Report Phishing Search Results

SEToolkit: Metasploit's Best Friend

If you read my last tutorial on using SEToolkit, you probably know that SEToolkit is an effective way to make malicious actions look legitimate. But, that was only the beginning... the truth is, Metasploit and SEToolkit belong together, and help each other very well.

How To: Create & work with pivot tables (PivotTables) in Excel

Whether you're interested in learning Microsoft Excel from the bottom up or just looking to pick up a few tips and tricks, you've come to the right place. In this tutorial from everyone's favorite digital spreadsheet guru, ExcelIsFun, the nth installment in his "Highline Excel Class" series of free video Excel lessons, you'll learn how to create and work with pivot tables (PivotTables) in Microsoft Office Excel. Specifically, this video covers the following topics and examples:

How To: Make your school reports or papers look longer

This subtle trick will lengthen your school report without your having to write a single extra word. Learn how to extend the length of your papers with this simple video. You will need a paper and flexible ethics. The trick is to enlarge the font of all the periods in your paper! Fact: If you have a 16 page, 12 point paper, changing the periods to 14-point will stretch the paper to 19 pages!

How To: Use Samsung Health to Diagnose Symptoms from the Privacy of Your Phone

You really can't go wrong with Samsung Health when it comes to staying on top of fitness-related data. Its features help you keep track of workouts, track calorie and nutrition intake, and monitor your heart rate, just to name a few. And if you start exhibiting symptoms you've never had before, you can even use the app to find out more about what's wrong with you.

How To: Use U2F Security Keys on Your Smartphone to Access Your Google Account with Advanced Protection

Security-minded users can reduce the risk of phishing by enabling Advanced Protection on important Google accounts, requiring a U2F security token to log in. Using these keys isn't intuitive on most popular smartphone platforms, and you can find yourself locked out if you don't plan ahead. You'll need to learn and practice using U2F keys on your device before enabling this layer of security.

How To: Block Apps from Logging Your Data on Android

With root access, you're granted greater control over your device, allowing you to do things that your Android system wouldn't allow otherwise. Things like installing Xposed mods are made possible with root, but other advantages address performance and security, like stopping your Android logging, which is exactly what we'll be going over today.

How To: Use imperatives or reporting verbs in English speech

In this tutorial, we learn how to speak English: Imperatives or reporting verbs. Imperative sentences are sentences like "open it!", where you are asking someone to perform an action. You can also say this in a nice fashion, asking "please open it". There are many different forms of imperative sentences, which include: commands/orders, directions, instructions, requests, and warnings. All of these different types of sentences are asking someone to do something, just changing up the way they d...

How To: Monitor social network activity with Net Nanny

Danny with Top Ten Reviews will show you how to monitor social network activity with the Net Natty program. This will be helpful for monitoring social networking accounts on websites such as Facebook and MySpace. First, open Net Nanny. Go to the dashboard and select Additional Settings under Filtering. With this section, social networking sites that have been used on the computer will be listed. You can check whichever account you want to monitor. Under the dashboard, go to Reports and select...

How to Speak English: Reported speech with conditionals

In this tutorial, we learn how to speak English with conditionals. Conditional statements need special attention and usually start with the word "if". An example of a conditional statement is "if you want, we'll go out to dinner". This has two parts, a condition, and a result. The condition is expressed by "if". To report them, don't change the verbs unless you're dealing with a real condition. Look and see if verb tenses can change depending on how the sentence is structured. Try to remember...

How To: Get credit when you have no credit

In this video, we learn how to get credit when you don't have any. Most credit agencies are now gathering information about younger people to figure out if they are allowed to get credit cards, which will help them build a credit score. There is a website, PRBC, where you can start a file and enter your information, and it can verify all the information you report. This information will be given to credit reporting agencies, and give you more of a chance to get credit. Next, you can get depar...

How To: Prepare homemade jerky

JerkyRecipe.net provides a short preview of their online step by step video instruction and report on how to make beef, deer, or venison jerky. This homemade jerky can be made right in your own oven using 15 secret ingredients and by following step by step instructions which can be found in both the online video and printable report, all available for immediate use. A glimpse of what this delicious homemade jerky looks like can be seen in this preview video, offering up a tasty jerky recipe f...

How To: Eliminate Unwanted Texts & iMessages on Your iPhone to Avoid Spam, Scams & Phishing Attacks

Next to spam calls, few things are more annoying than being inundated with spam, scam, and smishing texts. Your iPhone's Messages app should be a place for your friends and family to stay in touch, not a minefield of phishing attacks, malicious links, and viruses. Luckily, there are quite a few methods to block and report your way to a more spam-free iPhone.

News: Predictions for the New Year

infosecinstitute posted a handy article about what to expect in the new year for cyber security, along with highlighting major game changers from 2015; 2016 Cyber Security Predictions: From Extortion to Nation-state Attacks - InfoSec Resources.

How To: Automatically Delete Spam Messages in Gmail

Most of the spam messages are commercial advertisements, phishing websites and get rich quickly messages that asks users to provide personal details and other confidential information.Spam filters in Gmail prevent its users from these spam messages and restrict them to enter in user’s Gmail inbox.Generally, it acts like a firewall between spam messages and Gmail Inbox.Gmail filters detect the sender’s email address and accordingly send the received messages in Inbox or Spam folder.

News: Hacker Points Out iOS Security Flaw That Allows iPhone Text Spoofing

Security researcher and iPhone hacker pod2g has brought attention to a flaw in Apple's iOS that allows the user to change the reply address of an SMS message. This bug has been a part of the iPhone's SMS since the first iPhone in 2007, but Apple has yet to address it. Basically, there's a section in the text payload called User Data Heading (UDH) that controls some advanced features, one of which is the reply address. By changing the reply address of a text message, you can make someone send ...

How To: Input values & formulas into a cell in Excel macros

This video shows how to enter values into cells using Excel macros and Visual Basic. This includes a sample Expense Report that is used in this demonstration. In this demonstration, we will create the macro that inputs a title as "Expense Report", Three columns i.e. "Date", "Item" & "Amount", and the summery field as "Total Expenses", as well as the formulas located at the respective cells. Now, we're going to use two keyboard shortcuts i.e. "Alt + F11" to open-up the VBA window and "Alt + F8...

How To: Generate a visual report in Microsoft Project 2010

In this clip, you'll learn how to visual data with charts and graphs in MS Project 2010. Whether you're new to Microsoft's popular project management application or are just looking to better acquaint yourself with the Project 2010 workflow, you're sure to benefit from this free video software tutorial from Lynda. For more information, including detailed, step-by-step instructions, take a look.