Holds Valuable Search Results

How To: Origami a nice swan

Origami isn't just folding paper, it's a form of art. So, if you want to try a new creative way to express yourself, and if you like birds, try out this tutorial on folding an origami paper swan.

How To: Install a sink properly

Tim Carter shows you how to install the sink with these easy to follow tips. Watch this video for best results. Position the new sink upside down on the countertop and accurately trace the outline of the sink. This provides a guideline for the real mark for the cut-out. The cutout will normally be about 3/16" inside the original mark. This allows for the lip of the sink to overhang the counter top. Check the sink installation directions for the proper measurement. Don't make square corners wh...

How To: Spike your hair for cosplay

This video illustrates how to spike your hair for the cosplay. Here are the following steps: Step 1: Shampoo your hair and then deep condition them and then with a hair brush start teasing your hair that means take small strands of your hair and then brush them back with fast strokes .

How To: Hold a golf club correctly

Learn how to hold a golf club properly in this sports video tutorial. The first thing is to allow the handle of the club to lie on the fingers of your left hand. It should lie diagonally. As you close your hand around the grip and lift the club off the ground, you should have a sensation that the handle is underneath the back of your palm and the last three fingers are applying pressure and squeezing it into your palm. The second step is to put the right hand on the golf grip in a diagonal li...

How To: Do a choke slam WWE style

In this instructional video you will learn how the WWE choke slam is performed. Be sure to understand the stunts performed should not be done by just anybody but by professionals. Now, whoever the attacker is they want to place their right hand on the very top of the defenders chest, and once that happens the defender will take his left arm and hold the attackers arm like he's actually being choked. Next, the attacker will put the defenders right arm over his right shoulder and the attacker d...

How To: Make the most effective paper airplane

This quick video will teach you how to make the most effective paper airplane. Follow these steps to make a very effective paper airplane: You will need a sheet of computer paper. Fold it in half and open it back up. Fold in the top corners. Fold the top half down. Fold the corners down and fold up the little area in the middle to hold down the flaps. Fold it backwards and fold the edge of the wing to the bottom of the plane. Repeat for the other side. Hold your plane at the triangle, and thr...

How To: Play limit Texas Hold'Em

This video shows the basics of limit Texas Hold 'em. Limit means that there are set amounts that you can bet, unlike no limit where at any given time you can bet your whole stack. He explains a game of $2 /$4 limit Hold 'em. This means that before the flop and after the flop you can only bet $2. On the turn and on the river you can bet $4. If you decide to make a raise on someone's bet it can only be in the set increments of 2 and 4 dollars.

How To: 23 Things Your iPhone's Volume Buttons Can Do Besides Volume Adjustments

The volume buttons on the side of your iPhone can do more than just adjust the volume levels for media, ringers, alerts, Siri, and other sounds and voices. You can use them to perform different actions in certain apps and even create custom actions using the Shortcuts app. It's not exactly button mapping, but it's as close as you'll get without jailbreaking iOS.

How To: Battery Almost Dead? Here's the Best Way to Squeeze More Juice Out of Your iPhone Without a Charger

Your iPhone's almost out of battery power, there's no wired or wireless charger in sight, and you left your portable power bank at home. You don't want your battery to die, but you still need to use your iPhone. This is when Low Power Mode comes in handy, but you could be wasting valuable time and power if you're activating it the wrong way.

How To: Take a Deep Dive into AI with This 4-Course Bundle

No longer strictly relegated to the realm of science fiction shows and novels, artificial intelligence can be found behind important technologies that are driving innovation throughout the world. From space exploration and self-driving cars to data science and marketing algorithms, AI is the driving force behind many technologies that are moving humanity forward.

How To: The Simple Way to Enable Caps Lock on Your iPhone

When you need to type in all caps on a computer, you just press the "caps lock" key. But no such key seems to exist on iOS. The "shift" key appears to work at first but will deactivate once you type one capital letter. Holding down the shift key while you type gets the job done, but it's a pain. While it might not be obvious, enabling caps lock is actually really simple.

How To: Find & Exploit SUID Binaries with SUID3NUM

File permissions can get tricky on Linux and can be a valuable avenue of attack during privilege escalation if things aren't configured correctly. SUID binaries can often be an easy path to root, but sifting through all of the defaults can be a massive waste of time. Luckily, there's a simple script that can sort things out for us.

How To: Find Hidden Web Directories with Dirsearch

One of the first steps when pentesting a website should be scanning for hidden directories. It is essential for finding valuable information or potential attack vectors that might otherwise be unseen on the public-facing site. There are many tools out there that will perform the brute-forcing process, but not all are created equally.

How To: Hack UnrealIRCd Using Python Socket Programming

UnrealIRCd is an open-source IRC server that has been around since 1999 and is perhaps the most widely used one today. Version 3.2.8.1 was vulnerable to remote code execution due to a backdoor in the software. Today, we will be exploiting the vulnerability with Metasploit, examining the underlying code to understand it, and creating our own version of the exploit in Python.