Ideal Web Search Results

How To: Free up hard drive space on a Mac

http://AskTheTechies.com Brandon Jackson is back with D.Lee Beard to answer "What files are safe to trash on a Mac to free up hard drive space?" What files are the biggest hogs? Have you really trashed all the files you thought you had? Also in this episode: how to sort web browser bookmarks.

How To: Create a 500px resize action in Photoshop

Why would you want to have an action just for creating a 500px size image? Well, that's the perfect size for posting images on a forum, and if you create an action in Photoshop to do this, you'll never have to manually resize an image for the web again! Learn how to create, and customize this action.

How To: Set up a slack line or wire

A simple method for setting up a slackline with 5 carabiners. This setup should not be used for highlines. Practice this circus trick of balance and skill. You need webbing for this slack lining technique.

How To: Build a tent footprint

Backpacker magazine shows you how to build a plastic footprint for your tent--a skill taken from the Jan/Feb 2007 issue. Associate editor Jason Stevenson explains the nine steps to create a footprint, including how to cut webbing and punch grommets. Learn more Skills at www.backpacker.com.

How To: Make BBQ hamburgers

Watch the Grillmasters at the Barbecue Web prepare some beef chuck burgers so juicy and full of flavor that it will no doubt become one of your favorite quick and easy BBQ recipes. It's quick and easy. All you need is 3-4lbs fresh ground chuck beef, tomatoes, sweet onions, sliced cheese if it's a cheeseburger you want, and any of your favorite condiments.

How To: Start a perennial garden

Our gardening expert will explain how to set up your perfect perennial plant business. Learn which plants go together, how to position the plants for just the right amount of sun, and how to determine if your adjustment has been successful. Are the flowers, shrubs and grasses happy after all of the work you have put in to meet their needs? Once you have mastered the basic care and maintenance of your garden, then you can concentrate on working toward exactly the look you want. Martha Cycz dis...

How To: Deal with a flight cancellation

There's nothing more disappointing than finding yourself all packed and ready to travel when you find your flight has been canceled. You can make the best of the situation by finding out just what you are entitled to or how to best ameliorate the situation.

How To: Register a dog with the AKC

You have a purebred, make it official. With a few simple forms your purebred dog can be a member of the American Kennel Club and carry on the traditions of and gain access to this exclusive organization. Your dog can have an official pedigree.

How To: Start Learning How to Code in Just a Week

If you've been thinking about changing careers and you have just a little bit of time, The Ultimate 2021 Web Developer & Designer Super Bundle may be just what you need. This is also the perfect time to get it because it's on sale for $34.99, which is 98% off the regular price of $1,886. You'll get 14 courses that offer 39 hours of content on HTML, JavaScript, CSS, and more.

How To: Audit Web Applications & Servers with Tishna

Penetration-testing frameworks can be incredibly useful since they often streamline certain processes and save time by having a lot of tools available in one place. Of course, the most popular pentesting framework is undoubtedly Metasploit, but there are many others out there that cater to particular needs. For auditing web applications and servers, Tishna comes in handy.

How To: Hack Apache Tomcat via Malicious WAR File Upload

Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web management interfaces should be scrutinized just as hard as the apps they manage, especially when they contain some sort of upload functionality. By exploiting a vulnerability in Apache Tomcat, a hacker can upload a backdoor and get a shell.

How To: Quickly Gather Target Information with Metasploit Post Modules

Post-exploitation information gathering can be a long and drawn-out process, but it is an essential step when trying to pivot or establish advanced persistence. Every hacker should know how to enumerate a target manually, but sometimes it is worth it to automate the process. Metasploit contains post modules that can quickly gather valuable information about a target, saving both time and effort.