Concept Hat Search Results

News: Winners of Mad Science's Sugru Contest

Thanks to everyone who submitted ideas in last month's Mad Science contest. The question called for your best idea for using Sugru, a temporarily malleable silicone modeling clay that self cures for a soft-touch permanent bond. It's a marvelous product for at-home quick fixes and for even making some cool DIY bumpers and grips for your electronics. William scoured through all of the comments and chose the two winners he felt best deserved a pack of Sugru.

How To: Play rock drum beat patterns

The rock drum beat is an intricate drum pattern that incorporates the hi-hat, snare and bass drum. Learn some tips for playing various patterns of the rock drum beat from an experienced drumming instructor in this free music lesson video series.

How To: Install nitro clutch shoes on a remote control vehicle

Installing clutch shoes is very simple. What you need are the clutch shoes, clutch shoe installation/removal tool which costs about $5 or a flat tip screwdriver. First, line up the clutch shoe. Plastic shoes wear out faster. Aluminum last longer. With the screwdriver method you bend the spring out. Take the bent out spring and push it down. Push it straight down. This is not the authors favorite method. Using the clutch shoe installation tool, simply push the spring out and push straight down...

How To: Use the movable NU in biblical Greek

In this how to video, you will be introduced to the concept of a movable NU in Greek as well as have the Greek accent marks summarized. The movable NU is used at the end of Greek texts in the present active indicative third person plural form. The movable NU is comparable to the English article "a" or "an". This lesson in perfect for those who wish to study this ancient language of Greece. Watch this language tutorial and you will be speaking biblical Greek in no time.

How To: Use SSH Local Port Forwarding to Pivot into Restricted Networks

SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port forwarding, secure file transfer, and more. Using SSH port forwarding on a compromised host with access to a restricted network can allow an attacker to access hosts within the restricted network or pivot into the network.

How To: Draw a Michael Jackson sketch

Michael Jackson, the King of Pop, has changed the way audiophiles listen and create music. He's a very influential part of everyone, whether they know it or not. Pay tribute to the King of Pop by drawing a skillful sketch of him and his signature dance. DragoArt has this video tutorial on how to draw a Michael Jackson sketch. Get more detailed instructions on the step-by-step cartoon drawing here.

How To: Do reggaeton beat sequencing

In this video series, learn how to sequence Reggaeton beats on a Korg Triton keyboard. Our synth expert, Ryan Larson, will explain the basic sequencing process step by step, including how to use samples, setup and create loops, choose and add effects to tracks, record instruments like a thumping bass drum, crisp hi hat cymbals, tight snare hits, and other percussion, add bass lines, keyboard melodies and horns, how to mix tracks, and even how to play the sequencer for a live performance.

How To: Make an Elf costume for Christmas

Our holiday expert Matt Cail will show you how to make your very own elf costume, starting with the undergarments and tights, then on to the shoes, gloves and familiar elf hat. He also includes tips for elf makeup, ideas for the kind of presents elves like to give, and even tells you how elves are supposed to behave.

How To: Create a simple "less is more" flower arrangement

Flower arrangements bring color, life and mood to everyday life or a special occasion and the best part is you can make these bouquets yourself. The flower god will show you some of the ideas and an example using sunflowers for balanced table centerpieces. You will want to choose a main flower and several supporting pieces of foliage and flowers to increase depth and interest to your spread. The meaning concept is balance and accent. This video shows a minimalist, three vase approach for a ch...

How To: Give an effective Swedish back massage

You start the Swedish back massage first by putting lotion in your hands to warm it. You first use long fleeting strokes and work your way into shorter spinal column strokes (remembering of course to keep even pressure). You then move to the petrissage stroke running your hands smoothly interchanging the openness of your fingers alternately all across the back. You then go back to work on the trapezes remembering to push outward from the spinal column. The video also brings up the concept of ...

How To: Solve square roots in algebra

In this lesson we will learn about one of the most important concepts in algebra SQUARE ROOTS. The square root of a number m is another number n that satisfies the following formula: m = n x n. You can also say that m is the square of n. The opposite of squaring a number is finding its square root. You can use the radical symbol to indicate that the square root of m is n:

How To: Get some mime practice exercise

Mark Wenzel pioneered the concept of mime performances at theme parks, becoming the resident mime at Sea World of San Diego, where he entertained more than a million visitors a year for eight years. Now he trains mimes for all of Sea World's aquatic parks. He shows you some practice exercises in this video series.

How To: Get Started with Python with This One-Hour Course for Just $14.99

If you have information technology or computer science aspirations — even white hat hacking — then Python is a programming language you absolutely have to be familiar with. According to a recent survey of industry experts, Python is the fastest-growing language in the developer field. It's also one of the most sought-after skill sets among employers and is responsible for some of the best hacking tools.

How To: Get Root Filesystem Access via Samba Symlink Traversal

Samba can be configured to allow any user with write access the ability to create a link to the root filesystem. Once an attacker has this level of access, it's only a matter of time before the system gets owned. Although this configuration isn't that common in the wild, it does happen, and Metasploit has a module to easily exploit this security flaw.

How To: Use Metasploit's Timestomp to Modify File Attributes & Avoid Detection

It is said that the best way to avoid detection when hacking is to leave no trace, and often that means not touching the filesystem at all. But realistically, in most cases, it's impossible not to interact with the filesystem in one way or another. The next best thing to do to throw off any investigators is to change the file attributes to hide activity. We can do this with Metasploit's Timestomp.