Sign Search Results

How To: Tell a number story in American sign language

One of the fun and special traditions enjoyed and shared by the Deaf Community is signing stories using number or alphabet hand shapes. In these stories, various hand shapes do not stand for the numbers and letters themselves, but are used as signs or gestures to convey concepts. They are signed in alphabetical or numerical order, and used in amazing ways to sign or act out a story.

How To: Tell an American sign language abc story

One of the fun and special traditions enjoyed and shared by the deaf community is signing stories using number or alphabet hand shapes. In these stories, various hand shapes do not stand for the numbers and letters themselves, but are used as signs or gestures to convey concepts. They are signed in alphabetical or numerical order, and used in amazing ways to sign or act out a story.

How To: Use 'Sign in with Apple' on iOS 13 for Better Security & Privacy

We've all seen the login pages that allow you to log in to third-party accounts using your credentials from Facebook, Google, or Twitter. It saves you the trouble of creating another account and remembering more passwords — but it can also become a privacy and security issue, which is why Apple created the "Sign in with Apple" feature for iOS 13.

How To: Hack SAML Single Sign-on with Burp Suite

Single sign-on (SSO) lets users login across different sites without having to manage multiple accounts. I'm sure most of us appreciate the convenience of seeing "Sign in with …" buttons that let us login with a single username. Hackers, however, see a possible avenue for exploitation, and you'll soon learn how an attacker can exploit a SAML vulnerability to assume another user's identity.

How To: Understanding Signature Schemes: How Data Sources Are Authenticated, Secured, & Spoofed

One of the biggest problems in data security is authentication of data and its source. How can Alice be certain that the executable in her inbox is from the venerable Bob, and not from the not-so-venerable Oscar? Clearly Alice wants to know because if this file is actually sent to her by Oscar, the file might not be a game, but a trojan that can do anything on her computer such as sift through her email and passwords, upload her honeymoon pictures, or even turn on microphones and webcams. Thi...

Prev Page