Current Competitive Search Results

How To: Use Command Injection to Pop a Reverse Shell on a Web Server

Command injection is a technique used by hackers to execute system commands on a server, usually via a web application or some kind of GUI. This can happen when an application provides some sort of functionality to the user involving the use of system commands. When the input is not properly sanitized, commands not originally intended to be run are allowed to be executed.

How To: 3 Tips to Help You Drive Safer with Waze

Because it sources a majority of its vital data from actual drivers on the road, Waze is easily one of the best navigation apps to use if you prioritize safety. Benefits such as crowd-sourced traffic data, police trap locations, and road work avoidance, when combined, help you anticipate traffic conditions with unprecedented accuracy and make adjustments accordingly.

How To: Save Your iPhone's SHSH2 Blobs So You Can Downgrade iOS for Future Jailbreak Methods

When a new jailbreak method comes out, Apple is quick to patch the vulnerability it exploits by issuing a new iOS update. If you were to accept such an update, you'd no longer be able to jailbreak your iPad, iPhone, or iPod touch unless you could roll back your firmware to a version that could be jailbroken. But Apple even takes things a step further and stops signing older iOS firmware versions, which makes downgrading next to impossible. This is where your SHSH2 blobs come into play.

Robot Basics: Using an H Bridge to Move Your Bot Backwards

I love robots. They have the potential to evolve into Asimovian destroyers of the human species, but have only just mastered the art of cleaning my rug. They have an ever increasing cool factor and a growing number of cheap and simple components that let the hobby roboticist reach for the burning miasmas of plasma. But to get to the stars, we need to start with the basics.

How To: Remove a shower stall and replace it with a new one

You can't go scrub-a-dub in the tub - at least not comfortably so - if your shower faucet is leaking, or if your current tub valve is stuck and not letting any shower water come through. If your shower is broken beyond repair then your best plan of action is to take the whole thing out and reinstall your shower stall. We know this big - and potentially disasterous - procedure has been parodied many a time on popular TV sitcoms, but it's actually realizable if you're careful and follow the ste...

How To: Use the ultimate opening line with women

In this video from DavidWygant he teaches about using the ultimate opening line with women. He talks about approach anxiety and how you can talk to women about that very thing. He also talks about the 10 PM rule. Talk to the girls before 10 pm because by around 10 she will be so annoyed by being hit on all night. You can even approach her early in the night and discuss about maybe who she is meeting up with. Make a joke about your phones! Maybe you both receive text messages from your friends...

How To: Check for a HomeGroup setup on your PC in Windows 7

In this video the instructor shows how to check if your computer has a home group setup or setup one if required. Home group is Microsoft's new way of making networking easier with computers. They allow you to share documents, pictures, videos and all kinds of media between computers that are a part of a home group. Go to the start menu and go to Control Panel. In the Control Panel select the Network and Internet link. Now in the Network and Internet window select the Home group. In this page...

How To: Use circuit bending

Circuit bending an audio device typically involves removing the rear panel of the device and connecting any two circuit locations with a "jumper" wire, sending current from one part of the circuit into another. Results are monitored through either the device's internal speaker or by connecting an amplifier to the speaker output. If an interesting effect is achieved, this connection would be marked for future reference or kept active by either soldering a new connection or bridging it with cro...

How To: Catch walleyes

Know what walleye eat. Walleye eat smaller fish, such as minnows or shad, so lures that imitate fish, such as spoons or thin-minnow crankbaits are good choices. Walleye also will eat nightcrawlers, insects and leeches, although artificial forms of these baits usually are not as productive.

How To: Tattoo step-by-step

This video is about how to tattoo. Once you make your choice of design, the tattoo artist traces the image. Next, he places the image on carbon paper and traces the image again to create a reverse image. He cleans the persons skin then firmly presses on the blueprint. Now its time to construct the needles. One is for outlining and the other is for coloring. The finished needles go in a machine to be cleaned. He places the needle in a Coil. When an electric current runs through the coil, it ma...

How To: Track database changes with Oracle

It has often been said that the only constant is change. IT's ability to manage change is an important business success criteria in today's competitive markets. Change can either be planned or unplanned. This presentation will help you understand the effects of change, and how to manage change properly. It will help Oracle database administrators better prepare to implement changes and measure the positive (or negative) affects those changes produce on the system.

How To: Discipline your toddler without spanking

At one time or another, every parent has thought about taking off the belt, but that's frowned upon in our current society, perhaps even illegal. Even using you hand could be too harsh for the child's sake, but there are ways to get your unruly tot under control. Toddlers are often headed for trouble, but you can steer them in the right direction without spanking.

How To: Use NTFS

NTFS? What is it? It stands for New Technology File System, but what does that mean? Well, it's the standard system for filing in Windows NT, including all later versions, up to the current Windows 7, but Mac users can take advantage of this file system, too. If you’re confused when it comes to your hard drive’s format, this guide will show you the way to get the most out of your system.

How To: Crack a WPA (and some WPA2s) with BackTrack in Linux

In this video we learn how to crack WPA using Back Track. The first step is the boot into Back Track using a VMware Virtual Machine Image. Next you need to open a shell console. In the console you will type "airmon-ng" and press enter. This does a check to find the wireless guard interface name. Next, type "airodump-ng wlan0" and press enter. This will tell it what wireless card to use and scan for wireless networks. You are looking for the one that comes up WPA. Copy the MAC address then typ...

How To: Change your computer registration name on a PC

This how to video shows you how to change your computer registration on a computer. First, go to the start menu and select my computer. Right click it and choose properties. You will notice a registered to name. This is what we are going to change. First, go to start and select run. Type in Regedit and click okay. This program will open. Go to HKEY_LOCAL_MACHINE and Software. Scroll down and find Microsoft. From there, scroll down and find Windows NT. Open it and select Current Version. On th...

How To: Weave in loose ends when knitting

This is a video on how to weave in ends on kniting. First take two ends at a time, tie the new color and a half not around the current working color, and tie them. The thread the end onto the yarn needle, and go througha few of the yarn stitches. Next give it a little pull to make sure nothings coming loose. Go up to the next yarn ends, and do the same thing. What you have to make sure you do is weave the yarn through light colors. Also make sure the knots are secure, and are not going to com...

How To: Open a port for torrent downloading

This video tutorial shows how to open a port for torrent downloading on your computer. Click Start menu, type cmd command in Search area. In cmd window type ipconfig and press Enter. Remember or write down your IP adress. Type exit and press Enter to close cmd window.

How To: Use Google Maps with the Blackberry Storm 9500

In this how-to video, you will learn how to install and use Google Maps on your Blackberry Storm 9500. First, go to the main menu of the device and go to applications. Now, find Google Maps on this list. Click on it and press Install. Now it will connect to the internet. Scroll to the bottom and click agree and then download on the next page. Once it has finished installing, click ok or run. Now, close the browser and go to applications. Select google maps in order to use it. It will load and...