Spawned Search Results

How to Play Assassin's Creed 2: Bonfire of the Vanities (DLC)

Assassin's Creed 2 was so popular of a game, that it spawned not one, but two downloadable content expansions, for both the Xbox 360 and PlayStation 3 versions. The first DLC was called The Battle of Forlì, and the second, Bonfire of the Vanities. This video game walkthrough focuses on the latter, in 1947 Florence, Italy, where the mass burning of sinful objects is an everyday event.

How To: Hacked Portal Gun Prop Actually Levitates a Companion Cube!

Portal, the popular game from Valve, has been critically acclaimed since its release in 2007. Its unique gameplay and humorous storyline is the reason for its popularity amongst nerds everywhere. This has also spawned a large community in cosplay and prop design. The most popular aspect of the game has to be the awesome portal gun. The gun creates companion portals on almost any surface that allow the player to jump form place to place with ease and also allows you to move heavy objects with ...

How To: Get Root Access on OS X Mavericks and Yosemite

Hello all! In this tutorial, I'd like to show you one way of getting root on OS X. Check out this GitHub page for a recent privilege escalation exploit that was recently discovered. I've tested it and it works on both OS X 10.9 Mavericks and OS X 10.10 Yosemite, but appears to have been patched with OS X 10.11 El Capitan. If you check out the file main.m you can see where most of the magic is happening. This source code can very easily be changed to make it do more than just the system("/bin/...

How To: Geek Up Your Holidays with These 10 Nerdy DIY Christmas Tree Ornaments

One of the more enjoyable parts of Christmas (other than opening gifts of course) is going out to find the perfect tree, struggle bringing it into the house, and decorating it. As the years went by, I realized that our tree looked exactly like every other tree in the neighborhood: the same lights, the same angel at the top, and the same red, green and white ornaments.

How To: Seize Control of a Router with RouterSploit

A router is the core of anyone's internet experience, but most people don't spend much time setting up this critical piece of hardware. Old firmware, default passwords, and other configuration issues continue to haunt many organizations. Exploiting the poor, neglected computer inside these routers has become so popular and easy that automated tools have been created to make the process a breeze.

How To: Escape Restricted Shell Environments on Linux

The moment arrives when you finally pop a shell on the web server you've been working on, only you find yourself in a strange environment with limited functionality. Restricted shells are often used as an additional line of defense and can be frustrating for an attacker to stumble upon. But with enough patience and persistence, it is possible to escape these restricted environments.

How To: Breakdance

The popularity of breakdancing waned by the late 1980s, but has been recently rediscovered by a new generation of dancers who perform in professional competitions. While taking breakdance lessons might seem to violate the very ethos of the “streets” movement which spawned the genre, no one will ever know you learned the basics of breakdancing in a free online video course. Our expert dance instructor demonstrates the foundations of up-rocking, popping, locking, the six step, and power moves l...

How To: Do Breakdancing

While taking Breakdance lessons might seem to violate the very ethos of the “streets” movement which spawned the genre, no one will ever know you learned the basics of Breakdancing in a online video course. Expert dance instructor Julie Urich demonstrates the foundation of toprock, downrock, and power move steps you’ll need to ensure you don’t “get served” during your next battle.

Prev Page