Fragile Search Results

How To: Pack Household Goods Effectively

When the time comes to move home, the logistics of moving your belongings can easily become tiresome, tricky and even disastrous. However, with a little careful planning and foresight, the act of packing can be a simple process. The key to getting the most from your move is in efficiency, planning and care. Here, we take a look at the best ways to pack in order to ensure a safe and simple move.

How To: Inflate Any Ball Without a Pump or Needle

What happens when you find your ball deflated and there's no pump or needle in sight? You could always cancel your plans of kicking around the soccer ball or starting that pickup football game in the park. Better yet, you could be terribly clever and find another way to get air into the ball. From a pen to a balloon to a gas station, there are ways to inflate it.

How To: Use U2F Security Keys on Your Smartphone to Access Your Google Account with Advanced Protection

Security-minded users can reduce the risk of phishing by enabling Advanced Protection on important Google accounts, requiring a U2F security token to log in. Using these keys isn't intuitive on most popular smartphone platforms, and you can find yourself locked out if you don't plan ahead. You'll need to learn and practice using U2F keys on your device before enabling this layer of security.

How To: Scan, Fake & Attack Wi-Fi Networks with the ESP8266-Based WiFi Deauther

The price of hacking Wi-Fi has fallen dramatically, and low-cost microcontrollers are increasingly being turned into cheap yet powerful hacking tools. One of the most popular is the ESP8266, an Arduino-programmable chip on which the Wi-Fi Deauther project is based. On this inexpensive board, a hacker can create fake networks, clone real ones, or disable all Wi-Fi in an area from a slick web interface.

How To: Set Up a Headless Raspberry Pi Hacking Platform Running Kali Linux

The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, broadcast an FM radio signal, and apparently even fly a goddamn missile into a helicopter.

Coming Sept. 12: iPhone XS, XS Max & iPhone XR — Everything We Know So Far About Apple's 2018 Lineup

The iPhone X was released in November 2017, and the iPhone 8 and 8 Plus dropped right before it, but the hottest news right now revolves around the 2018 iPhone releases. The rumor mill regarding the iPhone X's successor started churning out speculations on names, cameras, display size, and more almost immediately after last year's devices, and there have been many new leaked details since.

How To: Android CyanogenMod Kernel Building: Monitor Mode on Any Android Device with a Wireless Adapter

Hi, everyone! Recently, I've been working on a pretty interesting and foolish project I had in mind, and here I'm bringing to all of you my findings. This guide's main aim is to document the process of building an Android kernel, specifically a CyanogenMod kernel and ROM, and modifying the kernel configuration to add special features, in this case, wireless adapter Alfa AWUS036H support, one of the most famous among Null Byters.

How To: Knit a Lacey Eyelet Rib Pattern

There are not many stitches that are more beautiful than this LACEY EYELET RIB STITCH. And, there are few that are easier. Most knitters are apprehensive about knitting any lace patterns, and truthfully, many are difficult because of so many rows. This one, however, consists of only 4 rows. You can use either side of the work and it is a lovely stitch to know. You can use it for a beautiful scarf or for just about anything for a baby. I've made many baby sweaters and blankets using this stitc...

How To: Maintain your PC

Heat, moisture, dirt, static, and fragile electronics are only some of the many PC dangers that can ruin your PC. Watch this video and get some great tips on how to maintain your Personal Computer Maintain your PC.

How To: Clear an obstructed airway on a child or infant

Use the abdominal thrust technique on a child with an obstructed airway. Infants are more fragile. Put the infant face down on one arm and rest your arm on your thigh. Administer 5 back blows between the infants shoulder blades. Turn infant over and administer 5 chest thrusts in the middle of the sternum. Repeat until airway is clear. Clear an obstructed airway on a child or infant.

How To: Install a post-form countertop

There are many different types of countertops, but of all those available, post-form countertops are probably the quickest and easiest to install. Post-form countertops consist of a laminate surface that is glued to a particleboard base. Typically, the base is shaped so that there is a curved front edge and an integrated backsplash with either squared off or 45-degree angle ends available.

News: Welcome To My Nightmare

Cyriak's latest animation features '50s stock footage remixed into a horror show. Our dark and twisted animator keeps churning them out, each creepier than the last. Be warned: "a journey into horribleness, not recommended for the faint-hearted or fragile-minded..." More by Cyriak:

How To: Train your dog to be around a baby

Train your dog on how to act around babies. Make your dog understand that a baby is not a toy but a fragile thing. These steps will show you just how to do that and ensure you have a safe and happy family. Train your dog to be around a baby.