Deadly Attack Search Results

How To: Be prepared for the potential complications of heart surgery

If you or someone you love is undergoing heart surgery in the near future, it's important that you have a solid grasp of the potential complications such that you can do everything in your power to avoid them. In this brief medical-minded tutorial from ICYou, you'll learn about a few of the most common complications including bleeding, infection, damage to blood vessels, heart damage, heart attacks or strokes.

How To: Protect against SQL injection attacks when programming in PHP

In this clip, you'll learn about how to prevent SQL injection when writing code in PHP. Whether you're new to the PHP: Hypertext Preprocessor scripting language or are a seasoned web developer merely looking to improve your chops, you're sure to find benefit in this free video programming lesson. For more information, including detailed, step-by-step instructions, take a look.

How To: Build a katana style paper sword

Grab some paper, pennies, and paper clips, and create this stealth weapon in the comfort of your own bedroom. Scaled to actual size, this craftable katana can be used to fend off paper-based attacks, or displayed for decoration. Add as many, or as few, foldable components to customize your sword size.

How To: Spider in water polo

Spidering enables you to maintain a position of power, where you can pass, shoot or move quickly. Spidering is the position where one hand is sculling, and both legs are doing eggbeaters. This is a standard water polo position for both attack and defense.

How To: Shoot in water polo

Shooting in water polo is a basic skill for attackers. Water polo shot requires good height out of the water, arm position, shoulder rotation, and head stall. Shot strategy is important to building your water polo game. Concentrate on improving your rotation to follow through and speed up the shot. This is an attack focused water polo drill.

How To: Counter Parry-Riposte in fencing

After a series of quarte disengage attacks, Bijan takes several counter-ripostes before finishing with a fleche. (For those striving for perfection--He's too close when I'm coming forward/hand is too far back in his sixte parry & he's not fully stretched in the fleche--Aside from these things, I think Bijan has admirable form but I'm his coach & biased...)

How To: Shoot from the attack position

Jesse Hubbard discusses the mechanics of shooting and discusses and illustrates the different lacrosse shots. These are the sidearm shot, the 3/4 arm shot, sidearm shot, overhand shot and outside shot, and bounce shot. He also discusses how to shoot on the run. Tips appear throughout the video in the form of pop-ups and are summarized with sidebars.

How To: Scan, Fake & Attack Wi-Fi Networks with the ESP8266-Based WiFi Deauther

The price of hacking Wi-Fi has fallen dramatically, and low-cost microcontrollers are increasingly being turned into cheap yet powerful hacking tools. One of the most popular is the ESP8266, an Arduino-programmable chip on which the Wi-Fi Deauther project is based. On this inexpensive board, a hacker can create fake networks, clone real ones, or disable all Wi-Fi in an area from a slick web interface.

How To: Abuse Session Management with OWASP ZAP

It's always a good idea to know how an attack works at the very basic level. Manual techniques for exploitation often find holes that even the most sophisticated tool cannot. Sometimes, though, using one of these tools can make things so much easier, especially if one has a solid foundation of how it works. One such tool can help us perform a cross-site request forgery with minimal difficulty.

How To: Exploit DDE in Microsoft Office & Defend Against DDE-Based Attacks

In our previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when an MS Word document is opened. Because Microsoft built DDE into all of its Office products as a way to transfer data one time or continuously between applications, we can do the same thing in Excel to create a spreadsheet that runs malicious code when opened. The best part is, it will do so without requiring macros to be enabled.

How To: Use a machete safely

This short safety guide Colhane gives you several tips to use a machete safely without harming your self or others. These tips are not only limited to machetes but can be applied to the general use of all large knives. The first rule is always cut away from your body as shown in the video the consequences of not following this rule can be deadly. The next tip gives you the optimal angle to cut through trees and other foliage. He also gives several tips on how to create a trail and follow it i...

How To: Avoid the "5 Deadly Sins of Amateur Video"

Tom Skowronski teaches us how to shoot a good video. Look before shooting so you have a more controlled movement. Hold camera steady at all times. Move the subject in front of the camera and turn the camera mans back to the sun to illuminate the subject. . Give nose room for a more professional look. Have a full frame and no dead space to have a natural looking video. Cut off at head to have a full frame. Following Tom Showronski's video-making advice can lead to a professional-looking video....

How To: Make a paper blowgun with a 50 foot range

Training to be a deadly assassin? Why not practice on something a little less dangerous, and make a homemade paper blowgun to begin with? In this two-part video tutorial, learn how to make a sturdy paper blowgun that shoots steel-top darts, and can shoot up to fifty feet. To make this paper weaponry, you will need: An old school notebook, scissors, tape, a hot glue gun, a soda bottle, and 2 paper clips.