Costs Local Search Results

How To: Make Your Own Hairspray from Basic Kitchen Ingredients and Choose Your Own Scent

Hair products can work wonders, but the good stuff is usually super expensive. Plus, most of the major brands use a ton of ingredients you can't even pronounce, so it's safe to say a lot of us have no idea what we're putting in our hair. The good side is that most products can be made at home using basic ingredients for a fraction of the cost of commercial brands. Hairspray is no exception, and actually one of the easier ones to make.

How To: Still Using Notes? Here Are 3 Better Word Processing Apps for Writing on Your iPhone

As someone who writes an extreme amount, it's a necessity for me to have an organized and multifunctional text editor. The stock iPhone Notes application is useful to an extent, but it sorely lacks in features and design. Writing and text editing applications are nothing new to the iPhone, but many of them are overloaded on features, making it even harder to keep organized. Here are just a few alternatives that I find helpful in my day-to-day writing.

How To: Build a Rustic Timber Table

These three videos will show you how to build a rustic, distressed kitchen table. I'll be walking you through the process of selecting some recycled timber from a junk pile, and with a little care and some simple joinery techniques, transform that waste timber into a distressed timber kitchen or dining table. In fact, you could use the table for whatever you wanted really.

How To: Who's Unfollowing Your Twitter Account? Find Out with These Tracker Apps (And Get Revenge!)

Feelings can get hurt on Twitter as fast as an update. Everything is fine and dandy because two people are mutually following each other, then out of nowhere, one person has unfollowed the other out for seemingly no reason. Twitter doesn't notify users when someone has unfollowed them, so there are millions of people out there who get used for their follow! Well, now you can find out who unfollows you on Twitter with these mobile apps.

How To: Build Your Own Projector Screen at Home for Less Than Fifty Bucks

A few weeks ago, we saw a simple 128 inch DIY Projector Screen that looked like a pro built it—and it only cost $200. But this one is even cheaper, and looks just as good. It's also simpler because it's painted right onto the wall. In the video below, How To Lou shows us how to make it with just some white or silverscreen paint, a few pieces of casement molding, and some black velvet for the trim.

How To: Moving Soon? This DIY Alarm Will Make Sure Your Stuff Stays Safe in the Truck Overnight

The worst part of moving into a new place is, well...moving. It's tedious, a lot of hard labor, and it can take forever, and don't even get me started on all those labels. It's also one of the only times in your life when everything you own can be stolen at once, since it's sitting in a movable container. Rather than risk losing everything, try this DIY Moving Truck Alarm System by Tim Flint that lets you know when the loading door is opened so you can catch would-be thieves red handed.

News: This 1974 Gas-Guzzling Beetle Is Now an Eco-Friendly Electric "Voltswagon"

Want an electric car without the price tag? You could always build your own, or maybe just hack your old gas guzzler into an eco-friendly electric machine... This weekend at Defcon, security consultant David Brown showed off his "Voltswagon" project, a 1974 Beetle named Shocky that he converted to electric for only $6,000. He removed the old combustion engine, radiator, and a few other unneeded parts to make it lighter. Then he loaded it with batteries front and back, ten Interstate DC-29, 12...

News: This Cardboard Bicycle Cost Only $12 to Make—And It Works!

Stop me if you've heard this one before. A man walks into a bicycle shop, hears about a canoe made of cardboard and is inspired to make an awesome, fully-functional cardboard bicycle. Sound far-fetched? Wait until you hear how his guy actually did it. Israeli entrepreneur Izhar Gafni says that the idea for his method came from Japanese origami. Folding the cardboard increases its strength by 2-3 times, making the material much more durable. Essentially, he made the basic shape for each part w...

News: Have an NFC-Enable Phone? This Hack Could Hijack It

Some of us use our smartphones for almost everything. Manufacturers know this, so they try to make their devices as convenient as possible to use, but sometimes that convenience comes with a cost to security. The very same technology that allows you to easily share music with friends and make purchases can also put you at risk. Photo by sam_churchill

How To: Throw a bachelor party

So, your buddy's getting married and it's time for that age-old tradition the "bachelor party". Make sure the party goes off with out a hitch by remembering the goal is to have fun and not to ruin the wedding, get a DUI or destroy the reputation of your friends. Plan accordingly.

How To: Prepare and cook a meal as a Boy Scout

As a Boy Scout, when the First Class rank is attained, a scout has learned all the basic camping and outdoors skills of a scout. He can fend for himself in the wild, lead others on a hike or campout, set up a camp site, plan and properly prepare meals, and provide first aid for most situations he may encounter. A First Class scout is prepared.

How To: Make the Most of Your Trip to the Movie Theater with These Apps

With the list of available mobile apps for moviegoers constantly expanding and improving, seeing a film at your local theater has never been better. With the right apps for your iPhone or Android phone, you can research movies, find out if showings are sold out, reserve seats, save money on tickets and concessions, preorder popcorn and soda, and even find dull bathroom-worthy scenes.

How To: Perform Local Privilege Escalation Using a Linux Kernel Exploit

Getting root is considered the Holy Grail in the world of Linux exploitation. Much like SYSTEM on Windows, the root account provides full administrative access to the operating system. Sometimes even a successful exploit will only give a low-level shell; In that case, a technique called privilege escalation can be used to gain access to more powerful accounts and completely own the system.

How To: Hide a Virus Inside of a Fake Picture

In my last tutorial, I talked about creating a virus inside of a Word Document in the scenario of a mass-mailer attack. In this post, however, I'm going to be covering creating a fake image or screenshot with a meterpreter backdoor hidden inside to be used in a similar scenario. Step 1: Creating the Virus