Access American Search Results

How To: Do shoulder exercises using cables

Use cable weight machines for shoulder exercises. Learn tips and techniques for working out the chest, back, shoulders, and arms in this weightlifting video. Take action: work anterior and lateral deltoids by pulling handle straight up to side, but don't lock elbows, raise arms straight out to the front. Lance is certified personal trainer through American Fitness Association of America. He graduated from UNC with a biology degree and currently works for a gym. He specializes in weight traini...

How To: Do back isolation exercises

Isolate muscles in the back with some simple exercise methods. Learn tips and techniques for working out the chest, back, shoulders, and arms in this weightlifting video. Take action: isolate back muscles with feet wider than shoulder-width, and bring weight down to hips but don't lock elbows. Lance, the instructor in this how-to video, is certified personal trainer through American Fitness Association of America. He graduated from UNC with a biology degree and currently works for a gym. He s...

How To: Do back compound exercises

Work out multiple back muscles with compound exercises. Learn tips and techniques for working out the chest, back, shoulders, and arms in this free weightlifting video. Take action: grip handles on the outsides, cross legs, bring chin to top of the bar, and return slowly, but don't swing legs. Lance, the instructor in this how-to video, is certified personal trainer through American Fitness Association of America. He graduated from UNC with a biology degree and currently works for a gym. He s...

How To: Use Wiki Server in Mac OS X

Whether it's a small business or a work group inside a large corporation, all members need access to the same materials in order to work effectively. Mac OS X server makes it easy for groups to collaborate and communicate through their own Wiki-powered Internet website. To learn how to use Wiki Server with Mac OS X Server, watch this video tutorial.

How To: Execute an iso-lateral bench press for weight training

Have you tried working out with an isolated lateral bench press? Iso-lat bench presses are an essential part of lifting weights and strength training. This fitness how-to video tutorial demonstrates how to do an isolated bench press to strengthen the upper body. Learn tips and techniques for working out the chest, back, shoulders, and arms in this weightlifting video.

How To: Do a chest fly exercise on a weight machine

Have you tried a chest fly on a weight machine? Both a weight machines and a chest fly are an essential part of lifting weights and strength training. This fitness how-to video tutorial demonstrates strengthening the chest with flies on a machine. Learn tips and techniques for working out the chest, back, shoulders, and arms in this weightlifting video.

How To: Play "Big Legged Woman" by Freddie King on the guitar

Do you dream of standing on stage in front of millions of fans with a guitar in your hand? You can make this dream come true, if only you could play the guitar! This guitar tutorial series from Robert Renman teaches you the basics of guitar playing along with a few beginner and intermediate techniques. You can learn how to play a a great Freddie King song "Big Legged Woman" with this guitar lesson. Freddie King, also known as the "Texas Cannonball" was a very influential American blues guitar...

How To: Add makeup to models in Photoshop

In this tutorial Lindsay Adler will teach you how to add makeup to your models in Photoshop. Sometimes you do not have access to a makeup artist, or after the shoot decide you want a splash of color. Lindsay will teach you to add makeup in a few quick steps in Photoshop.

How To: Fold a prize-winning origami SST paper airplane

To make this origami SST paper airplane, begin with a square. The origami SST (supersonic transport) was designed by Dr. James Sakota. The plane was first featured in the 1960's book The Great International Paper Airplane Book, a documentation of the Scientific American first International Paper Airplane Competition. It won first place for origami/nonprofessional. This plane flies excellently in a fast, long distance glide! Learn how to make the origami SST paper airplane by watching this ins...

How To: Hack a weak WPA wireless network

This video tutorial presents instructions on hacking a weak Wi-Fi Protected Access, or WPA, wireless network. To follow along, and replicate this hack yourself, you'll need knowledge of the deauthentication, or DeAuth, process. For more information, and to get started hacking WPA networks for yourself, watch this hacking how-to.

How To: Make a Peruvian macramé bracelet

Add a little South American flavor to your wrist by learning to make your own Peruvian bracelet. You'll need some heavy string and some macramé skills to craft your own Peru-style bracelet, but trust us—it's not hard. Just follow along with the video and see how easy it is.

How To: Browse Privately & Securely with This VPN

If you're looking to improve your browsing experience, then a VPN is the right way to go. If you're tired of censored or geographically blocked sites and wary of companies selling your data, then a good VPN can be your answer to a problem that limits every aspect of your experience online.

How To: Root Apps Not Working with Magisk? Here's What to Do

It's the icing on top of your cake (or whipped cream on top of your Android Pie) of despair. You may have not had the easiest time rooting your device, but you feel like you overcame all of the obstacles. Only now to discover that those very apps and mods you were rooting for still won't work — and the signs point to a lack of root access. Don't lose hope, because we have some tricks up our sleeve.

How To: Use SSH Local Port Forwarding to Pivot into Restricted Networks

SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port forwarding, secure file transfer, and more. Using SSH port forwarding on a compromised host with access to a restricted network can allow an attacker to access hosts within the restricted network or pivot into the network.

How To: Create an Evil Access Point with MitmAP

The threat of an evil access point has been around for a long time, and with the rise of open public Wi-Fi, that threat is often overshadowed by how comfortable we are using third-party Wi-Fi hotspots at coffee shops and public spaces. While we've shown an evil twin attack using the Aircrack-ng suite of tools, MitmAP is a Python tool to configure custom APs for many types of wireless attacks.

How To: Protect Yourself from macOS High Sierra's Glaring Empty-Password Security Flaw

There's a new macOS vulnerability that hackers within physical reach of your computer can use to gain root access to your system and accounts. Just by using "root" as the username and a blank password on a privilege escalation prompt, someone can install malware on your computer, access hidden files, reset your passwords, and more. Root access gives them the ability to do anything they want.

Snapchat 101: How to Turn On Ghost Mode for Snap Map to Keep Your Location Private

Snapchat recently updated their Android and iPhone apps with a new feature called Snap Map which lets you share your current location with other Snapchatters, as well as see their current locations. It may sound like an interesting new feature, but sharing your exact location with all of your Snapchat followers is dangerous, to say the least. Luckily, it's easy to turn this feature off.

How To: Use a Misconfigured SUID Bit to Escalate Privileges & Get Root

Gaining access to a system is always exciting, but where do you go from there? Root or bust. Sure, a compromised host is a great way to run a botnet, or do some other boring, nefarious thing—but as hackers, we want root. We also want to take the easiest path possible, search out low-hanging fruit, and exploit them. SUID programs are the lowest of the low-hanging fruit.

How To: Bring Desktop Gadgets to Windows 10

The concept of desktop gadgets has been around for quite some time, and Microsoft officially introduced them in Windows Vista to much fanfare. Desktop gadgets offered the ability to view various information at a glance, play mini-games, and more. Unfortunately, Microsoft decided to kill this beloved feature after Windows 7, citing security reasons.