Fr Print Search Results

How To: Make an Unusual Birthday Map Card

This tutorial is for a great card that is ideal for any men out there, or for a travel/ Bon Voyage etc. I must admit I had great difficulty with part of this one! as you'll see when you watch it.. but stick in there as its a fab demonstration for a good idea! plus it goes to show that I can waffle when under stress.... enjoy. Step 1: Items Used

News: This DIY Walking Paper Robot Shoots Rubber Bands from Its High-Powered Gatling Gun Arms

One amazing Japanese papercraft enthusiast has built a walking 'robot' that's made of nothing more than paper, rubber bands, and a few wooden shafts for stability. It's been dubbed the 'Paper Robot III,' and even the cogs and gears are made of paper. The creator made a video detailing his entire process, and he's selling kits to make your own for about $40 US, if you're too lazy to do everything from scratch.

News: Doctors Use 3D Holograms on the HoloLens to Aid in Collarbone Repair During Surgery

Late last year, two surgeons from the Instituto de Ortopedia e Traumatologia de Jaraguá do Sul in Brazil started using a combination of 3D printing and the Microsoft HoloLens to help plan spinal surgeries. And now, with the rest of their team, they've successfully performed a surgical procedure on their first international patient using their 3D impression planning and augmented reality process.

How to Meterpreter: Obtaining User Credentials with PowerShell

In this article I will show you how to obtain victim's credentials without cracking any hashes. There are a couple of ways to perform this task (for example dumping the SAM file and cracking the NTLM hashes), but here I will explain how to do it using PowerShell and a bit of social engineering. We are going to create a fake login popup.

How To: Security-Oriented C Tutorial 0x11 - Command Line Arguments

In many programs on Linux, you'll come across programs which allow you to specify additional arguments instead of just simply running the program by itself. If you've used the Kali distribution, I'm more than certain you'll have come across these with the command line tools, else if you have been following these tutorials, we have already come across three tools which also use the same technique, i.e. gcc, gdb and wc. How do we do this with C? Let's find out.

How To: Security-Oriented C Tutorial 0x01 - Hello, World!

Welcome back, reader! In this tutorial, we will be covering our first program! So let's get to it. We all know the unspoken tradition of the first program when learning a language and of course, here we will respect and complete it. Fire up your favorite text editor (be it vim, emacs, gedit, it's all the same to me, no h8) and try to keep up.