Connecting People Search Results

How To: Make poi and hold them

We often get emails asking us about poi, how to make them, how to hold them, etc. We had such a great crew of people gathered in Thailand, we decided to Show our Poi. If you're looking for ideas for practice poi or fire poi, you've come to the right video.

How To: Make homemade pizza

Fresh-made pizza is much easier to make than most people realize. Learn how to prepare your own pizza dough and top it with your favorite ingredients. Ingredients for the dough are hot water, yeast, olive oil, flour, rosemary and salt. For the sauce, canned tomatoe sauce or canned pizza sauce. Top pizza with whatever toppings you prefer and cover with mozzarella cheese.

How To: Make deep fried ice cream

Watch this instructional video to learn how to deep fried ice cream. All you need is ice cream, corn flakes, cinnamon, sugar, and eggs. Unfortunately most people can't harness the magic of television when they cook in real life.

How To: Freshen a room

The number-one question people ask me is, how can I update a room without breaking the bank or enduring a complete remodel? The answer is-you guessed it-in the details. The changes I'm suggesting fall into four main categories: lighting, furniture, walls

How To: Make garlic prawns

Learn how to make a great summer dish that can serve 2-3 people. All you need is tomatoes, onions, parsley, garlic, salt and pepper, butter, cream, and of course, prawns. This is a relatively simple recipe. Enjoy.

How To: Pull the exploding door prank

This simple technique to creating a bang when people open a door is sure to scare the daylights out of your friends. Using party poppers, you can take them apart and tie them across a door entry. When a person enters, the poppers explode. There are great reaction shots on this video as welll.

How To: Hack UnrealIRCd Using Python Socket Programming

UnrealIRCd is an open-source IRC server that has been around since 1999 and is perhaps the most widely used one today. Version 3.2.8.1 was vulnerable to remote code execution due to a backdoor in the software. Today, we will be exploiting the vulnerability with Metasploit, examining the underlying code to understand it, and creating our own version of the exploit in Python.

News: Oculus Quest Is the Best Way to Experience VR on the Go

At Next Reality we mostly focus on augmented reality, but that doesn't mean we're not also absolutely obsessed with virtual reality, too. If the thing that's been keeping you from diving into the deep end of VR has been clunky tethered headsets or the expensive but necessary gaming PCs, then it's time for you to try the Oculus Quest, which is currently available to buy here for less than most gaming systems on the market.

How To: The Best External Storage Options for iPhone That Work with iOS 13's Files App

The Files app received a big update in iOS 13. Before, it was limited to local and cloud-based files, but now you can access data from external storage devices, including SD cards and USB drives. But before you try to connect your favorite card or drive to your iPhone, there are a few things you need to know.

News: Apple Just Released iOS 13.1 for iPhone, Includes ETA for Maps, Shortcut Automations & More

If you're still working your way through the hundreds of features and changes that iOS 13 brings to your iPhone, you might be a bit surprised to learn that your device is now out of date. While Apple only dropped the big update for iPhones on Thursday, Sept. 19, the company has already released its successor. All iOS 13-compatible iPhones can now update to iOS 13.1, out today, Tuesday, Sept. 24.

How To: Intercept Security Camera Footage Using the New Hak5 Plunder Bug

In a previous guide, I demonstrated how to extract images from a security camera over Wi-Fi using Wireshark, provided you know the password. If you don't know the password, you can always get physical with the Hak5 Plunder Bug. Using this small LAN tap, we can intercept traffic like images from a Wi-Fi or IP security camera if we can get physical access to the Ethernet cable carrying the data.

How To: Stop Third-Party Apps You Never Authorized or No Longer Use from Accessing Your Instagram Account

Unless you're completely new to Instagram, it's likely that you've linked your account with a third-party service at some point and forgotten about it. Those services still have access to data such as your media and profile information, so it's important that you not only know how to find these "authorized" apps, but that you know how to revoke their permissions.

How To: Use Command Injection to Pop a Reverse Shell on a Web Server

Command injection is a technique used by hackers to execute system commands on a server, usually via a web application or some kind of GUI. This can happen when an application provides some sort of functionality to the user involving the use of system commands. When the input is not properly sanitized, commands not originally intended to be run are allowed to be executed.

Hacking Pranks: How to Flip Photos, Change Images & Inject Messages into Friends' Browsers on Your Wi-Fi Network

Networking is built largely on trust. Most devices do not verify that another device is what it identifies itself to be, so long as it functions as expected. In the case of a man-in-the-middle attack, we can abuse this trust by impersonating a wireless access point, allowing us to intercept and modify network data. This can be dangerous for private data, but also be fun for pranking your friends.