Systm is the Do-It-Yourself show designed for the common geek who wants to quickly and easily learn how to dive into the latest and hottest tech projects. They will help you avoid pitfalls and get your project up and running fast. In this DIY episode, see how to build and use a handheld automated warspying device.
Systm is the Do-It-Yourself show designed for the common geek who wants to quickly and easily learn how to dive into the latest and hottest tech projects. They will help you avoid pitfalls and get your project up and running fast. In this DIY episode, see how to create an Internet enabled claw game.
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to homebrew and hack the PSP.
Learn how to grind coffee beans. You don't have to do everything the easy way. Coffee tastes better with fresh-ground beans, and it doesn't take long to learn how.
Learn how to install a blade into a jeweler's saw with this two-part video tutorial. Make sure your jewelers saw blade is facing outward and the teeth are pointing down. Run a finger over the blade before inserting it to make sure it is in the right position. Once it is in correctly, tighten the thumb screws at the top and bottom first.
Many ways to help the environment are costly, but using less electricity is one measure that will save you money. Learn how to lower your electric bill with this how to video.
Make your coffee maker sparkle with these easy tips. This Howcast video presents a helpful guide on cleaning your coffee maker.
Patching a bike’s tire inner tube is much easier and faster than it sounds. You Will Need:
Learn how to play "Love Story" by Taylor Swift, an acoustic guitar tutorial. Follow along with this demonstration, tabs and lyrics here:
Learn how to play "The Kill" by 30 Seconds To Mars, an acoustic guitar tutorial. Follow along with this demonstration, tabs and lyrics here:
Reach the lights at the end of the tunnel, or better yet... be the lights at the end of the tunnel. Check out this video tutorial to see how to install off-road lights onto a Toyota FJ Cruiser. You will see exactly how to install Baja Designs' off-road lights onto that Cruiser in preparation of running the Baja 1000 Course. These lights only make things stronger and more clear. Forget simple automobile headlights, do you want to see that tree up that hill or not? This will take some time, mou...
Nmap ("Network Mapper") is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they a...
Snowboarding: Hit the Slopes With Style There was a time when simply riding a snowboard made you the extreme guy on the slopes. But now, with more people strapping on a board instead of skis, the stakes have been raised. Fortunately, we've lined up this video tutorial to keep you on the cutting edge. See how to perform a nollie on a snowboard.
Grab your acoustic guitar, strap, and your pick and check out this free guitar lesson. This video tutorial will teach you country rock guitarists how to play a Hank Williams, Jr. song. Not just any Hank Williams, Jr. song, but one of his greatest: "A Country Boy Can Survive." And just so you know, here are the lyrics to go along with this instructional guitar lesson, or most of them anyways:
Learn how to tie the 11x7 Turks Head knot with this knot tying instructional video. Here are the knot tying directions:
Watch this automotive video tutorial to see how to scan your automobile for diagnostic trouble codes.
In general, no one actually WANTS a black eye. But if you're filming a movie, in a play, or just want to freak out your mom and dad or friends, it's nice to know how to "put on" a fake one.
Contrary to some screenwriting gurus, voice-over can be a handy narrative device. By speaking directly to the audience, rather than dramatizing, voice-over cuts through the running time. It can also cut down on resources. Just don't overdo it. Over-baked voice-overs sidestep drama, and leave little to interpretation. Imagine if everything were explained to you secondhand, rather than witnessing it yourself.
We all want a faster, more efficient web browsing experience. Some immediately flocked to Google Chrome as soon as it was released, because of its super fast speeds. Others restrained themselves and continued to wait for Microsoft and Mozilla to play catchup. And the time is almost here for all Internet junkies to improve their game.
To become an American citizen you would first have to fill out an application, then take a naturalization examination. Providing that you have been a legal resident in the U.S. for more than five years, you would then have to appear at a court hearing. You have to be eighteen years old, have good moral character, and be loyal to the United States. You would need to know how to read, write, understand and speak the English language; and have a general knowledge of our country's history, our go...
the jackass crew stand in a circle and shoot the arrow above them
In this video tutorial, viewers learn how to find their computer's MAC (or physical) address in a Windows computer. This task is very easy, simple and fast to do. Begin by clicking on the Start menu and open the Run program. Then type "cmd" in the Run box and press OK. When the black command prompt opens, type in "ipconfig /all" and press Enter. The computer's MAC address will be listed as Physical Address under Wireless Network Connection. This video will benefit those viewers who use a Wind...
In this video, Coach Jay demonstrates the pedestal routine, which utilizes aspects of yoga and Pilates. There are three factors which should be taken into account before starting: first, you should maintain your breathing throughout. Next, make sure to engage the muscles around your core, and make sure that you have a straight line from your foot to your shoulder in each exercise. Keeping this in mind, begin by holding a push-up position for 30 seconds, keeping your body straight. Next, turn ...
Most likely you have planned one or two flights of stairs from your deck to the surrounding yard. Steps can be built a number of different ways depending on your aesthetic preference, however most municipalities have specific codes that must be taken into consideration when you design and build your steps. For instance, many cities require a minimum width of 3 feet for the stairs.
Jeremy Wariner, the Olympic 400m champ gives his tips. This is essentially a long sprint. Stay focused at the start and block out the crowd and other athletes. Go out hard and look for the person in the lane in front.
Despite all the tragic stories you hear on the news, you'll probably never be involved in a shooting. But you never know. Nobody thinks it’s going to happen to them – until it does. Be prepared to survive a shooting rampage, just in case.
The Department of Biological Sciences at the University of Alberta brings you this video tutorial specifically relevant to your student laboratory courses, specifically microbiology. If you're a student at any school of biology, this information will be helpful for learning how to use Sephadex gel filtration for chromatography in the lab.
Deviled eggs are the classic American picnic dish, and Chef Hubert Keller has just the perfect recipe. Try it out!
Shave Your Pubic Area Things you will need:
How many times have you been on the water and you've cast off a crankbait? You pick up the crankbait rod and make a cast, start your retrieve and your bait runs off to the side. Tuning will keep it straight. Wade Bourne, host of Wade's World on MyOutdoorTV, shows you how to tune up a crankbait.
Shortcuts are meant to make your life easier, and iPhone shortcuts are no exception. They can use different triggers, manual or automated, to perform actions in the background, allowing you to do things like send a prewritten text message during a bad date or change your wallpaper at certain times of the day. However, sometimes it's not only about the shortcut itself but about how fast you can run it.
The first step to getting your life together? Getting your online security together. After all, security when you're shopping, video calling, and more means more than ever in a digital age when anyone can copy your info or try to pose as you on the web. This Premium Privacy Bundle featuring Zenmate and StartMail will give you a secure VPN and encrypt your emails, all at a bundled price. The security duo is on sale for 60% off for a limited time, which means it's just $44.99 (regularly $113).
Penetration-testing frameworks can be incredibly useful since they often streamline certain processes and save time by having a lot of tools available in one place. Of course, the most popular pentesting framework is undoubtedly Metasploit, but there are many others out there that cater to particular needs. For auditing web applications and servers, Tishna comes in handy.
For a hacker, there are a lot of advantages to creating a fake network. One advantage forces nearby devices to use their real MAC address if you happen upon a network that's stored in their preferred network list.
If you've ever wanted to track down the source of a Wi-Fi transmission, doing so can be relatively easy with the right equipment.
Following its dominance as a provider of silicon for smartphones, Qualcomm is eager to replicate that ubiquity with not only processors for augmented reality headsets but also reference designs to give device makers a head start.
Privilege escalation is one of the essential skills a hacker can have and often separates the newbies from the pros. With a continually changing landscape and a plethora of exploits out there, it can be a problematic aspect of any attack. Luckily, some tools can help expedite the process. Linux Exploit Suggester is just one of many to help you get root.
Google Images, TinEye, and other reverse image search engines can help you find where images appear on the internet. You can discover what TV show or movie an image comes from, who took a photo, and if the profile picture of someone you're talking to online is really them, among many other uses. And there's a shortcut for iOS that makes running a reverse image search easy.
A lot of time can be wasted performing trivial tasks over and over again, and it's especially true when it comes to hacking and penetration testing. Trying different shells to own a target, and testing out privilege escalation commands afterward, can eat up a lot of time. Fortunately, there is a tool called One-Lin3r that can quickly generate shells, privesc commands, and more.
Web application firewalls are one of the strongest defenses a web app has, but they can be vulnerable if the firewall version used is known to an attacker. Understanding which firewall a target is using can be the first step to a hacker discovering how to get past it — and what defenses are in place on a target. And the tools Wafw00f and Nmap make fingerprinting firewalls easy.