Functions Search Results

Tasker 101: 5 Useful Profiles to Help Get You Started with Android Automation

When it comes to automation apps on Android, Tasker is still the king of the hill. For a price of $2.99 on the Google Play Store, it's a great buy for any would-be tinkerer that would like to get into automating actions on their Android device. Then, when you consider that there's a free 7-day trial version available, there's almost no reason that you shouldn't at least test the waters with Tasker.

SQL Injection 101: Advanced Techniques for Maximum Exploitation

For SQL injection, the next step after performing reconnaissance and gathering information about a database is launching an attack. But something seems off .. in the real world, it's usually not quite as simple as passing in a few fragments of SQL code to an input field and seeing all that glorious data displayed right in the browser. This is when more advanced techniques are needed.

HoloToolkit: How to Add Voice Commands to Your HoloLens App

The HoloToolkit offers a great many, simple ways to add what seems like extremely complex features of the HoloLens, but it can be a bit tricky if you're new to Windows Holographic. So this will be the first in an ongoing series designed to help new developers understand what exactly we can do with the HoloLens, and we'll start with voice commands.

How To: Security-Oriented C Tutorial 0x0B - User Input

Hey readers! This tutorial will be the entry point for the introduction of buffer overflows. Something like requesting user input is a very common place for vulnerabilities to pop up and we will definitely have fun while trying to make programs crash. But for now, let's start with how we can get input from a user.

How To: Use the Talking Tom Cat app on an iPhone 4 or iPod Touch

Need some help figuring out how to use the Talking Tom Cat app on your Apple iPhone? This video tutorial presents an overview of the app's essential functions and features. For more information, including detailed, step-by-step instructions, and to get started using Talking Tom Cat on your own Apple iPhone 3G, 3GS, 4 or iPod Touch, take a look.

How To: Create Avatar-style Navi'i irises in Adobe Photoshop CS5

In this clip, you'll learn how to create Navi'i-style eyes (with special attention paid to the irises and pupils) with Adobe Photoshop CS5. Whether you're new to Adobe's popular raster graphics editor or a seasoned designer looking to better acquaint yourself with the new features and functions of the latest iteration of the application, you're sure to benefit from this free software tutorial. For more information, watch this video guide.

How To: Create a 300-style effect in Adobe Photoshop

Want to create a photo effect reminiscent of the film 300 in Adobe Photoshop? This clip will walk you through the process. Whether you're new to Adobe's popular raster graphics editor or a seasoned designer looking to better acquaint yourself with the new features and functions of the latest iteration of the application, you're sure to benefit from this free software tutorial. For more information, watch this video guide.

How To: Embed an image into text in Adobe Photoshop CS4 or CS5

In this clip, you'll learn how to create a simple image overlay effect for title text and headers in Adobe Photoshop CS4 or CS5. Whether you're new to Adobe's popular raster graphics editor or a seasoned designer looking to better acquaint yourself with the new features and functions of the latest iteration of the application, you're sure to benefit from this free software tutorial. For more information, watch this video guide.

How To: Tie a cow's tail for surgical or practical purposes

A cow's tail might be in the way of a variety of veterinary procedures or other practical functions. In order to get the tail out of the way, the cow's tail may be tied. Learn how to tie a cow's tail for surgical or any purpose without hurting the cow or damaging the bones by watching this video veterinary tutorial.

How To: Sandblast glass

Sandblasting has a bunch of functions. It can be used to soften rough surfaces, roughen soft surfaces, take off unwanted surfaces, or shape a surface. If you're curious about the process and wish to try it yourself, you can check out this video to learn how to sandblast glass with experts at the Corning Museum of Glass.

Tasty Testing: Artisanal Cheese Reveals Microbial Secrets of Deliciousness

Whether your palate runs to domestic or imported, a piece of cheese can be a real treat for the senses. Its smell, taste, and texture are all parts of its appeal. A big part of what makes that savory wonderfulness comes from the microbes in and on the cheese. Thanks to a team of researchers dedicated to studying those microbes, we have a better understanding of their importance to cheese and us.

Hacker Fundamentals: A Tale of Two Standards

If you read my article on the OSI model, you got a good overview on communications from that model's perspective, but how does that relate to TCP/IP? We're going to take it a step further, getting into the idea behind the two address concept. How does an IP address and a MAC address work together? If you want to hijack sessions and all sorts of lulz like that, you need to understand these concepts. Let's get into it, mates!

How To: The Novice Guide to Teaching Yourself How to Program (Learning Resources Included)

Today's post is a small go-to guide for beginner programmers in Null Byte. With many of our community members picking up programming from our Community Bytes, it only makes sense to lay out a one-stop guide for your reference. Hopefully this guide will help you make an educated and thoughtful choice on what programming languages you want to learn, and how you want to learn said languages.

How To: Use the Koadic Command & Control Remote Access Toolkit for Windows Post-Exploitation

Koadic allows hackers to monitor and control exploited Windows systems remotely. The tool facilitates remote access to Windows devices via the Windows Script Host, working with practically every version of Windows. Koadic is capable of sitting entirely in memory to evade detection and is able to cryptographically secure its own web command-and-control communications.

How To: Security-Oriented C Tutorial 0x21 - Linked Lists

Welcome to the final tutorial of the series on standard C. This article will cover the linked list abstract data type (ADT). There will be a lot of abstraction to try to deliver the understanding in the most basic way for easiest interpretation of what they are and how they work, then we will get into the guts of it and learn the technical code underneath. For those who have yet to grasp the concept of pointers, it's advisable that you do that first before approaching this. Having learned thi...

IFTTT 101: How to Find & Set Up Applets

IFTTT (short for If This, Then That) is an amazing piece of software that automagically links actions on your phone with online services and real-world objects. For example, an applet could read: "if you come home, then turn on Wi-Fi." IFTTT goes further than just using simple smartphone functions, though — thanks to applets, it's fully configurable with a ton of smartphone apps.