E Simply Search Results

How To: Create a Cute Fishtail Braid in No Time

There are so many Hollywood actors who simply love the fishtail braid hairstyle. From Tamsin Egerton to Cheryl Cole to Nicola Mclean, everyone gives thumbs up to this cute braided hairstyle. A lot of them prefer wearing it with their lovely gowns at award shows such as Cannes. It's not surprising at all as to why these celebs love this look- it makes the crown area of the head look voluminous, it can be done even with hair that has steps, it goes with every attire, apt for any occasion as it ...

How To: 9 Creative Uses for All Those Holiday Wine Corks

While most people build collections of things with intrinsic value such as coins, stamps, or rare post cards, I collect wine corks—the natural ones, not the plastic kind. Corks are a natural product harvested from the cork oak tree. It takes the better part of 10 to 12 years before a tree can have its bark manually removed for the production of cork. Thankfully, no tree is harmed in the process and in 12 years, the tree bark can be harvested yet again.

How To: Replace a Headlight Switch for a 1998-2003 Dodge Durango.

If your headlights are not working when you pull the switch or if your turn signals are the only things working, Then your headlight switch might be broken. This is often due to loose connections or wear and tear on the part itself. The first thing I would highly recommend before starting this project is to make sure that your connections at the headlights are tight. You can test this by simply putting a piece of foil in the connector or by bending the prongs slightly. Also check to see if yo...

How To: Downgrade an iPhone to iOS 7.1.2 from iOS 8

There are a lot of great new features in iOS 8, but not everyone is enjoying them. Some of you may just genuinely prefer iOS 7 over iOS 8, and some of you may be experiencing lag on older devices like the iPhone 4S, however minimal it may be. Whatever the reason, if you don't want iOS 8 on your iPad, iPhone, or iPod touch, there's still time to downgrade back to iOS 7.1.2.

Hack Like a Pro: The Basics of the Hexadecimal System

Welcome back, my novice hackers! It has become clear from some of your questions that quite a few of you are unfamiliar with the hexadecimal system, or simply, hex. The hexadecimal system is used throughout computing and if you have never studied this Base16 numering system, it may appear relatively opaque.

How To: You've Been Unwrapping Hershey Kisses Wrong Your Entire Life

Removing the thin aluminum foil wrapping from a Hershey Kiss isn't necessarily a difficult thing, but even the easiest of things can be annoying sometimes. For instance, getting chocolate under your fingernail when you're trying to peel the wrapper off, or making a wrapper mess. To make this first-world problem go away, simply grab a Hershey Kiss in-between your index finger and thumb, then pull on the paper plume to yank the chocolate straight out of the wrapper. The plume was originally des...

How To: Make a Square Knot with Loops

This Square knot design feature picots, which are small loops at the sides of the knot. Picots are simply loops along the edges. Picot Designs are vintage Macrame techniques. They are often used to make the edges of craft items to look like as flower petals. This is a good project for children and beginners to learn one of the basic knots frequently used in Macrame. To this pattern you can add pearls and have an interesting look.

Stop Yelling at Your Roommates: How to Sync Bills, Chores, & Groceries Across Android & iOS

We've all heard our fair share of roommate horror stories, or have some of our own, because we never truly know who someone is until we've lived with them. Cohabitation issues generally revolve around things like bills, chores, cleaning, and groceries. Approaching a roommate, especially an adult one, to remind them to do their chores can be an anxiety-ridden and daunting task. After all, we're roommates, not parents!

Hack Like a Pro: How to Change the Signature of Metasploit Payloads to Evade Antivirus Detection

Welcome back, my budding hackers! I've written several listener guides on creating a malicious PDF or malicious Word document that would carry in it a payload with the Meterpreter, or reverse shell enabling you to own the system. One of the hurdles to using these techniques is the antivirus (AV) software on the target system. For instance, if you try to email a malicious PDF or Word doc, it's likely that the victim system will alert the victim that it contains a virus or other malware.

Hack Like a Pro: How to Use Metasploit's Psexec to Hack Without Leaving Evidence

Welcome back, my fledgling hackers! It's been awhile since we did a Metasploit tutorial, and several of you have pleaded with me for more. I couldn't be happier to oblige, as it's my favorite tool. For the next several weeks, I'll intersperse some new guides that'll help expand your Metasploit skills and keep you abreast of new developments in Metasploit, so look for them in the near future.

How To: Combine Two Images in Adobe Photoshop CS5.1

Video: . In Adobe Photoshop CS5.1 there are several ways to perform same action. I make a video tutorial in which you can learn that how to combine two images to perform your different operations. I used a very simple and quick method. To follow my method you can get a quick adjustment of two or more then two images just in single frame and get the result you desire.