Developed Search Results

How To: Isolate a variable

If you're struggling a bit with algebra, check out this video to learn how to isolate a variable. Isolating a variable is a matter of separating and simplifying.

How To: Build loose tenon joinery in woodworking

Eagle Lake Woodworking, hosted by John Nixon, offers great do-it-yourself guides for building your own furniture, especially in the American Arts and Crafts style, and turning your garage into an amateur woodshop. Search Eagle Lake on WonderHowTo for more carpentry tutorial videos. From Eagle Lake Woodworking on this specific lesson:

News: Intestinal Viruses Directly Associated with Development of Type 1 Diabetes

Type 1 diabetes is an attack on the body by the immune system — the body produces antibodies that attack insulin-secreting cells in the pancreas. Doctors often diagnose this type of diabetes in childhood and early adulthood. The trigger that causes the body to attack itself has been elusive; but many research studies have suggested viruses could be the root. The latest links that viruses that live in our intestines may yield clues as to which children might develop type 1 diabetes.

How To: 10 Free Apps Every Windows 10 User Should Have

Windows 10 has proved to be immensely popular (free upgrades certainly don't hurt), and with back to school time, there's a good chance you have a new computer running Microsoft's latest OS. You maybe you decided to go with a clean installation rather than an upgrade, or just haven't used your computer for much more than surfing the web and watching Netflix.

Hack Like a Pro: Cryptography Basics for the Aspiring Hacker

Welcome back, my rookie hackers! As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be able to crack passwords and encrypted protocols such as SSL and wireless, you need to at least be familiar with the concepts and terminology of cryptography and encryption.

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 1 (Getting Started)

Welcome back, my hacker trainees! A number of you have written me regarding which operating system is best for hacking. I'll start by saying that nearly every professional and expert hacker uses Linux or Unix. Although some hacks can be done with Windows and Mac OS, nearly all of the hacking tools are developed specifically for Linux. There are some exceptions, though, including software like Cain and Abel, Havij, Zenmap, and Metasploit that are developed or ported for Windows.

How to Hack Like a Pro: Getting Started with Metasploit

This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing professionals. There are hundreds of tools out there, but I will focus and those that meet four key criteria:

News: A Brief History of Hacking

Welcome back, my fledgling hackers! Hacking has a long and storied history in the U.S. and around the world. It did not begin yesterday, or even at the advent of the 21st century, but rather dates back at least 40 years. Of course, once the internet migrated to commercial use in the 1990s, hacking went into hyperdrive.

News: Why Is Linux & Other Open-Source Software Free?

Welcome back, my greenhorn hackers! As hackers, we often take for granted that nearly all of our hacking tools and operating system are free and open source. I think it's important to examine a bit of background on how we arrived at this intriguing juncture in the history of computer software. After all, we pay for nearly all of our other software (Microsoft, Adobe, etc.) and nearly everything else we use in life, so how is it that Linux and all our hacking tools are free?

News: How Zero-Day Exploits Are Bought & Sold

Most of you already know that a zero-day exploit is an exploit that has not yet been revealed to the software vendor or the public. As a result, the vulnerability that enables the exploit hasn't been patched. This means that someone with a zero-day exploit can hack into any system that has that particular configuration or software, giving them free reign to steal information, identities, credit card info, and spy on victims.

How To: Tie an Albright knot variation

The Albright Knot, demonstrated in this how-to video, was developed for fishing, but as it was created to tie together to diameters of rope or line, can be useful for many different reasons to tie knots. The Albright knot is relatively strong, so it's good to be able to tie this knot in various emergency situations. Check out this video survival training tutorial and learn how to tie an Albright knot variation.

How To: Do the star drill exercise

This tutorial demonstrates an agility exercise. This star drill exercise workout was developed to increase your overall sports performance. This video explains the star drill exercise and how you can incorporate this agility training to develop your flexibility, balance and power.

How To: Do a stair running exercise

This tutorial is a demonstration of a speed and conditioning exercise. These stair running workout was developed to increase your overall sports performance. This how to video explains the stair running exercise and how you can incorporate this speed training to develop your flexibility, balance and power.

How To: Do the sprint high knees exercise

This tutorial demonstrates a speed and conditioning exercise. This sprint high knees workout was developed to increase your overall sports performance. This how to video explains the sprint high knees exercise and how you can incorporate this speed training to develop your flexibility, balance and power.

How To: Do a side box jump exercise

This tutorial demonstrates a plyometrics sports training exercise. This side box jump workout was developed to increase your overall sports performance. This how to video explains a plyometric side box jump exercise and how you can incorporate this explosive training into your routine to develop your speed and power to become bigger, faster and stronger.

How To: Do the knee tuck jump

This tutorial demonstrates plyometrics sports training exercise. This knee tuck jump workout were developed to increase your overall sports performance. This how to video explains a plyometric exercise and how you can incorporate this explosive training into your routine to develop your speed and power to become bigger, faster and stronger.

How To: Do a 4th quarter drill exercise

This tutorial shows speed and conditioning exercises. This 4th quarter workout was developed to increase your overall sports performance. This video explains the fourth quarter drill exercise and how you can incorporate this speed training to develop your flexibility, balance and power.