Competent Machines Search Results

How To: Vote with an electronic touchscreen voting machine

See how to vote in York County in PA by watching this video tutorial. With the new touchscreen electronic voting machines in Pennsylvania, you'll need to check out this video to make sure your ballot gets counted. So, if you want to get out this year and vote for Hillary or Obama, then make sure you do it right, don't screw up! This video is a must for you old folks with no computers skills at all, so get up to date and vote electronically in your county election.

How To: Wash bras and panties

The most used and most washed articles of clothing are undergarments. Underwear, specifically bras and panties, are in desperate need of attention after each and every use. They're not like a pair of jeans, wearing them twice in a row is not a good idea, nor clean. Shabby’s not chic when it comes to lingerie. Use a little extra care to keep your lace and silk bras and panties looking good.

How To: Antique your own paper

Aging paper is a great way incorporate learning about antiquities from the past while doing a fun hands on project in the classroom. It's easy and really adds something special to projects or even to do just for fun in your spare time.

How To: The Genius Way to Track Down the TikTok Song Stuck in Your Head

Songs new and old are given a fresh purpose through the TikTok meme machine, but it can be tricky to figure out where a track originally comes from. Sure, you can tap the name of the song to see the source on TikTok, but if it were a snippet uploaded by someone other than the track's creator, the song title likely wouldn't be listed. Luckily, there is an easy way to figure it out.

Exploit Development: How to Learn Binary Exploitation with Protostar

Being able to write your own hacking tools is what separates the script kiddies from the legendary hackers. While this can take many forms, one of the most coveted skills in hacking is the ability to dig through the binary files of a program and identify vulnerabilities at the lowest level. This is referred to as binary exploitation, and today we're going to check out a tool known as Protostar.

Hacking Pranks: How to Flip Photos, Change Images & Inject Messages into Friends' Browsers on Your Wi-Fi Network

Networking is built largely on trust. Most devices do not verify that another device is what it identifies itself to be, so long as it functions as expected. In the case of a man-in-the-middle attack, we can abuse this trust by impersonating a wireless access point, allowing us to intercept and modify network data. This can be dangerous for private data, but also be fun for pranking your friends.