How To: Make potassium permanganate with Dr. Lithium
Watch this science video tutorial from Nurd Rage on how to make potassium permanganate with Dr. Lithium with potassium nitrate and manganese dioxide.
Watch this science video tutorial from Nurd Rage on how to make potassium permanganate with Dr. Lithium with potassium nitrate and manganese dioxide.
Mr. Shane Benedict describes the delicate balances necessary to hit that perfect boof every danged time.
Pierce pencils through a bag of water without spilling a drop. No gimmicks or special tools required! This is one of the easiest tricks out there! Not to mention mesmerizing. How does that water not ooze out?!? You'll need some water, a ziplock bag and some sharp pencils.
Do you like the mohawk look but lack the commitment required to shave the sides of your head? The fauxhawk may be for you. This video will show you how to create a fauxhawk quickly and easily, making you look like a rockstar.
Blowout your hair with these hair-styling video instructions. You can easily blow dry your hair with a round brush to create that certain "blow-out" hairdo. Heather Kizi from 6 Salon shows you all the required steps to recreate this blown dry hair look at home.
A Redrock Microsystems tutorial where you'll learn what to do if your M2 adapter and your video camera don't quite align vertically. Using a process called shimming, you can correct the problem pretty easily. Not all cameras require shims, but this problem happens enough that this is useful info to know.
Assuming you have already downloaded your desired theme off of the internet, this video will show you how to load it onto your PSP. Having custom themes on your PSP makes for a more spiffy design. It allows you to break free from the default ones loaded by Microsoft. Theming your Playstation Portable is fast, easy, and requires access to a computer.
Whether you're looking to make your own comics or you just like the style, check out this how-to video and find out how to make a quick cartoon style tortoise sketch. The cartoon tortoise rendered in this video is quick to make, and only requires an ink pen, and water-soluble markers if you want to add some color. Watch this video drawing tutorial and learn how to sketch a cartoon tortoise.
Take a look at this instructional video and learn how to instsall the Xenium mod chip onto the XBox. The process is very easy to do and doesn't require soldering.
Spend some time in the kitchen with your kids and teach them how to cook. In this how to video two girls show kids how to make butterscotch brownies. This is a great brownie recipe that does not require a mixer.
Learn how to use the English past tense passive voice in this how to video. The passive voice is the form of a transitive verb, that requires both a subject and one or more objects. To make the past tense passive, use "was" or "were," depending on the subject, and then add the past participle.
This ESL how to video teaches you the use of the passive voice in the passive tense in English. The passive voice is the form of a transitive verb, that requires both a subject and one or more objects. In the present tense, the subject changes the verb "be" and then you use the past participle of the main verb. Watch this tutorial and you will be speaking English in no time.
In this yoga How-to video Kira Ryder looks at how cactus arms can help create the support necessary for forearm balance, or tail of a peacock feather. Watch and learn how the cactus arm movement can help you not only in doing the tail of a peacock pose but also in other yoga poses that require intense forearm balance.
Since sumi-e ink paintings or any sort of painting on rice paper warp the surface and create waves, they can be quite complicated to frame. The fragility of the paper is also something to take into consideration, and requires a special technique that won't tear the painting. Learn how to mount a Chinese painting or sumi-e ink drawing by watching this video framing tutorial.
This how to video shows you a great recipe for a great vodka martini. This martini may be a little controversial as it doesn't require any gin. The vermouth that is mixed in with the vodka makes it a much smoother cocktail drink.
This video will show you how you can make a blanket out of fleece with no sewing required. All you need for this blanket project is some fleece and scissors.
A long series of code is required to hack any JavaScript web page. Watch this video to learn how to hack a Java website to edit it for your pleasure.
The drag ruff is a foundational rudiment that is required to play several more advanced patterns. It's fairly basic on it's own, but is still usable in a wide variety of drumming styles.
The pataflafla is a unique drum rudiment that is sure to challenge your ability to play flam strokes. It requires that you play back-to-back flams with the same hand. This rudiment is great for drum fills and solo patterns.
Are you a new parent? Changing a diaper can look a bit complicated- see an experienced mom demonstrate the simple steps required so you'll be an expert in no time. First things first, gather all the items that you need: a diaper, any ointments or creams that your doctor may have recommended, wipes or soft towels a large towel or changing pad and some of you might want to use a changing table if that is your choice.
The only thing better than programming MicroPython is programming MicroPython over Wi-Fi. So once you set up MicroPython on a microcontroller and have it on its own power source, you won't need to use a data cable to connect to it whenever you need to interact with it, program it, upload files, or grab data.
When it comes to cybersecurity, one layer isn't enough. A complex password (or one created with a password manager) does a good job of protecting your data, but it can still be cracked. Two-factor authentication strengthens this by adding a second layer of security, giving you even more protection against online threats.
Reconnaissance is one of the most important and often the most time consuming, part of planning an attack against a target.
You may have recently seen a plethora of Instagram users, including celebrities and politicians, sharing a screenshot declaring that the platform will implement a new "rule" where it would own and could use your photos and videos however it wishes. The screenshots are part of an internet hoax, one that's been around in one way or another since 2012, but what can Instagram actually do with your media?
The PlayStation 4 has been around since 2013 and has brought with it countless game releases since then. One thing that hasn't changed, though, is the strict device restrictions on the PS4 Remote Play feature for streaming your games. The capability has always been there, but you still had to have an iPhone or Sony smartphone to get the best experience possible — until now.
The idea of squeezing your phone might have sounded a bit out there when it was new, but it's now a hallmark feature on Pixel devices. As useful as it is for summoning the Google Assistant, however, it certainly would be nice to be able pick and choose what action is triggered by squeezing the phone. Well, now you can.
For many, the stock version of Android is often considered the epitome of what the operating system should look and feel like by default. It's clean and clear of unwanted extra apps that come pre-installed with the system, provides a fluid and fast user experience, and runs on just about any device that has an unlocked bootloader to install a custom ROM with the stock version ready to go.
During the Google I/O 2019 keynote, the latest Android Q Beta was released to the public for Pixel smartphones along with 15 other non-Pixel devices. It's the third Developer Preview for Android 10, but it's the first official public beta outside of Google's Pixel smartphones. A new public beta means good things are on the way as the future of Android continues to evolve.
It's easier than you might think to hack into Wi-Fi routers using just one unrooted Android phone. This method doesn't require brute-forcing the password, a Windows OS for converting PowerShell scripts into EXE format, a reliable VPS for intercepting hacked Wi-Fi passwords, or Metasploit for post-exploitation tricks.
The idea of a perfect phone is a myth. There are lots of pros when it comes to OnePlus devices, but there are also a few things that could be better. And even if there were a phone without flaw, there are still things that you might want to customize for personal preference. That's why we set out to find the very best tweaks for OnePlus phones, and to make it easier for you to apply them.
The transcribing app can be an invaluable tool, especially if you're a student or are in a profession that relies on audio journals or interviews. These apps can convert important recordings like lectures and meetings into text for you to carefully read through to better comprehend.
If you want to use your iPhone with another carrier, all you have to do is contact the original carrier to request an unlock, which is usually granted in a few days. Unfortunately, you need to meet specific criteria to officially carrier-unlock your iPhone, like paying off the device in full and completing any contracts. But that doesn't mean there isn't a workaround you can use beforehand.
As Android bug bounty hunters and penetration testers, we need a properly configured environment to work in when testing exploits and looking for vulnerabilities. This could mean a virtual Android operating system or a dedicated network for capturing requests and performing man-in-the-middle attacks.
Most users don't realize how much valuable data is in their network traffic. With a few simple tools, an attacker can quickly pick out cookies, passwords, and DNS queries from a macOS device as it covertly streams the victim's network traffic to the attacker's system. Here, we will cover two methods for analyzing packets flowing from a Mac.
The share menu is a vital part of Android that lets you send data between between apps. Many of your favorite apps support the feature, including the new Direct Share sub-menu, which can lead to a messy share menu. However, there are a number of tools to clean up this clutter, three of which don't require root.
Many operators use elevators to control access to particular floors, whether it be the penthouse at a hotel or a server room in an office building. However, the law requires them all to have a fire service mode, which gives emergency access to restricted floors, and a hacker can use that to bypass security altogether.
The conversation of which operating system is most secure, macOS vs. Windows, is an ongoing debate. Most will say macOS is more secure, but I'd like to weigh in by showing how to backdoor a MacBook in less than two minutes and maintain a persistent shell using tools already built into macOS.
| Update: ZTE's issues with the US government have finally been resolved. Check out the details below.
Security-minded users can reduce the risk of phishing by enabling Advanced Protection on important Google accounts, requiring a U2F security token to log in. Using these keys isn't intuitive on most popular smartphone platforms, and you can find yourself locked out if you don't plan ahead. You'll need to learn and practice using U2F keys on your device before enabling this layer of security.
As with most social media platforms, Instagram can be a double-edged sword. On one hand, it's a great way to share and express yourself — but on the other, it can be just as effective at compromising your privacy. Thankfully, there are a few things you can do to protect yourself.