background preloader

Privnote - Send notes that will self-destruct after being read

Privnote - Send notes that will self-destruct after being read
Related:  solutions?

The 3 rules of a secure cell phone Big brother is coming after your phone. The government is increasingly interested in your calls, your movements, and your purchases. Don’t believe me? Think about this: you probably have your credit locked (or you should!) That’s right your cell phone is rapidly becoming the little spy in your pocket. Password protect. These days you have to remember: the more access you have to your information, the more access everyone else has to your data. Keep your various devices and services separated as much as possible to limit the damage one lost item can do to you and your family.

20 of the Sneakiest Secret Doors (list) Hidden Doors and Secret Passageways are always a cool amenity to any house. Not only does provide mystery to your living quarters, but it also allows for a bit of privacy. Hidden doors and secret passageways seem to be a popular room addition since there are numerous companies on the web who specialize in such requests, like The Hidden Door Company, Creative Home Engineering and Hide A Door. 20. This one is crazy! 19. Just because it looks like a dead end doesn’t always mean there’s nothing behind it… 18. This is the best place to keep that stack of cash or gold bars you don’t want the Uncle Sam to get their hands on! 17. This is one of the most famous hidden doors in history (at least to us). 16. Although it’s not as original as some of the other hidden doors, it still pretty cool since it looks like a real bookcase that holds all sorts of random crap, but opens to a room. 15. A hidden room under a set of stairs is definitely an unusual idea. 14. 13. 12. 11. 10. 9. 8. 7. 6. 5. 4. 3.

70 Things Every Computer Geek Should Know. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. A geek is one who isn’t satisfied knowing only the surface facts, but instead has a visceral desire to learn everything possible about a particular subject. How to become a real computer Geek? Little known to most, there are many benefits to being a computer geek. You may get the answer here: The Meaning of Technical Acronyms 1. One of the best list of default passwords. 1A. 2. If you rolled your eyes here, that is a good thing. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21.

How to protect your Facebook account from Rogue Applications A rogue application is a Facebook application developed by someone with fraudulent or deceitful intentions. The application often doesn’t perform its stated objectives. They are designed to obtain account information of the user, and they can be used to spread spam, scams or other malware to friends of the infected account. Profile Viewer AppsApps that redirect to phishing links and formsApps that lead to malicious downloadsApps that lead to survey scams The best way to guard against rogue applications is to avoid any third-party Facebook applications entirely. 1. 2. Here, you can click the Edit link to review the permissions of any apps you have installed or simply click the ‘x’ to remove them. Here you can see what Facebook data the application has access to, the last time it accessed your data, and you can set privacy settings for the application in question. It is a good idea to check these settings from time to time.

25 DIY Handmade Gift Tutorials Part 2 I love handmade gifts! I love to give them, I love to receive them, I love to make them. In our home May is a crazy month! We have Mother’s Day, our Anniversary and not just one but 2 birthdays. Gifts are in my mind! …It took me a few weeks however to put this list of handmade gifts together The reason why is because I wanted to give you 25 amazing, cute, affordable and easy gifts. Things that you would really want and love to give. Things that your friends, family and neighbors would love to receive. I hope you like them as much as I do! Mama mía! I love these DIY bracelets! I mean capital LOVE! tutorial by Blog A La Cart DIY Wooden Necklace Modern, easy, fun, colorful… I want one! tutorial by agirlwhomakes.com Oh goodness! Give this to the chef of your home! tutorial by beeinmybonnetco.blogspot.com Bottle Cap Flower Magnets What a cute idea! This would make a wonderful Mother’s Day gift. tutorial by Positively Splendid DIY Multi-Strand Scarf Be still my heart! tutorial by Rabbit Food for My Bunny Teeth source

Ophcrack How To Stop People From Snooping On You With Facebook's Graph Search On Monday, Facebook officially rolled out Graph Search to everyone on the social network. The new search engine, originally accessible to only a select group after its introduction in March, lets you search through the mountains of information the site's more than 1 billion members produce daily. Starting this week, everyone with a Facebook account can find "friends from London who like 'True Blood' " or "married people who like prostitutes." In Facebook's attempt to connect friends and friends of friends to one another, your information, now fed into a search engine, is more public than ever before. If you're irked by the the idea of strangers finding out personal details of your life with a few clicks in a search bar, there are steps you can take to ensure your privacy on Facebook. Here's what to do: First things first. Take a look at "Who can see my stuff?" Under "Who can see my stuff?" Then you'll want to check out your tagged photos. Earlier on HuffPost:

11 awesome things to make using empty wine bottles Since you're a student we're guessing you've got some empty cans and bottles lying around. Just a hunch. Well, whilst those beer cans might be a bit of a lost cause, turns out your wine bottles may be ripe for reusing. But we aren't just talking recycling here. We're talking upcycling. That's right, it's the craze that's sweeping the internet (or as a lot of people like to call it, Pinterest) and it's all about turning your rubbish in to functional, beautiful stuff. In the case of wine bottles you can make art, light and even water your garden. Freshers Fields is back for 2013! 1. Simply wash them out, soak the labels off and stick in some sweets to make a colourful, and tasty, counter filler. 2. With a bit of clay and some bits and pieces of your choosing you can turn that dull mass-produced bottle into something worthy of display. 3. Trying to find something to do with those fairy lights in the months after Christmas? 4. This one is pretty self explanatory. 5. 6. 7. 8. 9. 10. 11.

How To Crack A Wi-Fi Network's WPA Password With Reaver Your Wi-Fi network is your convenient wireless gateway to the internet, and since you’re not keen on sharing your connection with any old hooligan who happens to be walking past your home, you secure your network with a password, right? Knowing, as you might, how easy it is to crack a WEP password, you probably secure your network using the more bulletproof WPA security protocol. Here’s the bad news: A new, free, open-source tool called Reaver exploits a security hole in wireless routers and can crack most routers’ current passwords with relative ease. Here’s how to crack a WPA or WPA2 password, step by step, with Reaver — and how to protect your network against Reaver attacks. In the first section of this post, I’ll walk through the steps required to crack a WPA password using Reaver. First, a quick note: As we remind often remind readers when we discuss topics that appear potentially malicious: Knowledge is power, but power doesn’t mean you should be a jerk, or do anything illegal.

Related: