Code Tied Search Results

How To: Apply a Halloween peacock feather MAC eye makeup look

Not all Halloween costumes have to be grotesque. This look is a pretty, nature inspired peacock feather eye, that can even be worn in a non-costume way. To create this look, use these MAC cosmetic products Studio Fix Fluid Foundation, BE Mineral Foundation, Mineralize Skinfinish Duo in "Medium Dark," NYX Pinky Blush, Bobbi Brown Shimmerbrick in "Gold," Blackground Paintpot, Mutiny Pigment, Teal Pigment, Black Tied e/s, Woodwinked e/s, Blacktrack Fluidline, Urban Decay 24/7 Eyeliner in "Zero,"...

How To: Build backyard planters

Planters or organized beds with planter borders can not only provide mowing definition, but contain the flowers and hopefully keep out weeds that may grow into them from surrounding areas. Backyard planters can be big or small, permanent or portable. The simplest planters consist of edging for flower or vegetable beds. In the past, many used recycled railroad ties for this, and they still add a distinctive rustic appeal to garden beds. In recent years, however, pressure-treated landscaping ti...

How To: Tia a rapala knot with fishing line for fishing

The Rapala Knot is the knot that the Rapala brothers recommend to use with Rapala lures. The Rapala Knot attaches the lure with a loop at the end of the line. The loop will allow the lure to move freely and naturally. The Rapala brother also emphasize that the line is attached directly to the eye of the lure without the use of a snap or swirvel. Again this is to insure a natural movement. Follow along with this HowTo video tutorial to learn how to tie a rapala loop the next time you go fishing.

How To: Do a Christina Aguilera MAC makeup look

This copper and bronze eye makeup look is great for the fall, and really adds focus and drama to the eyes. The cosmetic products used to create this look are Studio Fix Fluid Foundation, Make Up For Ever HD Powder, Emote blush, Nars Orgasm blush, Cream Color Base in “Pearl,” Painterly Paintpot, Deep Damson e/s, Coppering e/s, Black Tied e/s, Brule, Shroom e/s, Blacktrack Fluidline, Urban Decay 24/7 Eyeliner in “Zero,” Loreal Voluminous Mascara, Fleshpot Lipstick, and Bare Necessity Dazzleglas...

How To: Tie a Prussik knot for glacier climbing

Terry shows us how to set up the prussik for glacier travel. This is a demo of what to do with the ends of the prussik. Remember you have to know this knot if you are going to be a mountaineer. Terry places one on. In a real world situation he may place two on so that he has one going to the person behind him and one to the person ahead of him.

How To: Tie the gulper special when fly fishing

A parachute-style dry fly has several advantages over a standard hackled dry fly. The parachute name comes from the fly's propensity for soft, upright landings that don't spook trout. The body of the fly rides lower the surface film like a real mayfly and some people find the parachute wing is easier to see. Another important quality is that because the hackle rests horizontally on the water, parachute flies float well and also imitate mayfly spinners laying flush in the water, as well as dun...

How To: Hack Together a YouTube Playing Botnet Using Chromecasts

Imagine being able to play a video instantly on hundreds of thousands of devices across the globe. It's totally possible, as long as all of those devices have a Chromecast plugged in. When Chromecasts are left exposed to the internet, hackers can use add them to a botnet that can play YouTube videos at will. The "attack" is made even easier thanks to a simple Python program called CrashCast.

How To: Enable Monitor Mode & Packet Injection on the Raspberry Pi

The Raspberry Pi Zero W and Pi 3 Model B+ include integrated Wi-Fi, Bluetooth Low Energy, and more than enough power to run Kali Linux. They sound like perfect all-in-one penetration testing devices, but the lack of support for monitor mode and packet injection usually meant buying a supported Wi-Fi adapter. Now, it's possible to use monitor mode on the built-in Wi-Fi chip with Nexmon.

How To: 8 Passcode Tips for Keeping Hackers & Law Enforcement Out of Your iPhone for Good

There has been significant debate over law enforcement's right to access our digital devices in recent years. New tools from Grayshift and Cellebrite are popping up faster than ever to help government agencies, as well as traditional hackers, break into iPhones. If you're concerned, you can take steps right now to beef up your passcode and prevent outsiders from gaining access to your device.

How To: Exploring Kali Linux Alternatives: Set Up the Ultimate Beginner Arch Linux Hacking Distro with Manjaro & BlackArch

There's no doubt Kali has established itself as the most popular penetration distribution available. However, just because it's the fan favorite of beginners and security researchers doesn't make it right for everyone. Manjaro Linux is a beginner-friendly Arch-based distribution which can be easily weaponized with the Black Arch expansion, creating a friendlier first-time Arch experience.

Beauty & the Beast: How to Create a Belle Costume for Halloween

This Halloween, Belle costumes will be out in full force as devoted Beauty and the Beast fans represent the tale as old as time. Not only was the live-action version of the animated classic the top-grossing film of 2017 (so far), it's also likely to be a contender during awards season. If you're too swept up in all things Beauty, then a Belle costume may just be the look for you this Oct. 31.

How To: Introduction to the C.H.I.P by Next Thing Co - IoT Hacking Device?

Hello NullByte, it's mkilic! This time I'm here with the C.H.I.P from NTC. Although it is not too popular, the C.H.I.P is a brand new micro computer. It is very similar to the Raspberry Pi or Beaglebone Black. The key difference with this particular board is its cost and size. The C.H.I.P only costs $9 and measures 2.5 x 1.5 inches. In addition to this, the C.H.I.P has built in 802.11 b/g/n Wifi and Bluetooth 4.0. Considering these great specs, what could a Hacker use this for? Step 1: The In...

How-to Ruby : Simple SSH Bruteforcer

Hello fellow training hackers. I do not know if many of you are familiar with ruby, but since it is a useful scripting language, that hasn't been covered too much here on Null Byte, I thought why not do some How-tos about it now and then.

How To: Craft a duct tape tie

You have paisley ties, you have striped ties, now try a duct tape tie. Duct tape comes in a variety of colors and with the help of one of your boring old ties as and outline, you can have an imaginative new tie that you can be sure no one else has.

How To: Record and use macros in Microsoft Excel 2007

Whether you're interested in learning Microsoft Excel from the bottom up or just looking to pick up a few tips and tricks, you've come to the right place. In this tutorial from everyone's favorite digital spreadsheet guru, ExcelIsFun, the 52nd installment in his "Highline Excel Class" series of free video Excel lessons, you'll learn how to record and use macros in Microsoft Excel 2007.

How To: Manage all your passwords on your iPhone

Mike Callahan from Butterscotch describes how to manage the passwords on your iPhone by using the 1Password app. The application costs $5.99 for the Pro version. First, you enter an Unlock Code to give you access to the app. The icons across the bottom of the screen correspond to different features of the app. The Logins icon stores your login information. The Wallet icon stores information about your credit and bank cards. The Passwords icon holds all your passwords. The Add icon allows you ...