Upsetting Search Results

Social Engineering: How to Use Persuasion to Compromise a Human Target

Social engineering makes headlines because human behavior is often the weakest link of even well-defended targets. Automated social engineering tools can help reclusive hackers touch these techniques, but the study of how to hack human interactions in person is often ignored. Today, we will examine how to use subtle, hard to detect persuasion techniques to compromise a human target.

How To: 9 Ways to Use Gatorade for Function, Fun, & Frivolity

Gatorade: its popular red flavor can stain the whitest fabric, and its sweet taste is oddly refreshing after breaking a sweat. If you've ever participated in a sport, you probably spent halftime at games and practice breaks chugging the stuff. Though it made its name as a sports drink, Gatorade is also a well-known hangover helper—but its beneficial and interesting uses don't end there. The brightly colored drink can do so much more than just hydrate you.

How To: Facebook Pulls Switcheroo on Your Email Address to @Facebook.com—Here's How to Fix It

First off, Facebook rolled out @facebook.com email addresses for everyone nearly two years ago, so that's nothing new. But what is new is that they've recently defaulted everybody's visible email address that's seen on their Facebook Timelines. So, if you had your Gmail address listed for all to see on your profile's "About" section, it's now been replaced to the default @facebook.com email address.

News: Do Cats & Boobs Belong on Google+?

While using Google+, it's been apparent that there are two types of posters. There are the people who post thoughtful, serious posts about everything from tech to dealing with cancer. And then there are the meme propagators, the people who decide to rick roll others (ahem, +Bryan Crow), and constantly put up animated gifs. Sometimes they are the same people, and this is where it gets a little controversial.

Next Page
Prev Page