Delectable Range Search Results

How To: Do hanging dip exercises

Work out and getting in shape with dips. Learn how dip exercises can increase your strength and fitness in this training video. Take action: do not lock elbows, upper arms stay parallel to floor, and no partial reps, use full range of motion! Michelle, the instructor in this how-to video, is a personal trainer at a gym in NC and has been a personal trainer for several years. She is certified through ACE and is a certified aerobics instructor as well. Her Specialty is weight lifting and she en...

How To: Do dumbbell concentration bicep curls

Work out your arms with dumbbell concentration curls. Learn how to exercises with curls in this fitness video. Take action: stay tight without rocking, get full range of motion, squeeze at the top of the movement, and plant your elbow. Michelle, the instructor in this how-to video, is a personal trainer at a gym in NC and has been a personal trainer for several years. She is certified through ACE and is a certified aerobics instructor as well. Her Specialty is weight lifting and she enjoys tr...

How To: Execute reverse curls for weight training

Have you tried working out with reverse curls? If so you know that they are an essential part of lifting weights and strength training. This fitness how-to video demonstrates work out the bicep muscle with reverse curls. Learn about curls and weightlifting exercises in this workout video.

How To: Hack WPA WiFi Passwords by Cracking the WPS PIN

A flaw in WPS, or WiFi Protected Setup, known about for over a year by TNS, was finally exploited with proof of concept code. Both TNS, the discoverers of the exploit and Stefan at .braindump have created their respective "reaver" and "wpscrack" programs to exploit the WPS vulnerability. From this exploit, the WPA password can be recovered almost instantly in plain-text once the attack on the access point WPS is initiated, which normally takes 2-10 hours (depending on which program you use).

How To: A Guide to Downloading Console Games Online

In last week's guide, we covered the best places to purchase digital copies of computer games online. This week we'll cover another type of downloadable content: those available for video game consoles. Every major console out today either has or plans to have a DLC platform, but which one is the best? If you don't like leaving your house and want to play console video games, which console should you get? Below I will break down what the online marketplace offers so you can decide which conso...

How To: Use Maltego to Fingerprint an Entire Network Using Only a Domain Name

Hackers rely on good data to be able to pull off an attack, and reconnaissance is the stage of the hack in which they must learn as much as they can to devise a plan of action. Technical details are a critical component of this picture, and with OSINT tools like Maltego, a single domain name is everything you need to fingerprint the tech details of an organization from IP address to AS number.

News: Flagship Performance at Midrange Prices — Qualcomm Announces the Snapdragon 710

There's always been a clear divide between flagship and midrange phones. Flagships will run you at least $700, while midrange typically falls between $250 and $550. The main difference is the processor, with midrange phones sporting a 600-series Snapdragon and flagships rocking the 800-series. Now, Qualcomm may have just created another smartphone tier with their newly-unveiled 700-series chip.

News: Meet the Honor 7X — Huawei's New Premium Budget Phone

Huawei has been on a roll recently. They just became the second largest smartphone manufacturer in September, passing Apple and trailing only Samsung. Shortly after, they announced their new Kirin 970 flagship SoC to rival the Snapdragon 835, then followed that up by announcing the Mate 10 and 10 Pro. Well apparently, Huawei isn't done with announcements just yet.

How To: Generate Private Encryption Keys with the Diffie-Hellman Key Exchange

When we are building programs that communicate over a network, how can we keep our data private? The last thing we want is some other lousy hacker sniffing our packets, so how do we stop them? The easy answer: encryption. However, this is a very wide-ranging answer. Today we're going to look specifically at how to encrypt data in Python with dynamically generated encryption keys using what is known as the Diffie-Hellman key exchange.

Netflix 101: Choosing the Netflix Plan That's Right for You

Netflix offers three different tiers of service. The good news is that no matter which subscription plan you choose, the available content is the same. Whether you choose the cheapest plan or the most expensive, you'll be able to watch any TV show or movie in Netflix's library. But there are other things to consider when choosing the plan that's right for you and your smartphone.

Networking Foundations: Subnetting Based on Host Requirements

Hello everyone! I hope you are having a great day so far. Today, instead of caring about networks we are going to talk about subnetting based on host requirements as promised in my first article about subnetting. Just like in the previous articles we will jump right into the examples because that's the best way to learn.

How To: Build an ARP Scanner Using Scapy and Python

As you might know, there are a multitude of tools used to discover internal IP addresses. Many of these tools use ARP, address resolution protocol, in order to find live internal hosts. If we could write a script using this protocol, we would be able to scan for hosts on a given network. This is where scapy and python come in, scapy has modules we can import into python, enabling us to construct some tools of our own, which is exactly what we'll be doing here.

News: Why Nikola Tesla's Wireless Power Was Fated to Fail Due to Exploding Airships

Nikola Tesla is one of the most tragic figures in the history of science, a history that is practically filled to the brim with tragic figures. Francis Bacon, a 16th century philosopher and scientist, caught pneumonia and died because he was trying to stuff snow into a dead chicken. Marie Curie died as a result of her long-term exposure to radioactivity, and her papers from the 1890s are too radioactive to touch without protective gear to this day.

How To: Negotiate a salary right out of school

This video tutorial is in the Business & Money category which will show you how to negotiate a salary right out of school. Of all the questions you can get asked in an interview, probably the toughest one to answer is "what are your salary expectations?" if you quote too low, you might leave some money on the table. And if you go too high, you may price yourself out of the job. So, what does a college student do? If they asked you the question in an interview, be clear that it's a negotiation...

How To: Cite website resources in your bibliography using MLA format

If you're writing a college essay or report, your bibliography is a painful, yet necessary part. And thanks to all of the information available on the World Wide Web, most colleges and universities accept websites as resources in your bibliography. But citing websites can be confusing when using the MLA citation format. This video will breakdown the process.

How To: Cook a simple tilapia fish dish with cornmeal & tomatoes

In this tutorial, Chef Jason Hill teaches us how to cook tilapia. Tilapia recipes can range depending on what kind of food you want. Tilapia is a fresh water fish with firm white and flaky appearance. To begin, toast 1 c of cornmeal for 2-3 minutes over medium heat. After this, put the mixture into a casserole dish and then make your pepper topping. Set your pan on medium-high and place 2 tbsp olive oil along with bell peppers, pasilla, and red peppers that are chopped. Then, stir in 1/2 c wa...