In this video tutorial, viewers will learn how to sweat pipes. The materials required for sauntering the sweat pipes are: M-APP gas, gauge, solder, solder paste, pipe cutter, brillow and copper pipes. Begin by cutting the copper pipe to a desired size. Then brush some plumber flux onto the copper pipe and hold it in place with a clamp. Now use the M-APP gas to move the flame around the pipe to allow it to suck in the solder. This video will benefit those viewers who are interested in plumbing...
Do you have a fashion emergency? Are you out and about and your zipper just gave in? If you have a skirt that is falling apart as you wear it, or are camping and need to fix a sleeping bag at the last minute, check out this tutorial. In it, you will learn how to repair zippers with no tools or supplies. This is also useful if you do not know how to sew but want to avoid spending money on a tailor. So, don't sacrifice your favorite garments to broken zippers anymore, with this video learn how ...
First you need a TR9 screwdriver. Take off battery cover and with a flat head screwdriver take off the little sticker in the bottom of the place where you put the battery. Take your TR9 screwdriver and remove all the screws from your controller, the last screw it's covered behind the sticker you have just removed. Take a screwdriver and press the back off your controller to remove one side of it. Don't press to hard or you will break the controller. Push the side you have pressed with the scr...
In this video tutorial, viewers learn how to perform a headstand. Begin by going on the knees. Then put your hands down in a crawling position. The hands should be shaped together as a triangle. Now put the head on the floor and push up with the toes. Once up, make your body as straight as possible. This video will benefit those viewers who want to learn how to headstand for things such as: break dancing, yoga or gymnastics.
To take apart the controller you will need a Torx t8 screwdriver and a Philips head screw driver. There are 6 obvious screws on the back of the controller and there is one hidden and one behind the bar-code in the battery compartment on the back. Remove all of the screws, push down on the right and left triggers and pull the controller apart. Pull the board apart and don't worry you won't break anything unless you are really rough. Remove the rest of the buttons, they come out just by pulling...
The handyman in this video teaches viewers how to repair a broken leg of a kitchen table chair. To make these repairs all that is needed, other than the chair, is a liquid nail, a small nail screw, turpentine and screw driver. The handy man in the video makes this repair look easy and in expensive, which is a great alternative to having to purchase a new kitchen chair. He not only explains how to make the repair but how the repair works and why it is effective.
YouTube user diabeticHOWIE instructs you on how to enable MMS (Multimedia Messaging) for your iPhone 3G or 3GS. He claims that this may not work for the first generation iPhone. Using his step-by-step tutorial, you will be able to send multimedia messages to your friends and family.
Aerating your soil is an essential part of gardening, but it can be long and back-breaking work. In this episode of Growing Wisdom, Dave Epstein will teach you how to use a broadfork to aerate your soil. Using a broadfork, you can aerate the soil without damaging the soil's ecology.
If you're curious about how things work, or need to open up your Xbox 360 hard drive, be sure to check out this video. This video will also show you how to reassemble your hard drive after disassembling it. Keep in mind that opening up the Xbox 360 hard drive will break the warranty, meaning you won't be able to send it in to Microsoft for free assistance. It's recommended that you work on a desk to ensure you don't lose your screws.
This truck repair video shows you how to remove the bed from a Chevrolet C1500 W/T truck. This needs to be done to fix certain problems, in this case the fuel lines. Whatever reason you need to remove the bed from your Chevy, this video shows you how to do it properly.
Cuffs can make or break a fashion design, and illustrating cuffs well helps a designer sell a collection. Learn how to draw cuffs for fashion design from a pro designer in this free fashion illustration video series.
The Shim Sham Shimmy, Shim Sham or just Sham is a particular tap dance routine. This four part how to video teaches the four moves to the Shim Sham dance. Learn how to do the Shim Sham, the Push and Cross, the Tack Annie, and the Half Break with these tutorials. Follow the steps in this video and you will be dancing the Shim Sham in no time.
If you've got a bobby pin and pair of handcuffs lying around, check out this video to learn how to modify your bobby pin to break into most locks. Using handcuffs, you can mold the tip of the bobby pin to allow the ability to open up things such as handcuffs and other locks.
In conclusion to our back to school week, Rob and Corinne are showing you how to take an old mens suit jacket and magically transform it into a backpack. So now it's time to raid uncle Ned's closet for an old sports coat, break out the scissors and start sewing. Be ready to go back to school with your own hand made backpack.
This video conning tutorial from someone who has seen too many episodes of MacGyver shows how to break into a Masterlock with the help of a handy Swiss Army knife. Watch this video demonstration and learn how to pick a padlock with a Swiss Army knife. You may not be MacGyver, but will the tips from this instructional video and a little bit of practice, you can learn how to pick a lock like him.
This video conning tutorial shows how to pick a dead bolt lock. You will need a tension wrench and a lock pick, in this case, one made from a hacksaw. Watch this video demonstration and see how easy it is to break into even the most secure seeming of locks, the dead bolt.
Learn how to take care of business when your copier or scanner breaks down.
Every day we pass bridges, whether it's a foot bridge, a highway overpass, a span over water, or a viaduct over a valley. We pass on these structures without even thinking of the engineering genius that went into their design and construction, let alone the science behind their strength.
Disney's animated film Toy Story 3 beat all expectations at the box office, and is now the highest-grossing movie of 2010 in North America and second worldwide. Can Disney Interactive Studio's Toy Story 3: The Video Game match the success? Who knows, but no matter how successful it is, it's still a fun game full of animated delight, and this Mahalo video walkthrough series will show you the entire gameplay for the game on the Xbox 360.
Watch this video to learn how to make a tasty snack made from simple ingredients. Peel potatoes; should they have any sprouts remove them. Cut each potato into 2 or 3 pieces. Chop onion finely. Cut horizontally several times; repeat procedure vertically. Chop cabbage into fine, narrow pieces. Place cut potatoes into a pot full of water while adding some salt. When water starts to boil reduce heat a bit. Check potatoes for tenderness and at that stage remove water. Replace pot onto burner. Usi...
Compromised uTorrent clients can be abused to download a malicious torrent file. The malicious file is designed to embed a persistent backdoor and execute when Windows 10 reboots, granting the attacker remote access to the operating system at will.
With a tiny computer, hackers can see every website you visit, exploit services on the network, and break into your Wi-Fi router's gateway to manipulate sensitive settings. These attacks can be performed from anywhere once the attacker's computer has been connected to the router via a network implant.
Magic Leap has done a great job of aggressively releasing new apps, software updates, and major franchise tie-ins. But aside from all the creative and entertainment apps, what's it like to use one of the apps the company hopes you'll use every day?
With just a few taps, an Android phone can be weaponized into a covert hacking device capable of running tools such as Nmap, Nikto, and Netcat — all without rooting the device.
Most companies have services like employee login portals, internal-only subdomains, and test servers they would prefer to keep private. Red teams and white hat hackers can find these obscure and often vulnerable services using a tool designed to help protect users from fraudulent certificates.
Nmap is more powerful than you know. With a few scripts, we can extend its functionality beyond a simple port scanner and start to identify details about target servers sysadmins don't want us to know.
The easiest way around a security policy is to find users who don't follow it. The Have I Been Pwned database identifies accounts with information breached by major third parties like Yahoo and LinkedIn. With Maltego, hackers can locate breached accounts created using company email addresses, potentially giving attackers access to a company account if the employee reuses a compromised password.
After a hacker has configured Metasploit on a remote private server, created a resource script for automation, and created a simple payload, he or she can begin the process of remotely controlling someone's Windows 10 computer with just a few moments of physical access — even if the computer is off.
Your smartphone stays with you everywhere you go, so it's only a matter of time before you spill coffee all over it or drop it on the ground. For some of you, it has already happened, perhaps even multiple times. That's why we thought it was important to find out which flagship phones are the most life-proof.
Welcome back, everybody. In the previous article, we covered the ideas and concepts of well-known ports and trust exploitation in order to evade a firewall. Today, we'll be building the shell, the part that receives commands, executes them, and sends the output back to the attacker.
With T-Day on the horizon and approaching rapidly, you are probably in one of two camps. The one that is eagerly awaiting the holiday feast with barely-contained drool. Or the one that involves breathing heavily into a paper bag while worrying about your lack of oven and stovetop real estate, while also bemoaning the lack of multiples of you to get all the prep work done.
Welcome back, my hacker novitiates! In the previous two posts in this series, we looked at the basics of buffer overflows. In this post, we will look at one technique for finding buffer overflows. We will try to send random, oversized, and invalid data at a variable to see whether we can make it crash or overflow. This process is known as fuzzing. It is often the first step to developing an exploit, as we need to find some variable that is susceptible to overflowing.
Welcome back, my rookie hackers! As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be able to crack passwords and encrypted protocols such as SSL and wireless, you need to at least be familiar with the concepts and terminology of cryptography and encryption.
Hello again, faithful readers. For today's lesson, we will be learning the correct way to restring and tune an electric guitar. I almost wasn't going to post this because it is so basic. But, as with many basic tasks, there are a lot of people who know how to do it, but can't really do it right. If you are a new guitarist, this is an essential piece of maintenance work, because guitar shops usually charge way too much for this task. Of course, I'm kinda cheap, so even 5 bucks is too much for ...
The new Medal of Honor video game is out for the PlayStation 3, Xbox 360 and Windows, and if you happen to have yourself the Xbox 360 version, check out this extensive video walkthrough series. It takes you through the entire gameplay for Medal of Honor— all 10 missions. Make your way through modern-day Afghanistan and eliminate all of the Taliban forces.
You wait forever to dye your hair because you can't afford the costs of hair dye products. This video will show you a way to dye your hair on time without breaking your wallet. The secret? Kool-Aid and food coloring. Watch to see the transformation from natural black hair to a color of your choice.
This is a video teaching how to freestyle rap using three rules. The first rule is to freestyle all the time. Freestyle by yourself. Listen to some beats by yourself in your room with the first thing that comes into your mind. The second thing is to make sure it flows. Do not stutter. Keep practicing until it comes out smoothly. The third rule is do not stop rapping. In other words, don't take breaks for weeks or months otherwise you will get rusty. It will take time to get good at it again i...
Here are a few tips and setting suggestions when getting started with your Canon PowerShot. This is a very portable and user friendly, point and shoot digital camera that has a few neat tricks up it’s sleeve so experiment and have fun.
Want to break some glass? If you don’t quite have the vocal range you’re hoping for you can try holding a heavy object while singing. This should get you to tighten your throat and vocal cords which will produce a higher pitch sound.
This how-to video describes how to properly write a cover letter. It explains that a cover letter is a separate selling point from the resume when applying for a job. The cover letter should only be about two-thirds of a page long and can easily be broken into three parts. Part one includes a brief introduction, what you are applying for, and a quick thank you for your time. The second part is the body where you explain why you are the right person and right fit for the job. The third and fin...