Flag Represent Search Results

How To: Program with Python

Welcome to Google's Python Class – a seven-segment, two-part free virtual class for people with a little bit of programming experience who want to learn Python. The class includes written materials, lecture videos, and lots of code exercises to practice Python coding. The first exercises work on basic Python concepts like strings and lists, building up to the later exercises which are full programs dealing with text files, processes, and http connections. The class is geared for people who ha...

How To: Calculate azimuth in trigonometry

Azimuth is simply the angle of an object in the sky along the horizon. Yes, it's spherical trigonometry but it's not difficult! Check out this video and in just a few minutes you will be able to solve azimuth problems on your own.

How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack

Cracking the password for WPA2 networks has been roughly the same for many years, but a newer attack requires less interaction and info than previous techniques and has the added advantage of being able to target access points with no one connected. The latest attack against the PMKID uses Hashcat to crack WPA passwords and allows hackers to find networks with weak passwords more easily.

How To: Convert text to SmartArt in PowerPoint: Mac 2008

Dull and drab bulleted lists are no longer necessary with the help of PowerPoint 2008 for Mac. When you make a bullet list in PowerPoint, you can now transform those boring text charts with actual visual charts and graphs and more. The Microsoft Office for Mac team shows you just how to convert text to a SmartArt graphic in this how-to video.

How To: Use micro-misters for drip irrigation systems

Micro misters allow for low volume of water over a wide area. They give good moisture coverage. Systems can be pulled up, changed and made into what you need it to be. Keep potted plants separate from other plants. They should have their own system. There is a system to encourage growth of root systems of various plants. Shrubs get two emitters in case one clogs up, the plant still has moisture. Having the water at the base of the plant limits weed growth. There is a temporary system to get t...

How To: Reset Safari's Experimental Features to the Defaults to Fix or Troubleshoot Browsing Issues

Safari's advanced experimental features give you access to new browser initiatives, upcoming web tools, element changes, behavior adjustments, and other preliminary feature tests in development by Apple. If you use them on your iPhone, you can either improve your Safari experience or wreck it. Resetting the flags provides a fresh start.

How To: Hack Apache Tomcat via Malicious WAR File Upload

Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web management interfaces should be scrutinized just as hard as the apps they manage, especially when they contain some sort of upload functionality. By exploiting a vulnerability in Apache Tomcat, a hacker can upload a backdoor and get a shell.

How To: Use Photon Scanner to Scrape Web OSINT Data

Gathering information on an online target can be a time-consuming activity, especially if you only need specific pieces of information about a target with a lot of subdomains. We can use a web crawler designed for OSINT called Photon to do the heavy lifting, sifting through URLs on our behalf to retrieve information of value to a hacker.

How To: Detect Vulnerabilities in a Web Application with Uniscan

With the number of web applications out there today, it comes as no surprise that there are just as many vulnerabilities waiting for hackers to discover. Finding those vulnerabilities can be a difficult task, but there are plenty of tools available to make the process easier. While it won't help find any zero-days, web scanners such as Uniscan will detect common vulnerabilities.

How To: Use UFONet

With the release of the Mirai source code, botnets are back in a big way. In the early days of botnets, zombies (infected hosts) would report to IRC (Internet Relay Chat) channels for CNC (command and control) instructions. Modern botnets have evolved, but they continue to use the same concepts as their predecessors.

How to Train Your Python: Part 4, Basic User Input

In the last iteration of how to train your python, we covered basic string manipulation and how we can use it to better evaluate user input. So, today we'll be covering how to take user input. User input is very important to scripting. How can we do what the user says if we can't tell what the user wants? There are multiple ways to take input, we can give the user a prompt and take input from them directly, or we could use flags/switches, and take their input before the script is even execute...

How To: Use the Android App My Tracks to time yourself and save your running route

This video represent a bit of a digression for the Google Webmaster series of videos, spotlighting a cool Google-designed Android app and how to use it. The app in question is My Tracks, a free app that allows runner, bikers, and other distance exercisers to keep track of their distance, pace, splits, elevation, and all sorts of other information automatically with their phone. It will even create and save a map of your course, which you can then share online.

How To: Draw a rose garden with Michael Weisner

In this video tutorial, viewers learn how to draw a rose garden. Begin by marking the locations of the objects. Then draw the rose bushes around the garden pathway. Draw the lines with some cross hatching. This will give the bushes some form and feel. Add some circular boxes in the bushes to represent the roses. On the pathway, add some grass on the edges and stones on the path. In the center, draw a center piece and draw an arch over it. Finish by adding details to the roses. This video will...

How To: Solve word problems using proportions

This video shows the method to solve word problems using proportions. In the given problem, we have to find the time taken by a person to type 390 words if the person takes 1 minute to type 30 words. This can be solved using proportions. We take two fractions which are equal. We type '30 words' in the numerator of the first fraction and 1 minute in its denominator. This fraction must be proportional to the second fraction. The second fraction has '390 words' in the numerator and the variable ...

How To: Make an Italian margherita pizza

Everybody's favorite food is pizza. But not everybody knows how to actually make a pizza, which is practically a sin. And this "margherita" style pizza is a great one to learn, full of Italian simplicity— red tomato sauce, mozzarella cheese, and green basil— all the colors of the Italian flag. Check out the recipe for this delicious margherita pizza.

Walkthrough Assassin's Creed 2: Glyph Puzzle 10

Figure out the 10th puzzle, Apollo, in Assassin's Creed 2. Image 1: Highlight the lunar lander just down and to the left of the moon. Puzzle wheel: Another linked-ring rotation puzzle. Your job here is to align all the channels; do this by moving the fifth ring to the left six times, the second ring to the left four times, the fourth ring to the right three times and the third ring to the left five times. Then snap the first ring into place. Image 2: Move the cursor down between the flag and ...

How To: Buy flowers for your girlfriend

Sure, you can go online and send the first flowers you see, but a little thought and planning will go a long way toward impressing her. Sure, you can go online and send the first flowers you see, but a little thought and planning will go a long way toward impressing her. You will need a friend or relative of the recipient. Send her favorite. If she’s ever mentioned a favorite flower, buy that. You’ll get bonus points for listening to her. If you have no clue, ask a friend or relative of hers ...