Actual Connections Search Results

How To: Play corn hole

Check out this instructional video that will teach and demonstrate how to play corn hole. What is corn hole? Corn hole is a game in which players take turns pitching small bags filled with corn (or sand or beans) at a raised platform with a hole in the far end. These platforms are usually plywood sometimes plastic and either all white or decorated with a team name or any other custom creation.

How To: Use camera stabilization equipment

In this episode, we dive into the expensive, or, at the least, tedious realm of camera stabilization equipment. This ranges from the all-powerful, all-knowing fluid tripod head, to the much used and often abused dolly. We don't own and operate an actual Steadicam or a jib or a crane, but hey, we'll mention them, too.

How To: Make custom shaped CDs and DVDs

This instructable aims to show you how to cut any type of disk to a desired shape. It is particularly useful in cutting down cheap 12cm DVD-+R 's into more expensive (can be up to 10 times more) 8cm DVD-+R disks. The technique shown here works with all disk types. The video below shows us cutting a music CD into a heart shape, and also illustrates the basics of cutting 12cm disks into 8cm ones. The actual cutting of a disk (and the guide) can be seen here:

How To: Use Ettercap to Intercept Passwords with ARP Spoofing

ARP spoofing is an attack against an Ethernet or Wi-Fi network to get between the router and the target user. In an ARP-spoofing attack, messages meant for the target are sent to the attacker instead, allowing the attacker to spy on, deny service to, or man-in-the-middle a target. One of the most popular tools for performing this attack is Ettercap, which comes preinstalled on Kali Linux.

How To: Use SSH Local Port Forwarding to Pivot into Restricted Networks

SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port forwarding, secure file transfer, and more. Using SSH port forwarding on a compromised host with access to a restricted network can allow an attacker to access hosts within the restricted network or pivot into the network.

News: Proof-of-Concept HoloTire App Shows How Much People Are Going to Love Shopping in Mixed Reality

We've already seen plenty of shopping potential for mixed reality headsets, from holographic car showrooms to trying on clothes and picking out furniture. Very few of those ideas have been put into actual practice, but we're getting closer, and consulting firm Valorem is making headway. They created HoloTire for the Microsoft HoloLens to demonstrate the advantage of experiencing a product in mixed reality. I'm hard-pressed to think of a more boring product to put on a holographic pedestal tha...

Real Scenarios #1: The New MacBook

You're at your friend's house. All you've heard about all day is his new laptop. He's got a brand new top-specced MacBook Pro, and he won't stop going on about it. It particularly annoys you as all you've got is a 4 year old cheap laptop, even if it is running Linux.

How To: Get VPN Connection

This how-to is for everybody who faced the problem of intercepting personal data sending through the Internet and is looking for fast and secure method to protect his activity in the global network.

News: Actual iPhone 6 Leaks Confirm Previous Leaks Were Spot On

Over the weekend—just days before Apple's big event—an actual iPhone 6 leaked on Chinese site cnBeta. Again, nothing here that we already didn't know about—Sapphire screen, round(er) corners, larger display, and new button stylings. Below are images of the new iPhone 6 next to the current iPhone 5S. We can clearly see the protruding camera module as well as sections on the top and bottom of the back where the antennas will be housed. A second source was able to put together some videos, as yo...

How To: Make a braid to fluorocarbon knot connection

There's a popular new trick in the fishing community and that's tying a braided line to a fluorocarbon leader line. To do this, you'll need to know the proper knot, and this video will show you how to do it. With this method you will reduce some of the problems of twisting and tangling with using braid right up to your lure. Check it out. The braid helps absorb some of the pull on the line, so see if you can feel it when you go to land the big one!

How To: Tether and use your MetroPCS phone for internet access

This video will show you how to tether your Samsung Messager 2, (the MetroPCS phone) to your PC to use as a modem for internet access. This will allow you to use your cell phone as your internet connection point, meaning you'll connect to the net for the cost of your cell phone's data plan. You will need your Samsung USB cable, a PC with Windows 2000 or higher, all current drivers for your phone and PC, and you will also need to head here to get the Samsung PC Studio program. This is part 1 o...

How To: Untether a tethered jailbroken iPhone 4, iPod Touch or iPad

If your iPad, iPhone 4 or iPod Touch is already on a tethered jailbreak, this is the tutorial on the new Redsn0w release for all you experienced users. An untethered jailbreak is a type of jailbreak where the device does not require rebooting with a connection to an external jailbreak tool to power up the iDevice. Jailbreaking allows users to get root access to the command line of the operating system, to download otherwise unaccessible extensions and themes, or install non-Apple operating sy...

How To: Replace the side view mirror on a Nissan Altima

Someone has just smashed the side mirror off your perfect Nissan Altima that you parked on that busy road you know you shouldn't have parked on anyway, so now it's up to you to repair it— unless you want to pay an overpriced mechanic, who will charge you for parts, labor, and whatever else he thinks he deserves. If you're up for repairing your side view mirror by your lonesome, for cheap, then this video by Richpin will show you the exact steps required to fix your Nissan Altima's side mirror...

How To: Find the IP address and subnet mask of your computer

It's good to know the IP address of your computer. With this information, you can track your computers usage online, and will also know how to change it if you want to surf unnoticed. This tutorial will show you exactly how to find the IP address of your PC, so you will never be lost again. There are a number of programs that require your IP address, for example if you are setting up an external device like an XBox live to your Internet connection, you will need to make sure the IP address is...

How To: Listen to music with your whole body

In this soaring demonstration, deaf percussionist Evelyn Glennie leads the audience through an exploration of music not as notes on a page, but as an expression of the human experience. Playing with sensitivity and nuance informed by a soul-deep understanding of and connection to music, she talks about a music that is more than sound waves perceived by the human ear. She illustrates a richer picture that begins with listening to yourself, and includes emotion and intent as well as the complex...

How To: Tether an iPhone 3G to Windows XP using 3Proxy

This is a nifty tutorial guide on how to tether your hacked iPhone or iPhone 3G to a windows computer for use as a high speed modem. Just Jailbreak your iPhone using one of the many tutorials on WonderHowTo, and install 3proxy. This video explains the rest of the configuration steps required to properly tether an iPhone 3G in Windows XP so that you can use its EDGE or 3G internet connection on your PC, for free.

How To: Use offline iPhone apps

Watch this iPhone video tutorial to learn how to save those iPhone Web apps so you can use them even when you have no connection. This how-to video will help you learn how to use offline iPhone applications like a pro in no time. Perfect for new iPhone owners.