Code Tied Search Results

How To: Tie fringe onto a quilt

This video quilting tutorial shows an easy way to attach fringe onto a quilt. Tied thread fringe is a great way to add simple decoration and definition to a quilt. Learn how to tie fringe onto a quilt by watching this instructional video.

How To: Develop applications for the Apple iPhone

This is a lengthy, detailed series on iPhone development, for which you'll need an Intel-based Mac computer, running Mac OS X 10.5 (Leopard) or higher. Then, before you actually get started developing for the iPhone, you'll need to register as a developer with Apple. Then, you'll need to download Xcode and the iPhone SDK. Once you have all this, you can start developing iPhone applications!

How To: Properly break in a baseball glove

This video gives you four steps on how to properly break into a baseball glove. If a glove isn’t correctly broken into, it may affect a player’s performance. The first step is to condition the leather, softening it by adding either glove oil or cream. Remove any excess oil with a paper towel. Make sure to repeat this step throughout the year. The second step is shaping your glove by placing a ball where you would normally hold a baseball and then tying two large bands around the glove in ...

How To: Change the nylon strings on a classical guitar

In this Music & Instruments video tutorial you will learn how to change the nylon strings on a classical guitar. Take the peg winder and unwind all the old strings. Then unravel all the strings from the bridge. Make sure the bridge doesn’t fall off. Take a new string and insert the finished end in to the sixth hole passing it from the hole of the guitar towards the end of the body. Then tie a knot and pull the string tight over the bridge as shown in the video. Now pass the unfinished end o...

How To: Make a lucky star from folded paper with origami

A demonstration on how to make a lucky star from folded paper with origami is shown in this video. For this you need to get a strip of paper. Attractive papers are available at the stores for this. First to start up take an end of the strip of paper and tie a knot, flatten it and bring it as close together as you can. Then with the small free end fold it in, flip it over fold the long free end in such a way as it gets a pentagon shape. Next flip the free end over the edges. Continue to turn i...

How To: Build a durable bottle rocket using common items

Benson Trenh and Mark Norris show viewers how to build a bottle rocket using common household items. To build this creation you will need tape, a hole puncher, scissors and string. Also use a black plastic bag, or any color, for the parachute! Cut the black plastic bag into a square, any size you would like! Next, take the square and punch a hole at each edge of the square and string the string through the hole tying a knot. You should now have the parachute! For the body of the rocket, get a...

How To: Swim a proper freestyle

New techniques may improve a swimming pool workout from Masters coach Nancy Kirkpatrick Reno. Before sticking a toe in the water, consider this advice: * Swim in a pool that's at least 20 to 25 yards long; those pools can usually be found at high schools and some gyms. A 50-meter Olympic-size pool is best, but not everyone has access to that. "If you're going to become a lap swimmer," Kirkpatrick-Reno says, "you can't go any shorter or you'll be constantly turning." An outdoor pool is prefera...

How To: Code a Dead Man's Switch in Python 3 to Encrypt & Delete Files Whenever You Don't Check In

A dead man's switch is a fairly simple concept. If you don't perform a specific task before a set amount of time, it'll perform a specific action you set. They can be handy not just for hackers but for everyone who wants to protect themselves, someone else, or something tangible or intangible from harm. While there are more nefarious uses for a dead man's switch, white hats can put one to good use.

How To: Force Android 10's Gestures to Work with Any Custom Launcher

One vital part of Android 10's new navigation system is the "QuickStep" gesture. Swipe up from the bottom of your screen, then pause. You'll see your recent apps along with a dock containing a handful of icons for quick access. This dock is provided by the phone's launcher, which means your home screen is now integrated into the multitasking UI. So what happens if you change your home screen app?

How To: Block Apps from Accessing Your iPhone's Camera to Prevent Privacy Invasions

The camera system on the iPhone has never been better. Apple's iPhone 11, 11 Pro, and 11 Pro Max sport some of the best shooters on the market. But no level of quality makes up for the fact that shady apps can access your cameras for nefarious reasons. You can take control of the situation, however, and block any app you want from using your rear and front-facing cameras.

How To: Program MicroPython NeoPixel Holiday Lights to Animate However You Want

Individually addressable LEDs, also commonly called "NeoPixels" after the popular Adafruit product, are a bright and colorful way to get started with basic Python programming. With an inexpensive ESP8266 or ESP32 microcontroller, it's easy to get started programming your own holiday lighting animations on a string of NeoPixels with beginner-friendly MicroPython!

How To: Make Android 10's Dark Mode Turn on Automatically at Night — No Root Needed

Android 10's new dark mode is a pleasure to behold for longtime users. Ever since OLED panels became widespread, we've been clamoring for the feature. But now that we have it, there's a new problem: it doesn't turn on automatically based on time of day. Thankfully, a simple app can turn dark mode into a true night mode.

How To: Automate Wi-Fi Hacking with Wifite2

There are many ways to attack a Wi-Fi network. The type of encryption, manufacturer settings, and the number of clients connected all dictate how easy a target is to attack and what method would work best. Wifite2 is a powerful tool that automates Wi-Fi hacking, allowing you to select targets in range and let the script choose the best strategy for each network.

News: The Galaxy S10 Is IP68 Water-Resistant — Here's What That Really Means

When it comes to resistance to the elements, Samsung seems to believe in the old saying "if it ain't broke, don't fix it." They've carried over the IP68 rating under IEC 60529 that was first found on the S8 all the way to their tenth-anniversary flagship, the Galaxy S10. While this certainly sounds great on paper, it's natural to want to dig a little deeper and find out what the rating means.

How To: Transfer Your Authy Account to a New Phone

One of the main reasons Authy was able to top our list of the best two-factor authentications apps was its ability to transfer access to a new device. This feature ensures that whenever you get a new phone, you don't lose all your tokens. However, if the process is done incorrectly, you can leave your account vulnerable.

How To: Use MDK3 for Advanced Wi-Fi Jamming

You may have heard of a signal jammer before, which usually refers to a device that blasts out a strong enough radio signal to drown out the reception of nearby devices like cell phones. Purpose-built jammer hardware is outright illegal in many countries. Still, Wi-Fi is vulnerable to several different jamming attacks that can be done with Kali Linux and a wireless network adapter.

Hacking macOS: How to Steal Signal Conversations from a MacBook with a USB Rubber Ducky

Developed by Open Whisper Systems, Signal is a free, open-source encrypted communications app for both mobile and desktop devices that allows users to make voice calls, send instant messages, and even make video calls securely. However, a vulnerability was recently discovered for the desktop version that can be turned into a USB Rubber Ducky payload to steal signal messages with a single click.

How To: Hide DDE-Based Attacks in MS Word

In a previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when a Microsoft Word document is opened. The biggest challenge of this attack is that it requires getting the user to agree to a pop-up prompt. Fortunately, since I posted that article, many new obfuscation techniques have been discovered to make this easier. Today, we explore and combine some of them to make the ultimate hidden DDE attack.