How To: Pass the ball behind the back
Ren Stern and Jason Williams demonstrate how to pass the basketball behind the back. When you are facing a defender and cannot pass the ball, you can try to pass the ball behind your back.
Ren Stern and Jason Williams demonstrate how to pass the basketball behind the back. When you are facing a defender and cannot pass the ball, you can try to pass the ball behind your back.
This video tells us the method to do the CodeBreaker move in wrestling. You may or may not run forward. You can jump using your right or left leg. Bring the knees below your opponent's collar bone and keep them close together. Wear knee pads for safety. Hold your opponent's head below the ear or above the ear. Keep your body tight and together during this move. As a defender, do not resist the opponent. Fall down with their weight. If you are taller, you should spread out your feet more than ...
Learn some other tackle technique for players defending around the fringes. From a low position he's looking to get him off his feet. Attacker must stay as close to the ball as possible. The defender is looking to get his weight on top of the attacker.
Develop your tackle to increase chance of a turnover on the rugby pitch. If the attacker stretches to the outside and is faster than the defender this is a strategy. Stay as close to the ball as you can. The referee will define you are on your feet and can draw a penalty.
Curls are one of the most effective pass patterns used in football. When done properly they are deceptive and create tons of space between receiver and defender. This video features NFL wide receiver Drew Bennet doing curl drills with young players and explaining to them the advantages of the curl route. Watch this video, then get out there and run some drills!
COD4 Pro Nade Tutorial See how to do a pro nade attack in Crossfire on COD4. For this grenade throwing tutorial, you need to be in Multiplayer mode, Search and Destroy, on Call Of Duty 4: Modern Warfare.
This video goes over the technique of shooting off a cross pass. This speed is required to get off the shot before the defender can get to you. This allows for optimal shot viability.
Faking shots in water polo is a great way to keep defense off balance. Fake shots will often send defenders off to one or the other side. Losing the defenders during the fake allows you to get the open shot on goal. Water polo offensive techniques are designed to create more space between you and the defender.
Learn how to spin off your defender when running with the ball in football.
There's four shadow arena fights in this level of the Xbox 360 game Darksiders. In the Drowned Pass, there's the Counter Killer, Wrath of War, World of Pain, and Defender. The Drowned Pass features a deep lake in the middle of the area, a path that runs about the outer edge, and various hidden nooks and caves (some which can only be reached by swimming under water). Follow the path to the left. As you proceed along this path, keep an eye out for an opening along the right side. This will lead...
This is a video tutorial in the Sports category where you are going to learn how to play offense in a game of soccer. The forward soccer position usually stays on the offensive side in order to score goals. Adrian Heath, head coach, shows you how to play the forward position properly. This is going to be a very easy and simple drill. All you are looking for is a nice little floating pass over the defender's head to your own player in the forward position. And the forward player then tries to ...
This is a video tutorial in the Sports category where you are going to learn how to play defense in soccer. Playing good defense in soccer is required to keep the ball out of your own team's goal. Adrian Heath, a professional soccer head coach, teaches you how to do this. The basics are the angle of approach and the speed of approach of the defender. You should not go too quickly or too square. If you are too square, the opponent can go outside or inside. You should be showing the opponent ei...
In this video, we learn how to perform a shot fake in basketball with Chase. There are three keys to a good shot fake. First, make sure you are on balance and nice and stable. Be in a good dent athletic position, but don't come out and up from your position. Then, you will need to make sure your eyes are to the rim. This will sell the shot and get the defender to buy it, making the defensive player lose focus and position. Last, you want to make sure you keep it tight when you are playing. Th...
In this tutorial, we learn how to create space to score in basketball. In order to create space, you will need to understand the role of the defensive player. Put yourself in their shoes thinking about what they are trying to do as you're playing. As an offensive player, you want to keep them more than an arm's length away from you by closing the gap between you. This will cause the defender to change their stance in order to stand in front of you. After this, you will be able to run around t...
In this video, we learn how to protect the ball while in the box. If the ball is directly in front of your body, it puts it in a position where it can be moved by the defender. The box is an imaginary line just under your chin that goes just under your thigh and from the length of your torso. The ball should be on the top corner of the box when you shoot, where you can cross is around your face before you put it down. You can also sway it around your knees if you are ready to take off on a dr...
This video shows you how to remove a virus or harmful winlogin.exe file. If you use a good firewall program or a good anti-virus, it will pop-up a window and let you know you have been infected or even block it. If you do not use such things, but you think you know since when you have been infected, you can try to restore your system by using System Restore in Windows XP or Vista. If you do not know the duration of the infection, you can try to manually delete the file when using Windows Safe...
Grandmaster Alexandra Kosteniuk shows you how to play a magnificent game of chess in this chess video tutorial on the very difficult Rook and Bishop against Rook endgame. See how to use the Philidor's position to win the endgame of chess.
Kali Linux is known as being the de facto penetration-testing Linux distribution but can be a pain to use as an everyday OS — even more of a pain if that means carrying around a second laptop or the constant frustration of using the finicky Wi-Fi on virtual machines. But there's another option: installing a Kali subsystem on your Windows computer as a convenient compromise.
This video explains how to throw a football like a quarterback. With your elbows bent at a 90-degree angle, hold the ball in front of your chest with the fingers of your throwing hand across the laces of the football.
A new iPhone is only as good as its accessories. Whether it's a case, screen protector, or charger, your iPhone's ecosystem depends on accessories to keep it powered, protected, and personal. Prices on all of these extras are going to be at an all-time low this Black Friday weekend, so we've rounded up the best deals around to help you get the essentials you want and prices you can afford.
Windows 10 passwords stored as NTLM hashes can be dumped and exfiltrated to an attacker's system in seconds. The hashes can be very easily brute-forced and cracked to reveal the passwords in plaintext using a combination of tools, including Mimikatz, ProcDump, John the Ripper, and Hashcat.
Learn how to work against pressure defense and keep the defender off balance with the help of this dance dribbling basketball drill. The first video is a team drill and the second is an individual workout variation.
Learn how to trick your defender to leave you open for a shot using this step away and pivot basketball move.
Jason Williams and Ren Stern demonstrate the floater, a shot you can use in the game of basketball. It is useful because your defender will not be able to block it since it has a fast release.
Tired of your PC pestering you to check this or fix that? Are you sick of all those pop-up balloons? Well, Windows 7 now has a feature called Action Center, and it lets you decide which alerts you see and which ones you don’t. See it in action!
It is a great time to be a mobile gamer. Not only are there millions of mobile games on the Play Store and App Store, but thanks to some recent developments, we can also even play PC games. AMD recently released an app, which, among other things, lets you play your favorite PC games on your phone.
The holidays are here, which means a slew of new smartphones are set to be gifted to loved ones in the spirit of giving. Of course, a great case to compliment and protect that precious flagship is a must, regardless of whether it's a OnePlus 6T, iPhone XS, or Galaxy Note 9. And while quality cases usually come with a hefty price tag, there are plenty of Black Friday deals to keep you from going broke.
Whether you just bought an iPhone X or one of your friends or family members did, iPhone X accessories are probably on your shopping list this holiday season. Cases, screen protectors, fast-chargers, wireless charging stations ... whatever they may be, you'll find the best deals on them this Black Friday weekend.
It's the holidays. That means new smartphones, and new smartphones mean new cases. Whether it's the Galaxy S8, the iPhone X, or the Note 8, your new phone deserves to be protected. Of course, good cases can get pricey fast. That's what Black Friday is for, of course.
Black Friday is fast approaching, and just like every other day-after-Thanksgiving, there will be too many tech deals you won't want to pass up. If you've been saving up all year just for this sometimes-chaotic shopping holiday, we'll help you figure out the best tech sales to take advantage of and when, whether it's Black Thursday, Black Friday, or Black Friday weekend.
Hackers are always seeking zero-day exploits that can successfully bypass Windows 10's security features. There has been extensive research into creating undetectable malware and entire GitHub projects dedicated to automating the creation of undetectable payloads such as WinPayloads, Veil v3, and TheFatRat.
The holidays are here. From the week of Thanksgiving until the end of the year, retailers will be offering massive discounts on your favorite items. So if you're looking for smartphone accessories, this is the time to buy. From Walmart to Best Buy, there are deals everywhere on a host of items.
Once a hacker has created a PowerShell payload to evade antivirus software and set up msfconsole on their attack system, they can then move onto disguising their executable to make it appear as a regular text file. This is how they will get a Windows 10 users to actually open the payload without knowing they are doing so.
The USB Rubber Ducky comes with two software components, the payload script to be deployed and the firmware which controls how the Ducky behaves and what kind of device it pretends to be. This firmware can be reflashed to allow for custom Ducky behaviors, such as mounting USB mass storage to copy files from any system the Duck is plugged into.
Microsoft.com is one of the most extensive domains on the internet with thousands of registered subdomains. Windows 10 will ping these subdomains hundreds of times an hour, making it challenging to firewall and monitor all of the requests made by the operating system. An attacker can use these subdomains to serve payloads to evade network firewalls.
With an inconspicuous Android phone and USB flash drive, an attacker can compromise a Windows 10 computer in less than 15 seconds. Once a root shell has been established, long-term persistence to the backdoor can be configured with just two simple commands — all while bypassing antivirus software and Windows Defender.
Due to weaknesses in the way Wi-Fi works, it's extremely easy to disrupt most Wi-Fi networks using tools that forge deauthentication packets. The ease with which these common tools can jam networks is only matched by how simple they are to detect for anyone listening for them. We'll use Wireshark to discover a Wi-Fi attack in progress and determine which tool the attacker is using.
A powered-off Windows 10 laptop can be compromised in less than three minutes. With just a few keystrokes, it's possible for a hacker to remove all antivirus software, create a backdoor, and capture webcam images and passwords, among other highly sensitive personal data.
Microsoft's built-in antimalware solution does its best to prevent common attacks. Unfortunately for Windows 10 users, evading detection requires almost no effort at all. An attacker armed with this knowledge will easily bypass security software using any number of tools.
The holiday season is here! Whether you're gift shopping for the iPhone owners in your life or just trying to save some money on your own purchases, Black Friday can deal out the discounts. This year, you'll find great prices on iPhone accessories of all kinds — all Thanksgiving week long — whether you're buying gear for an iPhone 12, X, or 7, there's something here for everyone.