Fundamental Machines Search Results

How To: Hack a Pepsi Machine

Learn how to con a vending Pepsi machine and access a secret (but benign) debug menu with this hack how-to video. While this hack won't get you any free soda, you might, at the very least, impress your friends with it. For complete instructions for this simple, pushbutton hack, take a look at this instructional video!

How To: Work out your quads

This video demonstrates how to work out your quadricep muscles using a leg extension machine. The video walks you through adjusting the machine to your body type and explains how to perform the exercises correctly.

How To: Use high voltages using the Wimhurst machine

In this video, we learn how to use high voltages using the Wimhurst machine. First, you must have a spinning wheel, double ended brushes, collecting combs, leyden jars, adjustable electrodes, and small metal plates. Once you connect all these together, you will notice the brushes on either side are perpendicular to each other and the wheel spin in opposite directions. Spin the wheel and then listen to the sound it makes. The plate will then charge with different electrons and create positive ...

How To: Install and run Google Chrome OS with Virtual Machine

At the end of last year Google released Chromium OS, the source code to their soon-to-be-released operating system Google Chrome OS. This has allowed millions of people to preview the new OS and make suggestions. Do you want in on that action? This video will show you how to install and run Google Chrome OS on a Mac using a virtual machine like VMWare or Virtual Box. Now you can be a part of the future of operating systems. Maybe.

How To: Make a blood burst machine for film

Alright, so you have some fake blood, and you want to use it in your movie. Unless you are showing a wound after it has happened, and if you want to do anything depicting people getting shot, you are going to have to find a way to make the blood "shoot" out of the wound when it happens. This video features instructions for making a homemade blood burst machine that you can use to make your actors spurt blood when they get shot, sliced, or whatever else you plan on making happen to them.

How To: Make a Christmas card using Cricut Paper Pups

If you own the paper cutting craft device, the Cricut, you can make Happy Howlidays Christmas cards by using the Cricut Paper Pups cartridge. The Cricut machine is for crafters who want to cut out paper and graphics for scrapbooking and card making. The card shown will have a dog on the front and your choice of colors for paper. Red or green paper would work well since this is a Christmas card. You can also use the basic Christmas shapes with you Cricut machine and add those to the card as we...

How To: Fully Anonymize Kali with Tor, Whonix & PIA VPN

Hacking from a host machine without any form of proxying is reckless for a hacker, and in a penetration test, could lead to an important IP address becoming quickly blacklisted by the target. By routing all traffic over Tor and reducing the threat of malicious entrance and exit nodes with a VPN, we can configure Kali to become thoroughly private and anonymous.

Dev Report: Machine Learning Agents Come to Unity

As we have seen previously with the likes of SethBling's Mar I/O videos and other examples, video games seem to be a great source for training AI neural networks. Augmented reality and machine learning are part of a collection of technologies that seem to be growing toward a point of maturity, and that will likely cause them to be intertwined for the foreseeable future. As developers, machine learning will definitely change the way we create software in the coming future. Instead of going lin...

How To: Hack Metasploitable 2 Part 2

In this tutorial I am going to look at what services are running on our Metasploitable machine and setup firewalls. This is more basic scanning of our machine to get an idea of how to get in. Obviously in a real engagement you would want to do research on Google and whatnot to find out as much as you can about your target but this series isn't about all of that.

How To: Play Against Very Aggressive Players

There are plenty of times when very aggressive poker players will make life difficult for you because they're always looking to put max pressure on their opponents to try and get them to fold out their medium strength hands. Knowing how to play against loose aggressive opponents is an important part of beating the games you play, especially the more aggressive online 6-max games. It’s important to know some fundamental strategies outlined in the video below. The common strategy used for each ...

How To: Build the z-axis for a CNC router

A CNC router machine is probably the most useful tool a hobbyist can own, but the price for a CNC machine on the market is way more than the average hobbyist is willing to spend. You can build your own CNC with very basic tools, little knowledge of machinery, mechanics, or electronics, but be warned, these machines are inherently dangerous, so wear the proper protection and use common sense. At the very least, read the instructions and precautions on every tool you use.

How To: Roll clay without a pasta machine

In this tutorial, we learn how to roll clay without a pasta machine. First, warm up the clay in your hands and put them between two flat sticks. Next, use a glass bottle or cup to roll out the clay. Make sure the bottle is on the paint sticks as you are rolling. This will leave your piece of clay thick but flattened out. You can make this as thick or as thin as you would like to be. You can do this several times and use different types of sticks or side holders to change how the clay looks, e...

How To: Edit the registry on a Windows machine

In this tutorial, we learn how to edit the registry on a Windows machine. This is a major part of your computer that will change if you delete something that you shouldn't have deleted. Make sure you back up your computer before you do this, just in case you do something wrong with your computer. Now, go to the run command and type in "regedit". In the new window, you will see the registry editor. From here, find the location of the virus string by using a guide so you know what folder to go ...

How To: Get into a password-protected Windows machine

In this video, we learn how to get into a password-protected Windows machine. First, you need to have this software onto your computer from http://www.piotrbania.com/all/kon-boot/. Once you have this, you will burn it onto a disk. When you forget your password, pop this disk into the drive on your computer. After this, boot it up and then reset your computer. After this, you will see a pop up appear on your computer and it will start to go through your computer to get the password. When it fi...

How To: Do roller arm exercises with the on a Pilates Reformer

This clip demonstrates a Pilates Reformer arm exercise routine which utilizes the machine's magic roller. routine With pilates, as with any physical fitness system, a basic mastery of proper technique is essential for both maximizing the effectiveness of your workouts and avoiding accidental injury. Whether you're looking to slim down or merely tighten up your core, you're sure to be well served by this home fitness how-to from the folks at Balanced Body Pilates. For complete instructions, gi...