Competent Machines Search Results

How To: Make a blind hem stitch using a sewing machine

In this sewing tutorial, you'll need a sewing machine to make a blind hem stitch. The sewing machine used is a Brother LX-1325 compact and lightweight model, but you can use a similar brand and model. To make a blind stitch, you'll need to fold the fabric the way you normally would when sewing a hem stitch, then you'll pin it in place on the inside. Watch and see how it's done! Then you start sewing. This stitch will be hardly noticeable.

How To: Make ice cream

Everyone loves ice cream, no matter what age they are. So why not try making a little homemade ice cream instead of hitting up Ben & Jerry's? You'll enjoy it, and most of all, you're kids will love it. With this recipe and an ice cream maker, you can create your own sundaes, shakes and ice cream cones at home.

How To: Cut a rotor

Before cutting the rotors select a centering cone that fits about halfway through the center hole of hub-less rotor or bearing spacer to center the rotor to the spindle. After select two identical clamps that fit the rotor without interfering with the machined surfaces of the rotor. Slide one clamp onto lathe shaft, open end out Slide spring, followed by centering cone. Slide on the rotor and outer clamp followed by the bushing, spacer, and nut. Tighten nut and Install damping strap. Adjust t...

How To: Play "Know Your Enemy" on electric guitar

Playing your favorite songs by Rage Against the Machine on the guitar is not as difficult as it seems. With this tutorial you can learn how to play "Know Your Enemy" by Rage Against the Machine on the acoustic guitar. This lesson is geared towards intermediate guitarists because it assumes prior knowledge of guitar playing. Marty Schwartz covers the finger picking as well as the chord structure for "Know Your Enemy." Watch this how to video and you will be able to sing and play "Know Your Ene...

How To: Quilt a tendril or "C" background fill on a longarm

Watch this instructional quilting video to quilt a tendril or "C" background fill with a longarm sewing machine. This pattern is a simple and convenient way to create an elegant background fill on many kinds of quilts. It helps to draw the tendril pattern with pen before trying it with the longarm sewing machine. Customers love it.

How To: Use a popcorn machine

Check out this how-to video to learn the correct way to operate a popcorn machine. Make sure you always unplug your popcorn machine before you do any kind of cleaning. It will take about three or four minutes before your pop corn is finished popping. When the corn is almost done popping, grab the handle and dump the kettle. You will want to dump in twice to make sure all the popcorn has fallen out of the kettle.

How To: Hack a Pepsi Machine

Learn how to con a vending Pepsi machine and access a secret (but benign) debug menu with this hack how-to video. While this hack won't get you any free soda, you might, at the very least, impress your friends with it. For complete instructions for this simple, pushbutton hack, take a look at this instructional video!

How To: Work out your quads

This video demonstrates how to work out your quadricep muscles using a leg extension machine. The video walks you through adjusting the machine to your body type and explains how to perform the exercises correctly.

How To: Fully Anonymize Kali with Tor, Whonix & PIA VPN

Hacking from a host machine without any form of proxying is reckless for a hacker, and in a penetration test, could lead to an important IP address becoming quickly blacklisted by the target. By routing all traffic over Tor and reducing the threat of malicious entrance and exit nodes with a VPN, we can configure Kali to become thoroughly private and anonymous.

Dev Report: Machine Learning Agents Come to Unity

As we have seen previously with the likes of SethBling's Mar I/O videos and other examples, video games seem to be a great source for training AI neural networks. Augmented reality and machine learning are part of a collection of technologies that seem to be growing toward a point of maturity, and that will likely cause them to be intertwined for the foreseeable future. As developers, machine learning will definitely change the way we create software in the coming future. Instead of going lin...

How To: Hack Metasploitable 2 Part 2

In this tutorial I am going to look at what services are running on our Metasploitable machine and setup firewalls. This is more basic scanning of our machine to get an idea of how to get in. Obviously in a real engagement you would want to do research on Google and whatnot to find out as much as you can about your target but this series isn't about all of that.

How To: Use high voltages using the Wimhurst machine

In this video, we learn how to use high voltages using the Wimhurst machine. First, you must have a spinning wheel, double ended brushes, collecting combs, leyden jars, adjustable electrodes, and small metal plates. Once you connect all these together, you will notice the brushes on either side are perpendicular to each other and the wheel spin in opposite directions. Spin the wheel and then listen to the sound it makes. The plate will then charge with different electrons and create positive ...

How To: Install and run Google Chrome OS with Virtual Machine

At the end of last year Google released Chromium OS, the source code to their soon-to-be-released operating system Google Chrome OS. This has allowed millions of people to preview the new OS and make suggestions. Do you want in on that action? This video will show you how to install and run Google Chrome OS on a Mac using a virtual machine like VMWare or Virtual Box. Now you can be a part of the future of operating systems. Maybe.