Function Search Results

How To: Control Your Android Phone via Your Computer for Easier Multitasking

In our society, multitasking is an obsession. Whether it's driving while using your phone (DON'T DO IT) or drinking a cup of coffee while typing up some work, we multitask at every turn of the day. People that work all day in front of a computer are especially prone to multitasking, and that's why XDA-Developers member Floyd1973 has developed a way to control any Android phone while connected via USB to a Windows or Linux PC. Android Remote Phone Tools

HoloToolkit: How to Add Voice Commands to Your HoloLens App

The HoloToolkit offers a great many, simple ways to add what seems like extremely complex features of the HoloLens, but it can be a bit tricky if you're new to Windows Holographic. So this will be the first in an ongoing series designed to help new developers understand what exactly we can do with the HoloLens, and we'll start with voice commands.

How To: Security-Oriented C Tutorial 0xF8 - PE File Infection

How is it goin', fellow 1337 haXX0rZ! dtm here with another article, this time, we'll be looking at infecting PE files, executables in particular for this write-up. Obviously some prerequisite knowledge will be needed since this isn't really newbie-friendly. If you are still a beginner, fear not, it might still be interesting to read! Hopefully!

How To: Map Wardriving Data with Jupyter Notebook

With the Wigle WiFi app running on an Android phone, a hacker can discover and map any nearby network, including those created by printers and other insecure devices. The default tools to analyze the resulting data can fall short of what a hacker needs, but by importing wardriving data into Jupyter Notebook, we can map all Wi-Fi devices we encounter and slice through the data with ease.

Exploit Development: How to Learn Binary Exploitation with Protostar

Being able to write your own hacking tools is what separates the script kiddies from the legendary hackers. While this can take many forms, one of the most coveted skills in hacking is the ability to dig through the binary files of a program and identify vulnerabilities at the lowest level. This is referred to as binary exploitation, and today we're going to check out a tool known as Protostar.

News: We're Very Close to the Dark Future of Deeply Augmented Reality in Black Mirror's 'Playtest'

Black Mirror, Netflix's technology-horror anthology, never fails to provide thought-provoking entertainment centered around emerging and futuristic technologies, and the third season's second episode, "Playtest," delves deep into the worlds of mixed, augmented, and virtual reality. While designed to leave you haunted by the end, offering a more "evil" narrative than we'll likely see in our actual future, the episode explores possibilities that aren't as far off as one might think.

How To: Use height change in tango

In this tutorial, we learn how to use height change in tango. This will combine many elements of tango to change height deliberately for function and style. You do not want to change your weight and height without knowing it, because it can change how you dance and make it look completely different. Pay attention to your body and how your feet are placed on the ground. If your body weight is shifted too much to one foot it can change how you are dancing and the height of your overall self. Us...

How To: Embed a fundraising widget onto your Facebook page

In this how-to video, you will learn how to embed a social or fund raising widget on to your Facebook page. Look for static fbml on the Facebook search function. Click on it and add to page. Next, press add static fbml. Now you are finished. Go to edit page and click edit on the application. Now you can embed whichever code you need to paste into your Facebook page. Do not worry about what the code does, as you do not need to know it in order for it to work. Save the changes and go back to th...

How To: Turn a used TV into an oscilloscope

Leeann of Hierchiss explains how to turn a TV into an oscilloscope. Turn the TV on and make sure it works. First, unplug the power. Take the back off the television. Cut the four picture wires that attach to the circuit board. Strip the ends of the wires. Tape the remaining wires off to prevent short circuiting. Clamp the red and yellow wires and attach to a 1/4 inch jack which feeds into a tape player. Repeat the same process for the green and blue wires. Plug in the TV to make sure the conn...

How To: Make an easy homemade cheesecake

In this video you'll learn how to make an easy and delicious home made cheesecake topped with some fresh kiwi slices. Easy and quick to eat for you and the entire family. This is a perfect desert to make for the next family function for everyone to enjoy. It's also to cook for those of you on a budget.

How To: Clean an oven spill quickly using salt

Like all appliances, the oven has a tendency to get dirty inside. Unfortunately, unlike most appliances, the oven is extremely difficult to clean out. Many ovens have a clean selection that will burn off all the excess items in there, but even those left over ashes can sometimes be difficult to wipe away. If your oven does not have the clean function, the method most people use is to clean it out with an oven cleaner. It will most likely consist of spraying the cleaner on all dirty parts of t...

How To: Make werewolf stilts

Here is a three part video series which explains the function and parts of constructed stilts, and how to turn them into werewolf stilts by adding fur and padding for your comfort! Make sure to check out the mask - Make a furry werewolf mask!

How To: Manipulate User Credentials with a CSRF Attack

Web 2.0 technology has provided a convenient way to post videos online, keep up with old friends on social media, and even bank from the comfort of your web browser. But when applications are poorly designed or incorrectly configured, certain flaws can be exploited. One such flaw, known as CSRF, allows an attacker to use a legitimate user's session to execute unauthorized requests to the server.

How To: Exploit Shellshock on a Web Server Using Metasploit

One of the most critical bugs to come out in the last five years was Shellshock, a vulnerability which allows attackers to execute arbitrary code via the Unix Bash shell remotely. This vulnerability has been around for a while now, but due to the ubiquity of Unix machines connected to the web, Shellshock is still a very real threat, especially for unpatched systems.

News: The 5 Best 'Car Mode' Apps for Android

In general, smartphones and cars don't mix—but this is mainly because you have to take your eyes off the road to poke around on your handheld gadget. In reality, the only difference between your smartphone and your car's FHWA-approved infotainment system is that the latter is mounted in a fixed position and has an oversized interface that makes it easy to use without looking away from the road.