Commonly Referred Search Results

News: World's Greatest Bento - Plastic Japanese Meal

Anna The Red is the greatest Bento artist I have come across on the web. She's so highly regarded she even did an ad for Google. Check it out: For those of you who don't know, Bento is a "single-portion takeout or home-packed meal common in Japanese cuisine". When bento is arranged in an elaborate style (such as people, animals, characters, plants, etc.) it is referred to as kyaraben or charaben (a shortened version of character bento).

How To: Make a Simple, Healthy and Delicious Cheese-Beer Bread

There are always those days when bread-lovers want a hearty savory bread to eat, but there isn't quite enough time to make a yeast bread. After all, yeast breads take anywhere from an hour to a full day for the first rise. Well, that's where this whole-wheat beer bread comes in! It doesn't take long to throw together and bake, but tastes delicious and is relatively healthy due to the use of whole wheat flour. If you don't like whole wheat flour, you can always substitute the same amount of pl...

How To: Bake Cape Cod lemon butter scrod

Scrod sounds good, right? This fish will satisfy your seafood craving. But wait… is scrod even a fish? No. If you're not from the New England-area, you probably would never know this, but scrod is not a fish at all. It's often misconceived as being a type of fish. However, scrod is a New England term that refers to any white fish that has been split and boned before sale, typically cod or haddock.

How To: Choose and insert bananabells for body piercings

Bananabells are very popular and can be used for most body piercings. They are most commonly used for navel piercings and ear piercings. This how to video teaches you how to insert a bananabell, and what type of bananabell will be right for you. There are many different sizes of bananabell depending on the gauge of your piercing, so make sure you know your measurement before you purchase new body jewelry. Watch this tutorial and you can be wearing a bananabell in no time. Choose and insert ba...

How To: Use sequential images to create animation in Flash 8

Flash is commonly used to create animation, advertisements, various web-page components, integrate video into web pages, and more recently, to develop rich Internet applications. In this Flash 8 video tutorial you will learn how to import sequential images. Make sure to hit "play tutorial" in the top left corner of the video to start the video. There is no sound, so you'll need to watch the pop-up directions. Use sequential images to create animation in Flash 8.

How To: Add a Non-Stick Surface to a Cast Iron Skillet

Many cooks refer to well-seasoned cast iron skillets as the original non-stick pan. A cast iron skillet is a versatile piece of cookware, going from the top of the stove to the oven with ease, provided the handle is also cast iron. The secret to a non-stick skillet is in the seasoning and cleaning process. Improper seasoning, cooking acidic foods and incorrect cleaning methods can all remove the non-stick capabilities. Achieving and maintaining a non-stick cooking surface is uncomplicated and...

How To: Tie overhand knots

Learn how to tie overhand knots from the people who make sure no rope goes untied. Actually, you probably already can since this name refers to the first step in tying your shoe! Tie overhand knots.

How To: Tie a slip knot

Also called a running knot, the slip knot actually refers to any knot that "slides" along the rope, or can be untied by pulling both ends. Watch and learn how to tie one type of slip knot. Tie a slip knot.

How To: Pick Basic Tumbler Locks

Professionally and academically speaking, I am a computer scientist, but I also enjoy lock picking as a hobby, so I thought I would share what knowledge I have with this. Before we start doing anything, first we need to understand the fundamentals of how locks work and then acquire and familiarize ourselves with basic lock-picking tools.

How To: An Entry Level Guide to Finding and Reading Logs (And Maybe Staying Out of Jail)

Big brother is watching when you're playing around on another system—and big brother is that system. Everything from operating systems to intrusion detection systems to database services are maintaining logs. Sometimes, these are error logs that can show attackers trying various SQL injection vectors over and over. This is especially so if they are using an automated framework like sqlmap that can spam a ton of requests in a short time. More often than not, the access logs are what most amate...

DIY Scientists Beware: When NOT to Use Household Chemicals for Your Projects

The only thing better than successfully pulling off a new experiment is doing it with household materials. You get to laugh in conceit as professional scientists everywhere spend all their grant money on the same project you just accomplished with some under-the-sink chemicals! However, there are times when DIY gets dangerous. Some household chemicals are not pure enough to use and some are just pure dangerous. Let's take a look at two problems I have encountered in the course of mad sciencing.

Hacking Reconnaissance: Finding Vulnerabilities in Your Target Using Nmap

Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and root boxes, you'll need to learn how to perform the necessary reconnaissance first. In fact, you will spend far more time researching your target then you will exploiting it. In this article, I am going to show you the fi...

News: Fallout Inspired underground bunker

As my in game name (TehGeekFather) would suggest I tend to like things on the Geekier side of things. Games being one of them. (duh I'm on a Forum dedicated to Minecraft) That being said I am a huge Fallout fan. (NO! not the band. <Sigh>) I'm referring to the post apocalyptic series first developed by Black Isle Studios, the roll playing game division of Interplay, back in 1997. Fallout 1 and 2 were pretty big back then open game play, being able to complete tasks in different ways depending ...

News: Advanced Cracking Techniques, Part 2: Intelligent Bruteforcing

Following the first part in this series on advanced cracking techniques, we are going to go over how we can intelligently crack passwords using the old-fashioned bruteforce method. These unique cracking techniques aren't widely used, because most crackers are Script Kiddies who have no idea what the concepts are behind cracking passwords, thus, word won't get around too quickly.

Scrabble Bingo of the Day: CABRESTA

Scrabble Bingo of the Day: CABRESTA [n/pl.] A cabresta (also cabestro or cabresto) is simply a lasso, a rope formed with a running noose that's used on ranches and Western plains for catching horse and cattle. Cabresta comes from the Spanish word halter, which refers to the headgear used for leading or tying up livestock and other animals. But halter also used to mean to hang someone by roped noose, which could be how it became popular as a term for a noosed lasso.

How To: Hack Wireless Router Passwords & Networks Using Hydra

Leaving your wireless router at its default settings is a bad idea. The sad thing is, most people still do it. Once they've penetrated your network, hackers will change your router settings so they'll have an easy way back in. This allows them to change your network into a shell or proxy so they can forward their traffic anonymously through you when committing other dirty deeds.

IndieCade: An Indie Gaming Conference and Festival All in One

On October 7th, the IndieCade Conference will open its doors to some of the most innovative minds in the independent gaming industry. The three day event located in Culver City, California includes presentations by notable indie designers, workshops, galleries, and mixers. On the following day, however, the IndieCade Festival begins. Unlike the conference, the festival includes events targeted at gamers and the general public. While a $15 wristband will grant you access to keynotes, events, a...