This is a tutorial video on uploading HD quality video onto YouTube. The video is simply a screen shot view of the YouTube home page. As the narrator goes through the steps the cursor moves and clicks on what you should click on. He advises to click on upload; he clicks to choose a video. The video must have a certain resolution to be assigned HD video. He indicates that YouTube will accept a variety of file formats to upload. You must use the 44.1 kHz frequency rates to get the best resoluti...
This video will show you how to create a flow chart in MS Word 2007. First click on the Insert tab. You can see the smart art option, click on it. A "Smart Art Graphic" window will appear.
This video will demonstrate the process to implement page numbers in your Microsoft Word 2007 documents. The video starts out by showing the Insert Tab on the Microsoft Word 2007 Ribbon. On the Insert Ribbon, you will see an icon titled Page Number. All of the Page Number options are available when you click the down arrow directly beside the icon. The are many different position options such top of page, bottom of page, page margins, or current position. The customization options are as endl...
In this video the instructor shows how to create charts and graphs in Microsoft Word. First, open the Word document and select an area to insert the charts. Now go to the Insert tab in the ribbon and select the Chart icon. The Insert Chart window opens up with various chart templates. There are various categories of charts like Line, Pie, Bar in the left hand side. In the right hand side you can see the sample charts available and you can select any of them that you want. Now it transfers you...
This video describes the process for inserting a 3D animation into a video clip. The video starts by outlining several software programs you will need to complete this project. Don't worry, the presenter gives web addresses and titles for all of the programs needed. After all software is loaded, the presenter beings inserting key frames and x, y coordinates to make the 3D animation move along the correct path. Finally, after the animation path is complete, the video shows how to render the fo...
In this video tutorial by Task Tutorial we learn how to create a YouTube subscribe button using Adobe Illustrator. The first step to creating a button is to select the rectangle tool and draw a bar and then select a gradient fill. Next create the first color in the gradient and then the second color in the gradient. After that you'll want to change the gradient angle and also change the stroke width. Then you'll want to edit the stroke color to 9.6%. Then select the text tool and create your ...
Do you want to compress your video files less than five times the size while keeping the same quality? If yes, then this video shows you how. By compressing video files you can save a lot of space. Then, it can be easily burned to a DVD or even uploaded to a file-sharing website. To do the compression, you need to use Windows Movie Maker software. Open the video file in Windows Movie Maker. Now, move all the clips into the story board. Open the option "Save to computer". Now, Windows Movie Ma...
This is a highly informative video tutorial on how to use the software CamStudio to screen record anything on one's desktop. One simply has to open a search engine like Google, type in 'camstudio' and hit the search button. On Google, the official website, camstudio.org, is the first one in the search results. Once that is opened, just scroll down, click on the link camstudio20.exe, and then click 'save file'. Once downloaded, this software can capture all the audio and video activity on the ...
In this online video training tutorial, Task Training shows us, how to create a web button using Adobe Illustrator. The 1st step is to select the rectangular tool in Illustrator and set the size you want your button to be. The 2nd step is holding the shift key you can re-size your shape. The 3rd step is to give the button some color such as a gradient. The 4th step is to add a drop shadow to the button by going to Styles and then selecting Drop Shadow. The 5th step is add text to the button t...
Need a way to convert your scanned documents back into text files? Check out this video tutorial on how to convert scanned documents (JPG, PDF) to text.
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to split video files with MKVToolnix on Ubuntu Linux.
Check out this interesting video to make photorealistic stencils for t-shirts, bags, and other accessories. This video documents how to make a Nikola Tesla shirt. With Adobe Photoshop, it is possible to simplify a found image into a graphic format perfect for stenciling. You can then print out the altered image into mylar or another water resistant paper. After carefully cutting out the stencil, place the mylar over an ironed t-shirt. Complete the stenciling process by dabbing paint into all ...
At first glance there doesn’t look like a way to save your slideshows into a format that you can send to some one. If you look a little further you’ll see you can indeed export them though. It exports the whole slideshow into a PDF Presentation (much like Photoshop’s PDF presentation automation). However, it won’t include any music tracks you’ve added in Lightroom. Well there’s a workaround if you’ve got Acrobat Professional. You can go in after the fact and embed the music to the presentatio...
Since the day of the Xbox 360 release, storage space for the device has been overpriced beyond belief. OEM 250GB HDD models still cost $110 USD! A 250GB hard drive should not destroy my wallet, Microsoft. Storage space, especially on HDDs, is cheap. You can buy a removable 2TB external for only $100 USD, so it's a little beyond my comprehension to see how they calculate their MSRP to yield such a large profit. On the other hand, Xbox 360 had very impressive hardware specs back in the day, equ...
In this video, we learn how to use KeePass password generator. First, open the entry to edit the existing password and type in your username and e-mail address. Type in notes if you need it, then click on the bottom key icon. This will generate a password for you when you click on it and cover it up. If you click it once more, it will uncover what the password is. You can decide what kind of password you want and make one specific for the account you're using. When finished, you will have a n...
In this how to video, you will learn how to make a tight rope walking magnet. You will need a power supply with currents between 15 to 25 amps. A thick wire from a half to one centimeter is also needed for the tight rope. A small neodymium magnet will also be required. String the wire from one end to another. Place the magnet at one end. Use a pair of pliers and a piece of metal as a switch to run the current through the wire. Once that is done, the magnet should go down the wire. A magnetic ...
There are three components of hitting a 300 yard drive in golf. 1st component is make sure that the top edge of the club should be below the top of the golf ball. The second component is making a complete turn in the back swing. The shoulder here should turn more than 90 degrees. The third component is to swing with tempo so as to maintain the rhythm and balance of your body. This step of the tee consumes more than 80 % of the potential energy of your body. So using these 3 steps you automati...
In this economy being competitive for a job means your application must stand out above the rest. Here's how to write a cover letter to successfully introduce your resume. Make sure your cover letter follows business letter format. Your name and address must be written at the top left corner. The employer's name and address are written just below. The letter should be addressed to a specific person within the company. Paragraphs in a business letter are not indented, but instead are left just...
Ever wonder why Windows comes with MS Paint? Well, from this video v=ElrldD02if0], it's amazing how that tiny, little program so often overlooked by most people can, in the right hands, be used to create stunning computed generated drawings. In this video, the author records himself drawing a concept car from scratch. There are no audio or text comments, but rather the video teaches by example. The author time-compressed his work, so don't expect to make a similar work in only five minutes!
MrfixitRick demonstrates the Shake Flashlight Shaker, as it generates electric power out of faucet water pressure. A Tesla CD Turbine is used to convert the kinetic energy of water into rotation. Then, a connecting rod and magnets charges the built-in battery of the shake flashlight.
With Avatar, Facebook's personalized stickers for use on its social and messaging platforms, those who aren't on Facebook or have otherwise dumped the social network may feel left out.
Adobe sets the standard for graphic design. Since launching its subscription-based Creative Cloud in 2011, Adobe has consistently updated its suite of applications to serve the needs of the modern designer.
To be honest, the Mail app for iPhone had always been somewhat forgettable. It lacked many of the features that made third-party clients like Spark and Edison better, but with iOS 13, the gap between Mail and its competitors is much smaller. Apple updated the layout and added many new features to its native emailing app, and that may be just enough to get you to switch back.
After building a tech empire on revenues from search advertising, Google is not about to sit back and let Snapchat, Facebook, 8th Wall, and others draw all the AR marketing attention to their platforms.
The newest version of macOS has arrived. While everyone's mind is being blown by Mojave's groundbreaking new Dark Mode, we'll be taking advantage of its insecure file permissions to establish a persistent backdoor with a self-destructing payload that leaves little evidence for forensics.
A powered-off Windows 10 laptop can be compromised in less than three minutes. With just a few keystrokes, it's possible for a hacker to remove all antivirus software, create a backdoor, and capture webcam images and passwords, among other highly sensitive personal data.
Android users have had access to live wallpapers since the Eclair days, but some newer apps have made this feature even more useful. Now, you have the ability to use GIFs as your wallpaper, and through the marvels of modern technology, you can even set a video as your home screen and lock screen background.
Not all remakes of video game classics turn out well, but a new augmented reality take on Super Mario is likely to draw in fans of the Nintendo hit.
Just days after the launch of Google Poly, the marketplace for 3D virtual objects that developers can use for augmented and virtual reality apps, SketchFab, the current leader in the space, is firing back with a major enhancement to its platform.
When a firm like Techstars believes that augmented reality is an attractive industry to invest in, there's a high probability that it's right.
If giving truly is better than receiving, then The Box AR should be the best ARKit app available when iOS 11 releases next week.
A vaccine against HIV might prevent the disease that we can't seem to cure. Some HIV patients make antibodies that can take down the virus, much the way a vaccine might. But, scientists haven't been able to provoke that type of response in other people. However, in a process that might work in humans, a group of researchers has successfully generated antibodies in cows that neutralize multiple strains of HIV.
The Raspberry Pi loads an operating system from whatever SD card you insert, allowing you to keep different operating systems on separate SD cards depending on which OS you wish to run. A tool called BerryBoot cuts down on the number of SD cards needed by providing the ability to boot multiple operating systems from a single SD card, similar to Boot Camp for Mac computers.
Snapchat accidentally—and then intentionally—announced their digital eyeglasses, known as Spectacles, over the weekend. While we'd hoped their augmented reality-heavy platform would result in related hardware, Spectacles unfortunately seek to "reinvent" little more than a video camera.
In usual Apple fashion, there are new wallpapers to go along with their new operating systems, iOS 10 and macOS Sierra. The background that's included in iOS 10 for iPad, iPhone, and iPod touch is a crashing aqua-colored wave with land just below its surface, and macOS Sierra's is a razor-sharp mountain ridge from the Sierra Nevada mountain range in California.
In this tutorial I am going to show you how to create an undetectable Meterpreter Trojan using a Domain name. I have taken a few guides/tutorials and built it into one. The first part is creating the DNS Payload. The second part is creating the Executable file. Part 3 is using both in Shellter to create your undetectable Trojan. Part 4 is setting up your listener using Armitage.
Hello everyone. It's been a while since I've posted anything (with good reason). But, now that the digital dust has settled, it's time to be an adult about this. I will be continuing to post to Null Byte on a smaller scale, and will also fully participate in whatever communities Null Byte members branch into.
Welcome back, my greenhorn hackers! In many cases when a computer, phone, or mobile device is seized for evidence, the system will have graphic images that might be used as evidence. Obviously, in some cases these graphic images may be the evidence such as in child pornography cases. In other situations, the graphic images may tell us something about where and when the suspect was somewhere specific.
If you use Google Keep, you'll be happy to know that you can add items to lists and even start new ones with "OK Google" voice commands on Android, and it works fairly well. (Hat tip to Reddit user rambantu for finding this trick.)
Welcome back, my budding hackers! Metasploit, one of my favorite hacking/pentesting tools, has so many capabilities that even after my many tutorials on it, I have only scratched the surface of it capabilities. For instance, it can be used with Nexpose for vulnerability scanning, with Nmap for port scanning, and with its numerous auxiliary modules, nearly unlimited other hacking related capabilities.