Final Result Search Results

How To: Create a color scale out of polymer clay beads

Color scales are important to learning the subtle changes and variations in colors that result from mixing. Polymer clay is an excellent medium to create these color scales, and the beads don't need to remain prototypes of colors, but can be used in jewelry. Watch this video crafting tutorial and learn how to make a color scale out of polymer clay beads.

How To: Handle events in master and content pages on ASP.Net

In this video tutorial, Chris Pels will show how events are handled in master and individual content pages. Even though the end result of a master and individual content page is a single ASP.NET page rendered in the user's browser the event handling in each type of page is handled separately. If a control is located in the master page the corresponding event handler is located in the master page by default. The same is true for controls in the content page. See two approaches to having the ev...

How To: Create standard content layouts by nested master pages

In this ASP.Net video tutorial, Chris Pels will show how to use nested master pages to create individual master pages that represent different standard content layouts for a web site. First, see how several major commercial web sites use a standard set of content layouts. Next, see how to nest a master page within another master page, and use the design time support in Visual Studio 2008. Then, learn the considerations for establishing a “page architecture” which represents the major types of...

How To: Use the overworked defender tactic in a game of chess

Ever here of the "overworked" defender" chess move? Of course you have, but that doesn't mean you know how to pull it off. See how to do it, right here. A chess piece is overworked when it has more than one defensive job (guarding pieces or squares) to do. Typically, the overworked piece is exploited by capturing one of the pieces it's defending or occupying a square it's defending. This forces it to leave one of its defensive jobs usually resulting in material loss or checkmate.

How To: Tie the 'Windsor' knot

The Windsor knot, also (wrongly) known as the "Double-Windsor" (a non-existent enormous 16-move knot), is the most well known knot in the world. The Windsor is a large, symmetrical, self-releasing triangular knot. The tie was named by Americans in the 1920-30's after the Duke of Windsor. The Duke was known for his fondness of large triangular tie knots, but didn't in fact invent this particular knot. His secret was a specially tailored tie with an extra thickness of material.

How To: Do trigger point massage

Trigger point massage is a good technique to bring immediate relief to conditions like frozen shoulder, stiff neck, tennis elbow and headaches. Trigger points form whenever a muscle or joint is stressed beyond its capacity to recover. They are usually believed to be the result of an accumulation of toxic waste around a nerve ending. Active trigger points will create pain and discomfort.

How To: Use the Pythagorean theorem

Pythagoras was a smart man, so smart that his mathematical theory is named after him and still used today, more than 2,000 years later: the Pythagorean theorem. It implies that the square of the hypotenuse of a right triangle is equal to the sum of the squares of the other two sides. The Pythagorean theorem is a cornerstone of geometry. Here’s how to use it.

How To: Make a tasty cupcake

Throughout this video, The Cupcake Special, with Realizing Nuala, you listen to the song "Happy" as you watch a young woman demonstrate the correct and incorrect methods of baking and icing cupcakes. She begins the video by baking several dozen chocolate cupcakes in small paper cups. Then moves onto beating the icing, starting with orange, and then chocolate, and continues on making several other colors. Amidst the creation of the icing, you are shown other decorative features made for the cu...

How To: Identify Web Application Firewalls with Wafw00f & Nmap

Web application firewalls are one of the strongest defenses a web app has, but they can be vulnerable if the firewall version used is known to an attacker. Understanding which firewall a target is using can be the first step to a hacker discovering how to get past it — and what defenses are in place on a target. And the tools Wafw00f and Nmap make fingerprinting firewalls easy.

How To: Use YouTube's Search Filters to Find Videos Faster

Have you tried searching for 4K HDR videos on YouTube, only to get 1080p videos just because the uploader used "4k" or "HDR" in the description? Or have you tried looking for a video about something that just happened, except YouTube's algorithm surfaces established videos first by default, so all the results you get are older than a month? Well, there's a better way.

How To: Generate Private Encryption Keys with the Diffie-Hellman Key Exchange

When we are building programs that communicate over a network, how can we keep our data private? The last thing we want is some other lousy hacker sniffing our packets, so how do we stop them? The easy answer: encryption. However, this is a very wide-ranging answer. Today we're going to look specifically at how to encrypt data in Python with dynamically generated encryption keys using what is known as the Diffie-Hellman key exchange.

How To: Fast Search Gives You Quick Access to Everything on Your Android

Google Now is great for looking up movie times or finding your parking spot, but if you need to track down a file you downloaded, you're relegated to using a file explorer and, depending on your organizational skills, this can either be extremely easy or a huge pain in the ass. Unfortunately I land in the latter category, which is why I started using Fast Search by developer Mohamad Amin.

How To: Build an ARP Scanner Using Scapy and Python

As you might know, there are a multitude of tools used to discover internal IP addresses. Many of these tools use ARP, address resolution protocol, in order to find live internal hosts. If we could write a script using this protocol, we would be able to scan for hosts on a given network. This is where scapy and python come in, scapy has modules we can import into python, enabling us to construct some tools of our own, which is exactly what we'll be doing here.

How To: Why 'Whipping' Cooked Pasta in Sauce Creates a Perfect Dish

Most cooks know they should stir pasta a few times while it's cooking, for obvious reasons: as the noodles cook, they release a glue-like starch that makes them stick to one another. Stirring prevents them from clumping together in an unwieldy, inedible mass. Now Mark Bittman in The New York Times discusses a great technique from Italy that helps you produce a plate of tender, toothsome pasta evenly coated in rich sauce every time, but it involves stirring the pasta at the end of its cooking ...

Chef's Quick Tip: Char Your Citrus for Extra Flavor

We're a little citrus-obsessed, and with good reason: lemons, limes, oranges, grapefruit: Mother Nature really packed those babies with flavor, from peel (which you can zest without special tools) to juice. Now executive chef Amanda Freitag of Empire Diner has come up with a way to make those lemons and limes give up even more flavor by applying a lot of heat.