Fundamental Machines Search Results

How To: Make spacer beads with an electric mandrel spinner

See how you can quickly, easily, and consistently you can make uniform lampwork spacers using the Electric Mandrel Spinner. An electric mandrel spinner is a tool that grips materials to be spun or machined. Watch this instructional lampworking video to see how molten glass may be shaped with a mandrel spinner. Mandrels are commonly used to shape beads of glass into a desired size and shape for jewelry manufacturing. This video shows you how to make glass spacer beads using a lampwork torch an...

How To: Quilt with perfect seam allowance

Here is a tutorial on getting a perfect 1/4" seam allowance for quilt piecing. The sewing machine foot will sometimes have a groove to allow you to make a perfect quarter inch seam automatically. If you don't have one of these, there are a few ways to make your own quarter inch seam guide.

How To: Make clay look like fabric for stop motion armatures

This video animation tutorial demonstrates a technique for creating a fabric-like effect out of clay for stop motion figures, or armatures. Instead of smooth clay, try to give a more authentic finish to clay that will be used to create clothing. This technique will also create patterned fabrics. You'll need to chop the clay up first in a food processor, and then put it through a pasta machine. Watch this instructional video and learn how to make clay look like fabric for claymation armature c...

How To: Make a grocery bag out of bandanas

Check out this tutorial that teaches you how to make a cotton reusable grocery bag out of bandanna. All you need is 2 bandanas, sewing thread, a sewing machine, scissors, and marking pens. This is a great, fashionable way to go shopping and cut down on plastic bags. Watch this how to video and you can save the earth in style with reusable grocery bags.

How To: Properly tie a toga for a party

Whether you're heading to a frat party, out for Halloween or just looking for a cool way to tie your towel at the beach - this video is here to help! Learn how to tie a toga, the ancient Greek way of dressing, and be ready for whatever costume situation may arise with a quick and cheap outfit!

How To: Hack WPA WiFi Passwords by Cracking the WPS PIN

A flaw in WPS, or WiFi Protected Setup, known about for over a year by TNS, was finally exploited with proof of concept code. Both TNS, the discoverers of the exploit and Stefan at .braindump have created their respective "reaver" and "wpscrack" programs to exploit the WPS vulnerability. From this exploit, the WPA password can be recovered almost instantly in plain-text once the attack on the access point WPS is initiated, which normally takes 2-10 hours (depending on which program you use).

How To: Do different styles of Jazz dancing

In this video series you will not only learn many of the basics for Jazz dancing but how to put them all together. Our expert covers everything from the type of shoes that are best for training to how to isolate your head when performing a move. These hands on videos will walk you step by step through the fundamentals and show you how anyone can be a dancer, even you!!

How To: 13 Black Friday Deals on Courses That Will Beef Up Your Hacking & Programming Skill Set

It's Black Friday time, and in 2020, that means a lot of online deals to make up for more stores closing on Thanksgiving, as well as everyone avoiding in-person shopping because of the coronavirus. But while you may wish to grab a better 65-inch 4K TV, the new PlayStation 5, or some hacker hardware on sale, Black Friday is also the best time to invest in your programming and cybersecurity education.

How To: Gather Information on PostgreSQL Databases with Metasploit

Attacks against databases have become one of the most popular and lucrative activities for hackers recently. New data breaches seem to be popping up every week, but even with all of that attention, databases continue to be a prime target. All of these attacks have to start somewhere, and we'll be exploring a variety of methods to gather information on PostgreSQL databases with Metasploit.

How To: Block All Robocallers & Telemarketers with Your Pixel's Call Screen Feature

When Google introduced the Call Screen feature with the Pixel 3, I had never been more excited to get a Pixel device. This AI feature provided real protection against rising spam and robocalls, which billions of people deal with each year. After a recent update to the feature, you can reduce robocalls and other spam calls to nearly zero.

How To: iPhone Not Charging Past 80%? Here's Why (& How to Fix It)

So you've been using iOS 13 for a little while and noticed your iPhone is pretty slow to charge. Using the 5-watt power adapter out of the box, in the time it used to take your iPhone to charge its battery to 100 percent, your iPhone is stuck at 80% or below instead. That's because Apple introduced a new feature in iOS 13 that slows down charging — but for a good reason.

How To: Create Packets from Scratch with Scapy for Scanning & DoSing

By using almost any packet-crafting tool, a hacker can perform denial-of-service (DoS) attacks. With the power to create just about any packet with any characteristics, a hacker can easily find one that will take down a host or network. Nmap and Hping are effective packet manipulation tools, but there's also Scapy, which is almost infinitely customizable.

How To: Get the Pixel's Feature-Packed Google Camera App on Other Android Devices

The Pixel is the phone to beat when it comes to cameras, and it's largely due to software. While its hardware is solid, Google's machine learning prowess and general coding wizardry are the biggest reasons the Pixel is so good with taking photos and recording video. What this means is that if you can get the Pixel's camera software, you can replicate the Pixel camera experience on other phones.

How To: Use Face ID with Sunglasses On

The iPhone X introduced the world to Face ID in 2017, and now, every new iPhone uses Apple's biometric security system instead of the old Touch ID. It's more secure than fingerprint scanners and it's even more user-friendly. True, it's not without its faults, but at least one of the biggest problems can be fixed.