This video will show you how to make your own command prompt and how to use command prompts to get onto blocked sites .
Most of the spam messages are commercial advertisements, phishing websites and get rich quickly messages that asks users to provide personal details and other confidential information.Spam filters in Gmail prevent its users from these spam messages and restrict them to enter in user’s Gmail inbox.Generally, it acts like a firewall between spam messages and Gmail Inbox.Gmail filters detect the sender’s email address and accordingly send the received messages in Inbox or Spam folder.
Spam emails are emails that are sent to you without your permission. They can quickly fill up your email account if you don't do anything about it. Each email server deals with spam in a different way. Gmail is good at separating the spam for you so that you can get rid of it more quickly. It is easy to delete the spam and if you want to take it a little farther, you can get some of the spam to stop coming all together.
In this video tutorial, viewers learn how to use the Peter Answers - Virtual Tarot website. Peter Answers is a fake fortune telling website that is usually used as a prank. Begin by going to the website. In the Petition space, type in a period. A "P" will be displayed. Then type in the answer too the question and press the space bar until it spells "Peter, please answer the following question:". Then type in the question in the bottom space. This video will benefit those viewers who enjoy pla...
You want to find a message that you've sent two years ago, but scrolling is taking too long? I have a solution for this! :)
There's nothing more tedious, yet exciting, than watching surveillance cameras at work. They prey on the innocent and the unknowing. They protect businesses, workplaces, and homes. They catch criminals in the act, find hilarious anomalies, and are just darn cool when you're not the one that's supposed to be eavesdropping with them.
In this video we learn how find out IP addresses of websites and shut down the computers with those IP addresses. To do this click "start", then "run" then type command prompt. In the command prompt type "tracert website" (example tracrt Google.com) then hit enter. Various IP addresses should be returned. Then in the command prompt type "shutdown-i" and hit enter, this opens the remote shutdown dialogue. In this dialogue you can add the IP addresses and adjust the various other options then c...
QR codes allow you to quickly and easily store and retrieve data within a single image. Much like barcodes at grocery stores, QR codes are images that can be scanned to discover data, such as an online website URL. Additionally, they can also be created by inputting text data into a QR code generator. Try scanning some of the QR codes in this video with an app on your phone or tablet to see how they work!
How To: Log In and Access Blocked Websites (e.g. Facebook, Twitter & YouTube) from Work, School or Your Home Computer
You know it's crazy out there when governments start blocking social websites like Facebook, Twitter and even YouTube. But that's what happened in Egypt, when tens of thousands of anti-government protesters took to the streets on Tuesday (January 25th) in hopes of ending President Hosni Mubarak's 30 years of authoritarian power.
Many people are wondering how to change the font or the font color in Facebook chat, just to make an impact or to even distinguish the text from everyone else's.
Using a simple trace trick, you can easily look up the IP address and its location for any website. This method uses a command line command to first find the IP address of a given website, and then uses a free online tool to get that IP's location.
Nowadays many schools and colleges have blocked the social community sites from accessing them through school computers. The video shows how one can access to these sites using a command prompt.
Are you using the Internet at a school, library, or some other place that blocks or restricts web access? Mom and dad still trying to protect you from online predators, even though you're more than old enough to be one yourself? Learn how to bypass proxy servers that block access to certain websites by watching this how-to video. In this case it's done to access Myspace but this method can be used with any blocked website. Follow along with this video tutorial and never get hindered by restri...
In this tutorial, we learn how to block a website using a Linksys Router. First, go to your web browser and type in "192.168.1.1" into the address bar. After this, you will need to enter in your username and password to the pop up window. From here, go to the tab that says "access restrictions" and look for where it says "policy name". Type in 'blocked website' to the bar and then click 'enable'. From here, go down to the bottom of the page and enter in the URL of the website you want to bloc...
Ever wished you could check your cell's voicemail online? You can, for free, with the YouMail web application. In this tutorial, you'll find step-by-step instructions for signing up the the YouMail service. For more, or to get started signing up for you own YouMail account, take a look! Sign up for, and use, YouMail visual voicemail.
Many people are frustrated with how big and in-your-face the Facebook news ticker is. If you want to shorten it so that it doesn't take up so much space, try adjusting the length of the ticker with the bar that exists between it and the chat list.
This video tutorial gives you a way to access websites that you can not normally access because of a web block or filter. What you need to do is click on the ‘Start’ button and then click on ‘Run’. In the small window, type in ‘cmd.exe’; this then opens a black window. Then type in ‘ping’ and the website; this gives you an address that you type in directly to your web browser, granting you access to a normally blocked website. This comes in very handy when you are in such locations like schoo...
Attaching files to an email is way more convenient than trying to link people to third-party file transfers. Unfortunately, the standard 25MB limit is far too small to send some files, like large videos or multiple audio files.
Eager to try the Firesheep Firefox extension yourself? It stands to reason that you'll need to download and install it from its official GitHub page first. You'll find all the details, including easy-to-follow, step-by-step instructions on how to find and run the Firesheep XPI installer, in the clip. Get started capturing your friends' Facebook passwords with this video guide.
Different ways of using a proxy bypass to access blocks sites is shown with ease in this video. Many places explained to be blocked with internet security such as libraries and schools. Using a search engine such as Google you need to search for a proxy site. After a proxy site has been found you will use it to access the blocked websites through another servers internet provider. The narrator explains that proxies are just a way to bypass internet blocks by avoiding using the blocked compute...
Gmail is a free, advertising-supported email service provided by Google. Users may access Gmail as secure webmail, as well as via POP3 or IMAP4 protocols. Gmail initially started as an invitation-only beta release on April 1, 2004 and it became available to the general public on February 7, 2007, though still in beta status at that time. The service was upgraded from beta status on July 7, 2009, along with the rest of the Google Apps suite.
Consider this reason 1,001 why we love the internet: Using Google, you can hack into almost any webcam or security cam, in any part of the world and even control the webcam to move around so you can get your full panoramic shot. Don't believe us? Then check out this video tutorial to learn the steps you need to take.
Whether you are protecting your children or hiding personal information, there are ways to block unwanted websites from your computer. Follow this tutorial and learn how to accomplish this on a Windows PC easily.
Be warned before hand that by making changes your router settings that you know nothing about can damage your router. Start off by opening your internet browser and then in the address bar either type 192. 168. 1. 1 or www.routerlogin.com. A prompt will come up in which you have to fill in "admin" in the first box and "password" in the second one. Look for the "Advanced" option and under it will be "WAN", click it. Now change your "NAT filtering" to "open". Make sure that "Disable SPI Firewal...
Sick of not being able to check your email at work? Unable to check your Facebook in the school's computer lab? Do your parents have their parental controls on your computer on high? In this video, learn how to bypass work & school filter controls to unblock blocked websites.
This video describes the process of changing the audio on a YouTube video that you have already uploaded. The video is presented by Helplines.com and is in their technology series. We start out logged into YouTube and click on Uploaded Videos, then choose the video you would like to change. Click on the Audio Swap button that is just below the video. You can then choose the I'm Feeling Lucky button to have YouTube pick the audio for you. Or browse through the selections to find an appropriate...
In this tutorial, we learn how to bypass a blocked site on a school computer. You will need a proxy to do this safely. First, go to a proxy site like Proxify. Going through here will prevent the school blocking system from coming up and ruining your fun. If you are blocked, you can use a text file document and run CMD on your computer. This would be the more technological way to do it. Try doing the website first to see if it works, if not, then you can try to change the firewall on the compu...
Have you ever heard symmetrical is sexier? Yep, according to scientists, symmetry is inherently more attractive to the Homo Sapien eye. Back in the days of Helen of Troy, Phidias, Plato and other great philosophers all observed the golden ratio, "a sum where the quantities to the larger quantity is equal to the ratio of the larger quantity to the smaller one". Confusing? Let's apply it to the human face only: the features of the human head were measured in calculated, precise proportions to d...
If I'm in a hurry, sometimes I'll just turn my computer off and rush out of the house. Sometimes, I'm in the middle of a long YouTube video when I dash off, only to come back and find that my video position has been tragically lost. Hopefully I don't lose my place in that motorcycle accident compilation video when I get ba... damn it.
WikiLeaks. In recent weeks, it's been the hottest topic on the web. It's been attacked on a multinational level by political influence peddling.
Notice: This is probably not new to many people. This *IS* new for some people however, and meant for them! Post interesting cameras you find.
This is a Computers & Programming video tutorial where you will learn how to Download free stuff by hacking Google. With this method you can get movies, video, songs, software and anything else from the internet for free. Go to Google and type into the search box: intitle:”index.of”(type anything here) and search. For example, type in: intitle:”index.of”Shakira mp3. And click search. Then you will get the search results. Now you can click on Index of…/songs and it will take you to the songs i...
Google loves their little Konami Code Easter eggs. The Konami Code is famous among gamers for letting you cheat in video games. The latest one they come up with lets you try it out on Google Docs. All you have to do is open up Google Docs, and type in with the following keys: up, up, down, down, left, right, left, right, B, A, and then enter!
For Infinity Exists Full Disclosure's first Website Hacking episode, we demonstrate how to exploit a security vulnerability occurring in a website's database to extract password hashes. Sql (Structured Query Language) is a computer language designed for the retrieval and management of data in a system's database. The Attack, known as Sql Injection, manipulates Sql statements before they are sent to the Sql Server, allowing the Attacker to create, change, or retrieve data stored in the database.
In this video, we learn how to automatically clear browser cache in Internet Explorer. This will help your internet run faster and it will also help protect your computer from your personal information being store. First, open up Internet Explorer, then click on the tools drop down menu and go to internet options. From here, go to temporary internet files and click on the button that says "automatically", then adjust the disk space to use to what you prefer. After you have changed the setting...
This is a how-to ‚Äìvideo on using hydra 5.4 to crack FTP passwords. This video is intended for educational purpose only. It reveals the basics of hacking a FTP server using dictionary search technique. Here are the steps involved.
Annoy your fellow users to know end by spamming a Teamspeak server. Spam flood a Teamspeak server.
Want to know how to fix corrupted NTLDR errors without an install disc? It's easy! So easy, in fact, that this home-computing how-to from the folks at Britec can present a complete overview of the process in just under five minutes. For more information, including step-by-step instructions, take a look.
This video will guide you how to download any video from the internet through your Firefox browser. This add-on is also available in other browsers like Google chrome and internet explorer. Watch the video and follow all the steps to do it yourself.
Isn't it annoying when you sit down at a public computer and all of your favorite sites are blocked with a filter? You can use proxies to get around these blocks, but those don't always work.