Examine Search Results

How To: Make a Grave Rubbing

Grave rubbing is more than just an art. It's a record of the past, one that so many people would just rather forget. And graves are the one way to reconnect with that world. Discover the ancient art of gravestone rubbing to record beautiful headstone images or to enhance your genealogy studies. It only takes a few simple tools, and you're on your way.

How To: Detect the symptoms of postpartum depression

It's not unusual to feel a little down after giving birth. You've been through a major life event, and your mind and body are recovering. Postpartum depression is more serious than the typical “baby blues” that can occur after childbirth. Learn how to identify this condition so you can treat it and spend more time enjoying your baby.

How To: Prevent gas

While intestinal gas is a normal occurrence within the digestive process, it can also cause bloating, burping and flatulence. Follow these tips to remedy the problem.

How To: Get rid of mice

If you see a mouse in your house, don’t kid yourself—his entire extended family has moved in with him. Reclaim your home, once and for all. Check out this Howcast video tutorial on how to get rid of mice.

How To: Clean the trackball on a BlackBerry Bold cell phone

This video instructs you on how to clean the trackball on the Blackberry Bold 9000. Begin by turning off your Blackberry and removing the battery. Using a torque T5 screwdriver, remove the 6 screws around the edge that hold on the cover. Remember that doing this will void your warranty. Once the cover is removed, use your screwdriver to lift off the circuit board. Be aware that the USB port can get stuck. If that happens just push the port down slightly and you should be able to remove the ci...

How To: Attack on Stack [Part 4]; Smash the Stack Visualization: Prologue to Exploitation Chronicles, GDB on the Battlefield.

Hi everyone! Last time we finished analyzing the assembly representation of our vulnerable piece of code (have I ever told you it is vulnerable?). This time we are going to introduce some fundaments about exploitation by demonstrating how to crash a program's execution. If that sounds lame, next time we will see how this crash can in fact be useful to control the program's execution, achieving remote code execution!

Exploit Development: How to Manipulate Code Execution with the Instruction Pointer

The one thing that separates a script kiddy from a legitimate hacker or security professional is the ability to program. Script kiddies use other people's tools, while hackers and security pros write their own tools. To that end, we're going to see how a stack overflow vulnerability allows us to flood a variable with enough input to overwrite the instruction pointer with our own commands.

Exploit Development: How to Read & Write to a Program's Memory Using a Format String Vulnerability

Format strings are a handy way for programmers to whip up a string from several variables. They are designed to save the programmer time and allow their code to look much cleaner. Unbeknownst to some programmers, format strings can also be used by an attacker to compromise their entire program. In this guide, we are going to look at just how we can use a format string to exploit a running program.

How To: Perform a proper golf takeaway

In this golf lesson golf instructor Steve Bishop discusses some popular takeaway methods, his whole club takeaway method, and examine some common faults among golfers. These tips will help you swing on plane from the very start.

How To: Check your Green Iguana for health problems

You don't have to have a university degree to understand the basics of Iguana health and wellness. Let our expert show you in this first section on iguana health how to examine the animal's body, from teeth to tail tip, to determine its measure of health and how to deal with problems. Ron also advises on when it is best to consult a veterinarian.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 7 (Windows Sysinternals)

Welcome back, my aspiring hackers! In many of my earlier tutorials, I mentioned the complementary nature of hacking and forensics. Both disciplines, hacking and forensics, benefit from a knowledge of the other. In many cases, both disciplines will use the same tool. In this tutorial, we will use another tool that can be used in either discipline—Sysinternals—a suite of tools developed by Mark Russinovich.

How To: Spell words in cursive handwriting

Typically taught during the elementary school years, cursive writing builds on the letter formation of block letters or printing. The pencil doesn’t leave the paper in cursive writing and letters flow together. If you don't know how to do this, check out this video tutorial. Learn to write cursive, step by step.