Domains Simply Search Results

How To: Make chocolate lava cake

The dessert for this particular event was to be individual chocolate cakes, but someone took them out of the ovens to soon and the centers where not cooked enough and still liquefied. Well, there was no time to take them off the plates and cook them more, so the Chef simply had his wait staff introduce the dessert as Chocolate “Lava” Cake! Brilliant!

How To: Use a bar chart in Open Office Calc to represent data

In this screencast tutorial, Steve shows you how to quickly and simply create a bar chart, from the data you have entered into your worksheet in Open Office Calc. If you're looking for a simple and clear way to represent your statistical data, then a simple bar chart is an option you should look at using. So check out this tutorial and start making OpenOffice Calc bar charts today.

How To: Shuck oysters with chef Ming Tsai

This instructional how-to video, hosted by Simply Ming’s chef Ming Tsai, specializes in fresh oysters. Oysters are a very versatile type of seafood, they taste great with many or few ingredients. Watch this video cooking lesson as Ming shows you how the proper way to to shuck oysters.

How To: Prank the mouse click buttons

This is actually a really easy and fun prank to pull off. What it does is simply switch the right click on your mouse, to the left click, and switch the left click, to the right click. Confused yet? Follow these simple instructions to test it out yourself, and enjoy your victims reactions when they get this prank pulled on them, trust me, it's funny!

How To: Focus video image using blur

You can use a Gaussian Blur in a number of ways, but Israel Hyman's purpose in this video podcast is simply to expose you to some new possibilities. It’s a brief Izzy Video because he's just throwing out some ideas. In the future, he’ll show how to create the effect.

How To: Get music off an iPod and onto a Mac

Want to learn the easiest way to get music off an iPod and onto a Mac? A Webb from howdoimac.com recommends using iPodDisk, a great little application that mounts your iPod as a hard drive. Your simply drag your music off the drive onto your computer and into iTunes!

How To: Hit a fade golf shot

The fade is the most reliable golf shot shape to use under pressure - Colin Montgomerie swears by it. He reckons if you set up to shape the golf ball left-to-right in the air you'll have a far greater chance of hitting the fairway than if you simply aim straight.

How To: Prepare roasted garlic

Roasted garlic has an appetizing flavor that is not as pungent as fresh garlic. To use the roasted garlic, simply remove the cloves from the head, and squeeze out the paste that is inside. This is perfect for spreading on bread or using in recipes such as mashed potatoes.

How To: Steal a bike in New York City

This may sound like a terrible thing to show you how to do, but the Neistat Brothers are simply victims of bicycle theft who got fed up. They use their own bikes to show you how to steal a bike in NYC (in broad daylight) so hopefully you can learn from them, how to better protect your ride.

How To: Jailbreak an iPhone 3G or iTouch 2G 4.0 / 4.0.1

As of today, there are no legal barriers standing between you and jailbreaking your iPhone, iPad, or other mobile device. Hooray! If you were afraid of Apple coming to your house at night if you jailbroke your phone, you can finally let go of the fear and make your iDevice the beast it should have been all along! This video will show you how to jailbreak a iPhone 3G or iTouch 2G with iOS version 4.0 or 4.0.1 using Redsn0w. Now you can fully enjoy your Apple device.

How To: Protect cameras & stay organized while shooting video

Kipkay's ingenuity is enough to amaze us all, especially all of you indie filmmakers. These five tips for aspiring filmmakers will help you keep your sanity and avoid frustrating times. Have you ever got stuck in the rain while shooting? Have your recorder tapes ever gotten disorganized? Is your camera's display getting scratched up more than you want? Kipkay answers all of these questions with his five ingenious video tips.

How To: Stop Incoming Calls from Taking Over Your Galaxy's Entire Screen

With all the things you can do with your Galaxy, it's easy to forget it's still a phone at heart, and incoming calls that take over your entire screen serve as a rude reminder of this fact. Thankfully, Samsung handsets like the S10 and Note 10 come with a setting built-in that aims to keep these interruptions to a minimum.

How To: Enumerate NetBIOS Shares with NBTScan & Nmap Scripting Engine

NetBIOS is a service that allows for communication over a network and is often used to join a domain and legacy applications. It is an older technology but still used in some environments today. Since it is an unsecured protocol, it can often be a good starting point when attacking a network. Scanning for NetBIOS shares with NBTScan and the Nmap Scripting Engine is a good way to begin.

How To: Generate a Clickjacking Attack with Burp Suite to Steal User Clicks

Users are often the weakest link when probing for vulnerabilities, and it's no surprise they can be easily fooled. One way to do this is called clickjacking. This type of attack tricks the victim into clicking something they didn't mean to click, something under the attacker's control. Burp Suite contains a useful tool called Clickbandit to generate a clickjacking attack automatically.

WhatsApp 101: Control Who You Share Your WhatsApp Status Stories With

Sharing Stories via WhatsApp Status grants your friends access to your daily adventures in the form of GIFs, photos, videos, or simple texts. Like Snapchat, stories you share with your contacts disappear after 24 hours, giving you an extra layer of privacy since anything you post will not be permanent. And if you want to limit who can see your private stories, WhatsApp also has you covered.

How To: Inject Coinhive Miners into Public Wi-Fi Hotspots

Coinhive, a JavaScript cryptocurrency miner, was reportedly discovered on the BlackBerry Mobile website. It was placed there by hackers who exploited a vulnerability in the site's e-commerce software that allowed them to anonymously mine cryptocurrency every time the website was viewed. There's no doubt Coinhive, an innovative mining method, is being abused and exploited by hackers in the wild.

How To: Set Your Wi-Fi Card's TX Power Higher Than 30 dBm

Do you have an Alfa AWUS036NH Wi-Fi adapter that claims it can go to 2000 mWs, or some card that can supposedly transmit power over 1000 mW? If so, you may have run into problems setting your card's TXPOWER higher than 30 dBm, which is about 1000 mW. Well, I will show you how to break that barrier and go as high as you want!

How To: Optimize performance on your Windows Vista PC with CCleaner

There is a built-in tool in Windows Vista that allows you to clean up your hard drive and system, and it could be found by simply searching for "disk cleanup" in the start menu. But this provides a really basic cleanup, so for all of you who want something more extensive, there are free alternatives available on the web. Once is called CCleaner, which is a lot better. It's the number-one tool for cleaning your Windows PC.