Current Conditions Search Results

How To: Completely Change the Status Bar on Any Android Without Rooting

Despite Android's flexibility in regards to customization, the options available in stock Android are pretty barebones. It is only with the help of third-party apps that we can entirely transform sections of the UI to our liking. And thanks to a new app, we can modify another part of the OS, the status bar.

How To: Get the Most Value from Your iPhone Trade-In

Phones these days are expensive. The iPhone 11 Pro is presumed to start at $999, following the iPhone XS and iPhone X's leads. One way to bring down that cost is to trade in your old iPhone, but there isn't one clear-cut way to do that. You could trade your iPhone into a participating website or put yourself out there and sell the iPhone on your own. It's all about what's best for you.

How To: Password-Protect Your Pages Documents So Only You & Allowed Collaborators Can Access Them

Your writing is just that — yours — so the work you do in Apple Pages should remain private until you choose to share it. Apple seems to share this sentiment. As another symbol of its dedication to user privacy and security, the company includes a feature in its word-processing app for iOS that allows you to lock documents behind a password, as well as with Face ID or Touch ID.

How To: Use Command Injection to Pop a Reverse Shell on a Web Server

Command injection is a technique used by hackers to execute system commands on a server, usually via a web application or some kind of GUI. This can happen when an application provides some sort of functionality to the user involving the use of system commands. When the input is not properly sanitized, commands not originally intended to be run are allowed to be executed.

SQL Injection 101: Advanced Techniques for Maximum Exploitation

For SQL injection, the next step after performing reconnaissance and gathering information about a database is launching an attack. But something seems off .. in the real world, it's usually not quite as simple as passing in a few fragments of SQL code to an input field and seeing all that glorious data displayed right in the browser. This is when more advanced techniques are needed.

How To: Save Your iPhone's SHSH2 Blobs So You Can Downgrade iOS for Future Jailbreak Methods

When a new jailbreak method comes out, Apple is quick to patch the vulnerability it exploits by issuing a new iOS update. If you were to accept such an update, you'd no longer be able to jailbreak your iPad, iPhone, or iPod touch unless you could roll back your firmware to a version that could be jailbroken. But Apple even takes things a step further and stops signing older iOS firmware versions, which makes downgrading next to impossible. This is where your SHSH2 blobs come into play.

Robot Basics: Using an H Bridge to Move Your Bot Backwards

I love robots. They have the potential to evolve into Asimovian destroyers of the human species, but have only just mastered the art of cleaning my rug. They have an ever increasing cool factor and a growing number of cheap and simple components that let the hobby roboticist reach for the burning miasmas of plasma. But to get to the stars, we need to start with the basics.

How To: Remove a shower stall and replace it with a new one

You can't go scrub-a-dub in the tub - at least not comfortably so - if your shower faucet is leaking, or if your current tub valve is stuck and not letting any shower water come through. If your shower is broken beyond repair then your best plan of action is to take the whole thing out and reinstall your shower stall. We know this big - and potentially disasterous - procedure has been parodied many a time on popular TV sitcoms, but it's actually realizable if you're careful and follow the ste...

How To: Use the ultimate opening line with women

In this video from DavidWygant he teaches about using the ultimate opening line with women. He talks about approach anxiety and how you can talk to women about that very thing. He also talks about the 10 PM rule. Talk to the girls before 10 pm because by around 10 she will be so annoyed by being hit on all night. You can even approach her early in the night and discuss about maybe who she is meeting up with. Make a joke about your phones! Maybe you both receive text messages from your friends...

How To: Check for a HomeGroup setup on your PC in Windows 7

In this video the instructor shows how to check if your computer has a home group setup or setup one if required. Home group is Microsoft's new way of making networking easier with computers. They allow you to share documents, pictures, videos and all kinds of media between computers that are a part of a home group. Go to the start menu and go to Control Panel. In the Control Panel select the Network and Internet link. Now in the Network and Internet window select the Home group. In this page...

How To: Use circuit bending

Circuit bending an audio device typically involves removing the rear panel of the device and connecting any two circuit locations with a "jumper" wire, sending current from one part of the circuit into another. Results are monitored through either the device's internal speaker or by connecting an amplifier to the speaker output. If an interesting effect is achieved, this connection would be marked for future reference or kept active by either soldering a new connection or bridging it with cro...

How To: Tattoo step-by-step

This video is about how to tattoo. Once you make your choice of design, the tattoo artist traces the image. Next, he places the image on carbon paper and traces the image again to create a reverse image. He cleans the persons skin then firmly presses on the blueprint. Now its time to construct the needles. One is for outlining and the other is for coloring. The finished needles go in a machine to be cleaned. He places the needle in a Coil. When an electric current runs through the coil, it ma...

How To: Discipline your toddler without spanking

At one time or another, every parent has thought about taking off the belt, but that's frowned upon in our current society, perhaps even illegal. Even using you hand could be too harsh for the child's sake, but there are ways to get your unruly tot under control. Toddlers are often headed for trouble, but you can steer them in the right direction without spanking.

How To: Use NTFS

NTFS? What is it? It stands for New Technology File System, but what does that mean? Well, it's the standard system for filing in Windows NT, including all later versions, up to the current Windows 7, but Mac users can take advantage of this file system, too. If you’re confused when it comes to your hard drive’s format, this guide will show you the way to get the most out of your system.

How To: Crack a WPA (and some WPA2s) with BackTrack in Linux

In this video we learn how to crack WPA using Back Track. The first step is the boot into Back Track using a VMware Virtual Machine Image. Next you need to open a shell console. In the console you will type "airmon-ng" and press enter. This does a check to find the wireless guard interface name. Next, type "airodump-ng wlan0" and press enter. This will tell it what wireless card to use and scan for wireless networks. You are looking for the one that comes up WPA. Copy the MAC address then typ...

How To: Change your computer registration name on a PC

This how to video shows you how to change your computer registration on a computer. First, go to the start menu and select my computer. Right click it and choose properties. You will notice a registered to name. This is what we are going to change. First, go to start and select run. Type in Regedit and click okay. This program will open. Go to HKEY_LOCAL_MACHINE and Software. Scroll down and find Microsoft. From there, scroll down and find Windows NT. Open it and select Current Version. On th...

How To: Weave in loose ends when knitting

This is a video on how to weave in ends on kniting. First take two ends at a time, tie the new color and a half not around the current working color, and tie them. The thread the end onto the yarn needle, and go througha few of the yarn stitches. Next give it a little pull to make sure nothings coming loose. Go up to the next yarn ends, and do the same thing. What you have to make sure you do is weave the yarn through light colors. Also make sure the knots are secure, and are not going to com...

How To: Open a port for torrent downloading

This video tutorial shows how to open a port for torrent downloading on your computer. Click Start menu, type cmd command in Search area. In cmd window type ipconfig and press Enter. Remember or write down your IP adress. Type exit and press Enter to close cmd window.

How To: Resize an image in Adobe Photoshop to submit to Alamy

In this how to video, you will learn how to re-size any image in Photoshop to submit to Alamy. You will need the file to be 48 megabytes and uncompressed. First, open the image in Photoshop. At the bottom, you will see the current image's file size. Now go to image and image size. Increase the size by two or by five percent. Make sure re-sample image and constrain proportions are selected. Make sure bicubic smother is selected at the bottom of the window. At the top of this window, you will s...