Gathering Search Results

How To: Make Pinoy style baked macaroni

Sick of lasagna? Check out this recipe for baked macaroni and branch out to new baked pastas! This recipe for baked macaroni is made in the style of Panlasangpinoy, a baked pasta dish from the Philipines. This meal is large and serves many, so consider making this for your next pot luck or family gathering. It tastes so yummy, you won't even have leftovers to clean up! Enjoy!

How To: French braid short layered hair

Showing you how you can create the French braid look even with short layered hair about five inches in length. Starting at the front of your hair you begin the braiding process by gathering three lengths of hair. As you go further back you continue to gather hair into the braiding strands to continue the French braid look all the way back and secured with a scrunchy at the end to make a longer French braided style look otherwise not creatable with regular short hair. Easy to repeat and follow...

How To: Techniques for painting with fantasy artist Ed Beard

Curious about acrylic paints and how to apply them to your fantasy-inspired works of art? Get some tips from a professional! This tutorial hosted by Ed Beard, an internationally reknown fantasy artist known for his published works in Magic the Gathering and Tolkien takes us through a quick step by step approach to "block-in" techniques with acrylic paints. "The Evolution of a Dragon Painting" is a great how-to video for those of you aspiring to be painters!

How To: Shading techniques with fantasy artist Ed Beard, 1

Need a little help on your shading technique? This tutorial on shading and shadowing techniques is hosted by Ed Beard, an internationally reknown fantasy artist known for his published works in Magic the Gathering and Tolkien. This video demonstrates how to choose a light source when shading, the values of dark to light, and how to ultilize shadows to embelish the three-dimensional depth to your drawing.

How To: Wallpaper

This video tutorial shows you how to wallpaper. 1. Set the mood: To wallpaper a room you need caffeine and music, it's best to get that first. 2. Prepare the space: Basically this step is set to gathering tools, patching holes, cleaning and sanding the walls, moving furniture and removing outlet and switch face plates. The tools are as follows: level, pencil, tape measure, step stool, wallpaper paste, paint tray, paint rollers and brushes, wall paper, squeegee, water bucket, sponge. utility k...

How To: Make a tomato salad with basil and feta cheese

This tomato salad recipe with basil and feta is a delicious side dish and great to take-along to a party or gathering. With a loaf of crusty French bread tomato salads are a fresh and summery meal. Tomatoes in a salad are a beautiful and yummy way to bring your garden to the table. Watch and learn how to make this tomato, basil and feta cheese salad.

How To: Host a successful wine tasting party

LX.com's Shira Lazar visits Grace Restaurant to receive expert tips on tasting, serving, and picking out the perfect wine for your wine party. Wine tasting can be an elegant gathering, or a fun party with friends. Wines should be selected with the food serving in mind. Learn how to host a wine tasting party by watching this video tutorial.

How To: Everything You Need to Know About Inns & Greenhouses in Harry Potter: Wizards Unite

We Harry Potter fans all remember Hogwarts students pulling Mandrake Roots in the greenhouses in Chamber of Secrets. Well, in Harry Potter: Wizards Unite, we now have an opportunity to work in our own Greenhouses, as well as dine inside Inns scattered throughout the map. Let's take a look at how these two establishments help you along your magical AR journey.

Hack Like a Pro: Advanced Nmap for Reconnaissance

Welcome back, my novice hackers! Reconnaissance is one of the most important preparatory steps to hacking. As I have emphasized many times before here on Null Byte, you must know the operating system, the ports, the services, the applications, and sometimes even the language of the target to be effective. If you haven't taken the time to gather this info, then you are likely wasting your time.

Hacking macOS: How to Perform Situational Awareness Attacks, Part 1 (Using System Profiler & ARP)

The first few minutes after gaining access to a MacBook are critical — but where do we begin? Using tools built into macOS, we can develop an in-depth understanding of running background processes, detect antivirus software, locate sensitive files, and fingerprint other devices on the network. All of this can be done without installing additional software or modifying any files.

How To: Enumerate SMB with Enum4linux & Smbclient

SMB (Server Message Block) is a protocol that allows resources on the same network to share files, browse the network, and print over the network. It was initially used on Windows, but Unix systems can use SMB through Samba. Today, we will be using a tool called Enum4linux to extract information from a target, as well as smbclient to connect to an SMB share and transfer files.

How To: Use Photon Scanner to Scrape Web OSINT Data

Gathering information on an online target can be a time-consuming activity, especially if you only need specific pieces of information about a target with a lot of subdomains. We can use a web crawler designed for OSINT called Photon to do the heavy lifting, sifting through URLs on our behalf to retrieve information of value to a hacker.

News: Quanergy's New $250 Solid-State LiDAR Could Bring Self-Driving to the Masses

One of the big hurdles when equipping vehicles with sensors for autonomous driving is the cost. For example, the Light Detection and Ranging (LiDAR) sensors that power many versions of self-driving car technology are pricey, currently ranging from around several thousand dollars up to $85,000 per sensor—and vehicles often need multiple sensors to see enough of what is going on around them to drive safely.

Mac for Hackers: How to Organize Your Tools by Pentest Stages

With all of the bare-bones setup out of the way in our Mac for Hackers series, your Apple machine should be ready to run a significant amount of pentesting tools. We can pull tools from GitHub and compile them, we can pull dependencies or tools from Homebrew, we have both Python and Ruby. Everything is ready to go and now it's time to start building a toolbox on our local host.

Hack Like a Pro: The Hacker Methodology

Welcome back, my neophyte hackers! Many newbie hackers seem to be confused regarding the process or methodology to employ a successful hack. Most want to simply go straight to the exploit without doing the due diligence to make certain that the hack will work and you won't get caught.

How To: Use SSH Local Port Forwarding to Pivot into Restricted Networks

SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port forwarding, secure file transfer, and more. Using SSH port forwarding on a compromised host with access to a restricted network can allow an attacker to access hosts within the restricted network or pivot into the network.

How To: Create an Evil Access Point with MitmAP

The threat of an evil access point has been around for a long time, and with the rise of open public Wi-Fi, that threat is often overshadowed by how comfortable we are using third-party Wi-Fi hotspots at coffee shops and public spaces. While we've shown an evil twin attack using the Aircrack-ng suite of tools, MitmAP is a Python tool to configure custom APs for many types of wireless attacks.