Ideal Poop Search Results

Raspberry Pi: Physical Backdoor Part 1

This tutorial is one technique to use the full functionality of your Pi. The small size makes it ideal for inside hacks, but still has the capabilities of a average desktop or computer. I should mention that a tutorial that OTW has done, but I'm gonna take it a step further. OTW made a brilliant article, but only touched on the surface of the possibilities. I hope this article will both show you many the possibilities and also allow you to start causing havoc, but I'm planning on making this ...

How To: The Easiest, Best Way to Keep Soft Herbs Fresh for Months

There are a lot of reasons for wanting to make sure your herbs last a long time. Maybe you know that your grocery store won't have decent parsley in the winter. Maybe you're taking a last-minute trip and don't want to throw away your perfect batch of basil. Or perhaps you're simply like me, and buy a dozen different herbs at the farmer's market, only to remember that you can't make it through all of them before they go bad.

How To: Find the Location of Any IP with PyGeo IP Locator(GUI for GeoIP/Pygeoip)

Based on OTW's encouragement in his post on "How to Find the Exact Location of Any IP Address", I decided to make a gui(graphical user interface) which would hopefully make the process easier. However, because turning a python script into a standalone executable is a right pain in the nether-regions, particularly for linux, I haven't yet completed this step(I will soon and update this). I did however, make an apk for android(you use a .apk file to install an app on your android device), which...

How To: When in Distress, Shake Your Android to Send a Quick SOS Alert with Your Location

I've been lucky enough to never be a victim of street crime, but I have read and seen too many articles and videos to completely rule it out as a possibility. You can do some things to prevent it, but if your life suddenly turns into a scene from Friday the 13th, you'll want to be prepared with some sort of way to let others know you need help. This is where Shake2Safety comes in, a free Android app from Phontonapps.

How To: Stop Facial Recognition Software from Finding Out Who You Are on Camera

Facial recognition software is being more widely used with every passing day. Your local law enforcement is probably already using it, and it will be even easier for them now that the FBI handed out its own facial recognition software to state authorities. Even the fine folks at Facebook are using this technology. Obviously, this brings up some pretty serious privacy concerns amongst most people, because honestly, who wants to be tracked? Right now, there's not a lot we can do about it being ...

How To: Build a stop motion animation stage

This short construction tutorial video shows how to build a small, simple stage from scratch specifically for animating a claymation or stop motion animation project. Construct the ideal world for your claymation characters or stop motion animation armatures and puppets. All you have to do is follow this video then drill holes wherever you want your tie downs to pass through and you're off to the races. Just use the following materials to build your own stage: an armature with foot tie-downs,...

How To: Prick out Foxglove seedlings

In this gardening tutorial, Martin Fish from Garden News demonstrates how to prick out Foxglove seedlings. "Pricking out" is when seedlings are transplanted into larger pots or trays to give them more room to grow on. The ideal time to do this is when the seedlings are at the two-leaf stage and before the true leaves have developed, or as soon as they are large enough to handle.

How To: Make a friendship bracelet with the letter "I"

Ever want to have a friendship bracelet with your own personal saying on? Well, it's going to take a lot of experience to get there. Start off with learning the basics of friendship bracelet making, such as the basic knots and skills. When you think you are ready for a challenge, try to write your name in a bracelet. This video is ideal for learning the letter "i". "I" is a very common letter to be in first names and it is probably found in yours too! After learning how to make the "i" try to...

How To: Prick out bedding

If you grow your own bedding plants one of the main jobs over the next few weeks is 'pricking out'. This is when seedlings are transplanted into larger pots or trays to give them more room to grow on. The ideal time to do this is when the seedlings are at the two-leaf stage and before the true leaves have developed, or as soon as they are large enough to handle. When done at this stage of growth there is less shock and root disturbance to the seedlings and they will establish and grow on much...

How To: Prune climbing roses

We prune roses for several reasons. Regular pruning helps to keep their size under control, though we must remember that all roses have a predetermined 'ideal' size. We also prune to shape the plant. We take out dead stems to prevent the dead area spreading back into healthy stems. But the main reason we prune is to make the rose more vigorous. This tutorial teaches you how to prune climbing roses for the best results.

News: The Only Cat Litter Scoop You'll Ever Need

If you have a cat, trying to get all of the little clumps out of the litter probably feels like an impossible task. It pretty much is, but we've found the best cat litter scoop that gets more of those tiny pieces out than any other scoop. Plus, it's sturdy, degradable, and ethically sourced.

How To: Beginner's Guide to OWASP Juice Shop, Your Practice Hacking Grounds for the 10 Most Common Web App Vulnerabilities

Web application vulnerabilities are one of the most crucial points of consideration in any penetration test or security evaluation. While some security areas require a home network or computer for testing, creating a test website to learn web app security requires a slightly different approach. For a safe environment to learn about web app hacking, the OWASP Juice Shop can help.

How To: Quickly Gather Target Information with Metasploit Post Modules

Post-exploitation information gathering can be a long and drawn-out process, but it is an essential step when trying to pivot or establish advanced persistence. Every hacker should know how to enumerate a target manually, but sometimes it is worth it to automate the process. Metasploit contains post modules that can quickly gather valuable information about a target, saving both time and effort.

How To: Gift Apps & Games to Android Users

The iTunes App Store makes it easy to buy an app or game on someone else's behalf, and it's a great way to send an iPhone user a thoughtful gift. The Google Play Store doesn't have such functionality, but there are still a few workarounds to accomplish the same goal: gifting an app to an Android user.

How To: The Best Apps to Help You Quit Smoking

There's an adage that says "Every plan, no matter how great, goes out the window as soon as you're punched in the face." While our lives are (hopefully) not violent, that saying can easily translate to our daily living. That punch in the face can come in various forms, mainly stress-related. It could be a bad day in the office, rush hour traffic, drama in the family, the list goes on.

How To: The Ultimate Potato Cheat Sheet: Which Potato Goes Best with What?

I've been a fan of potatoes ever since I can remember... but mainly because they weren't a big part of my daily diet (which usually consisted of rice). And because my experience with potatoes was so limited, I only knew of two varieties growing up: big, brown Russets and sinewy sweet potatoes. As for cooking with potatoes—well, I'm embarrassed to admit that the only time I cooked potatoes when I was a kid was with the instant kind.