Stealing Search Results

How To: Open a master lock with a beer can

In this how-to video you will learn to open a master lock with a soda/beer can or an empty gift card. This can prove to be helpful, so you can prank your friends, or just steal something. Not to endorse stealing, this instructional video is for informational purposes only.

How To: Make the Best Cranberry Sauce Ever

Cranberry sauce is one of the most important side dishes to any Thanksgiving dinner—even Christmas dinner! And if you're like me, you usually buy a can of cranberry sauce for the holidays because you don't have the extra time to go homemade with the turkey stealing the show.

How To: Make a catapult out of office supplies

Looking for something fun to do with all those office supplies you've been stealing from work? Or maybe you just want to goof around in your cubicle? It's possible that you are an honest, dedicated, hard worker, but whatever the case may be- no judgement, just a video guide to making an office supply catapult.

How To: Nugget a backpack

Nuggeting is a popular craze hitting schools everywhere. It involves stealing a backpack, removing the contents, turning it inside out, and replacing the contents. The victim will soon find that their backpack has been turned in to a "nugget." This is a great prank for the school classroom. Use this as inspiration for one of your April Fools Day pranks!

How To: Prevent bad dog behavior with a kong toy popsicle

Are you sick of your dogs bad behavior? Such as chewing your furniture, bothering you while eating dinner, barking incessantly, and even stealing your slippers! Dee Hoult shows us how to properly use the 'Kong' toy to prevent all this undesirable behavior. It's simple, you just fill the toy with your dogs regular dog food, soak it with water, and put it in the freezer for 1 hour! Then you give your "Kong Pupsicle" to your dog, who will play with it for 30-45 minutes, getting the food out of t...

How To: Use Google's Advanced Protection Program to Secure Your Account from Phishing

It's easy to have your password stolen. Important people like executives, government workers, journalists, and activists face sophisticated phishing attacks to compromise their online accounts, often targeting Google account credentials. To reduce this risk, Google created the Advanced Protection Program, which uses U2F security keys to control account access and make stolen passwords worthless.

News: Uber Fires Driverless Engineer at Center of Waymo Dispute

It wasn't too long ago that Uber threatened to fire star engineer Anthony Levandowski. Eleven days to be exact. If Levandowski didn't turn over the documentation he allegedly stole from Google's autonomous car division, Uber informed Levandowski that they would take "adverse employment action." Today, The New York Times reported the ride-sharing firm has delivered on that threat. In a memo sent to employees Tuesday morning, Uber announced Lewandowski's official departure from the company "eff...

How To: Bypass Facebook's HSTS

Hey everyone, this will be a quick post. Facebook does not use HTTP Strict Transport Security (A header that tells the browser to only use HTTPS when communicating with the server) on subdomains of facebook.com. That means, if someone uses facebook in a different language, the browser will attempt to connect using HTTP first. An attacker can intercept that request and serve a different page, including a fake login one.

News: 8 Tips for Creating Strong, Unbreakable Passwords

This weekend, hackers broke into the servers of the popular shoe shopping site Zappos, giving them access to the personal information of 24 million Zappos customers. The user data taken included names, email addresses, billing and shipping addresses, phone numbers, the last four digits of credit card numbers, and encrypted passwords. However, full credit card data was not lifted, and passwords were cryptographically scrambled.

Android for Hackers: How to Backdoor Windows 10 & Livestream the Desktop (Without RDP)

The Windows 10 desktop and microphone can be livestreamed without using Remote Desktop Protocol (RDP) software and without opening any ports on the target computer. A hacker with low user privileges can monitor and exfiltrate a target's every move and private conversation in real time no matter where they are. Hackers are watching and listening, and there are few ways to protect yourself.

How To: The Beginner's Guide to Defending Against Wi-Fi Hacking

Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a few simple actions, the average user can go a long way toward defending against the five most common methods of Wi-Fi hacking, which include password cracking, social engineering, WPS attacks, remote access, and rogue access points.

How To: Timehop Breach Impacts Everyone Who's Ever Used the App — Here's How to Check What Info Leaked About You

Data breaches are all too common now, and the latest one you need to know about involves Timehop, a mobile app that makes it easy to reminisce over old photos. The breach, which took place on July 4, was revealed on Sunday, July 8. At the time, Timehop disclosed that 21 million users had been affected by the breach, but it now appears that all users were impacted in some way.

How To: Disable the 'Unlock iPhone to Use Accessories' Notification in iOS 11.4.1 & Higher

If you're on iOS 11.4.1 or iOS 12 and go more than an hour without unlocking your iPhone, an "Unlock iPhone to Use Accessories" message will appear whenever you connect your iPhone to a computer or other device that tries to use the Lightning cable's data lines. This is to protect you, but it can be annoying if you have no reason to believe that law enforcement or criminals will have access to your iPhone.