Transmitting Search Results

News: Transmitting Power... Tesla Style

Matthew Inman, who runs the popular web comic The Oatmeal, decided to test his new hand-held "Tesla Cannon" (which is essentially a small-scale Tesla coil) on one of his friends. His friend, Matt Harding, held a giant light bulb and allowed himself to be shot with the Tesla Cannon.

How To: Transmit files wirelessly on the Canon EOS 7D

You can easily share and transport your photo and videos on the Canon EOS 7D by using the wireless file transmission option. See exactly how sharing and downloading your files to computers and other devices works in this video. When the digital SLR camera is combined with the WFT-E5A Wireless File Transmitter, transmitting is easy.

How To: Become a great belly dancer

Do you aspire to not just be good, but great? In this video, get tips on how to become a great belly dancer through not only mastering the physical techniques and steps of the dance, but also transmitting positive energy to your fellow dancers and audience. Learn how to become a great belly dancer from this expert: Yasmeen began dancing at the young age of 3 and studied ballet, flamenco, folkloric, hip-hop and modern dance styles, as well as tribal fusion belly dance and Oriental Classical Eg...

How To: Secure your data with an SSH Tunnel

This new episode of Full Disclosure shows you how to use a SSH Tunnel to secure your data when you are on an untrusted LAN (ex. Coffee Shop, School's network, or Defcon). Furthermore, you can use the SSH Tunnel to bypass the LAN's internet filters. The SSH tunnel protocol works by encapsulates your data into an encrypted payload and transmitting it to the SSH Server which is setup on a trusted LAN.

How To: Send & receive files over Bluetooth on a Windows 7 PC

Interested in transmitting and receiving files via Bluetooth on your Windows 7 computer (to download pictures from your phone, for example?). This clip will show you how it's done. It's simple! So simple, in fact, that this home-computing how-to can present a complete, step-by-step overview of the process in just over two minutes. For more information, including complete, step-by-step instructions, take a look.

How To: Find Out What Personal Data Your Mobile Apps Are Leaking with Mobilescope

If you use apps on your smartphone, chances are you have no idea what those apps are doing with your information. Just this year, there have been several scandals involving apps transmitting user data, like Path uploading users' entire address books onto its servers, HTC's Security Flaw, and Brewster exposing users' personal information (even Ashton Kutcher's). A new service called Mobilescope wants to make sure you always know where—and to whom—your data is going. Lots of apps copy your cont...

How to Hack Radio Frequencies: Hijacking FM Radio with a Raspberry Pi & Wire

In our first part on software-defined radio and signals intelligence, we learned how to set up a radio listening station to find and decode hidden radio signals — just like the hackers who triggered the emergency siren system in Dallas, Texas, probably did. Now that we can hear in the radio spectrum, it's time to explore the possibilities of broadcasting in a radio-connected world.

How To: Hack Your Car's Cassette Deck into a Wireless Bluetooth Music Player

Still have an old tape deck installed in your car? This nifty hack lets you upgrade to the digital age without sacrificing your love for cassettes. There's nothing wrong with some low-fidelity tunes in your car every now and then, but if you want to listen to the tunes on your iPod or smartphone too, it's a lot easier (and cheaper) than buying a new in-dash player that supports line-in connections. Just add some wireless capabilities to you tape deck! All you need is a cheap cassette adapter,...

How To: Send Self-Destructing Spy Messages via Google Docs, Texts, and Private Links

There's really nothing safe about transmitting sensitive information electronically, but even if it gets there safely without being seen by prying eyes, there's no guarantee what happens to it once it reaches its destination. And let's face it, there are some things that you just don't want floating out there forever. So what can you do? Whether you want to send an email, a text, or a link, there are ways to send messages that self-destruct so that once they're read, they immediately vanish. ...

How To: Block RFID Signals, Build an RFID Reader Detector, and Make Custom RFID Tags

RFID chips are everywhere. They're in passports, credit cards, and tons of items you've bought in the last 5 years or so. Big retailers like Walmart started using tracking products with RFID as early as 2004, and today, they're used in everything from mobile payments to hospital record systems. Chances are, unless you're a hermit (in which case you wouldn't be reading this anyway), there's an RFID tag within a few feet of you. Photo by sridgway

How To: Target Bluetooth Devices with Bettercap

An incredible amount of devices use Bluetooth or Bluetooth Low Energy to communicate. These devices rarely have their radios switched off, and in some cases, are deliberately used as trackers for lost items. While Bluetooth devices support MAC address randomization, many manufacturers do not use it, allowing us to use tools like Bettercap to scan for and track Bluetooth devices.

News: Florida & Texas Could Become Zika Hotspots in the US

To much of the United States, Zika seems like a tropical disease that causes horrible problems in other countries but is nothing to be worried about stateside. It may make you rethink your beach vacation abroad, but not much more than that. However, if you live in Florida or Texas, the possibility of getting a Zika infection where you live is real — and local outbreaks are more and more a possibility.

Prev Page