS) Attacks Sneak into Unprotected Websites (Plus: How to Block Them)

XSS stands for cross-site scripting, which is a form of web-based exploitation that uses client-side vulnerabilities in a web page to execute malicious JavaScript codes. JavaScript is referred to as "cross-site" because it usually involves an external website containing the malicious code. That code is most commonly used to steal cookies with a website that the attacker created and hosted on another server. The cookies can then be used to escalate privileges and gain root access to someone's ...

DIY of The Decade: Pixar's UP House Comes to Life

Truly spectacular and one the most breathtaking DIY endeavors to grace the front page of WonderHowTo, a recreation of Pixar's UP house was launched to an altitude of 10,000 feet in a private airfield near Los Angeles this past week. The project was executed by a team of engineers, scientists and veteran balloon pilots—(meaning, please, Do Not Try This at Home).

World’s Total CPU Power: One Human Brain

By John Timmer, Ars Technica How much information can the world transmit, process, and store? Estimating this sort of thing can be a nightmare, but the task can provide valuable information on trends that are changing our computing and broadcast infrastructure. So a pair of researchers have taken the job upon themselves and tracked the changes in 60 different analog and digital technologies, from newsprint to cellular data, for a period of over 20 years.

News: Cocktail Blueprints

Below, two different sets of schematics for mixing cocktails: the first is the "Engineer's Guide to Drinks" designed some time in the '80s; the second is a set of sleek infographics for mixing the perfect drink, from Brazilian illustrator Fabio Rex.

News: Möbius Pasta + Jell-O Jigglin' at 6200 FPS

Food is the meeting place of left and right brainers: Culinary arts call for creativity, but is also deeply rooted in the What, Why and How of basic science—baking powder vs. baking soda, the rising of dough, the falling of a cake, etc. Below, two plays on left brain principles—the Möbius strip and the law of gravity—both executed with right brain flair.