Identify Search Results

News: Watch Out Amateur Mushroom Hunters — Death Caps Are Nothing to Mess With

There is a reason the Amanita phalloides mushroom is called the "Death Cap." It can kill you. Mushrooms are a type of fungi, an organism that produces thread-like mycelia that often produce spores. Spores allow the fungi to reproduce. Molds, lichens, and yeast are all fungi, but the most visible fungi are mushrooms. Some fungi are delicious, but others can cause disease or, and still others, like Penicillium, can cure it.

How To: Play violin for the beginner

This how to video is very basic introduction to the violin. YOu can learn how to identify the violin and its parts, as well as a little bit of how it works. You will also learn how to count a rhythm. With the tips from this how to video you can start learning the violin.

How To: Use a tablesaw

Whenever I have a new student in the shop, I try to convey what if feels like when something is going wrong on the tablesaw. This may seem like an abstract idea, but knowing how to identify a problem before it goes too far could give you that extra second or two you need to prevent disaster. This woodworking video tutorial reviews common safety items for a table saw and how to use a tablesaw properly.

How To: Use JOIN vs. UNION in SQL

So many newbies to Transact-SQL have difficulties determing when to use a UNION or a JOIN to satisy their query. This video teaches you some guidelines to help you quickly and easily identify whether your query will likely need to become a JOIN or UNION. Disclaimer: these are just guidelines and they will not work in every situation but they are applicable for most SQL developers most of the time.

How To: Find Ursa Major, the Big Dipper

Ursa Major is called the Big Dipper in North America. The seven main stars are easy to identify. The big dipper changes positions throughout the night and throughout the year. The change in position is due to the earth's motion rotating the sun.

How To: Make a Simple Herbal Extract

Hello there, people. Today, I am going to show you how to extract the essence from a useful plant, using either alcohol or olive oil. This is how you take a plant and turn it into a useful (and preservable) medicine. For those of you who know nothing about herbal medicine, let me explain it for you in a nutshell...

How To: Use Ettercap to Intercept Passwords with ARP Spoofing

ARP spoofing is an attack against an Ethernet or Wi-Fi network to get between the router and the target user. In an ARP-spoofing attack, messages meant for the target are sent to the attacker instead, allowing the attacker to spy on, deny service to, or man-in-the-middle a target. One of the most popular tools for performing this attack is Ettercap, which comes preinstalled on Kali Linux.

How to Hack Wi-Fi: Disabling Security Cameras on Any Wireless Network with Aireplay-Ng

Electronic warfare tactics work by jamming, disrupting, or disabling the technology a target uses to perform a critical function, and IoT devices are especially vulnerable to attacks. Wireless security cameras like the Nest Cam are frequently used to secure critical locations, but a hacker can surgically disable a webcam or other Wi-Fi connected device without disturbing the rest of the network.

How To: Understand & Use IPv4 to Navigate a Network

You may not know it, but the IPv4 address of your computer contains tons of useful information about whatever Wi-Fi network you're on. By knowing what your IPv4 address and subnet mask are telling you, you can easily scan the whole network range, locate the router, and discover other devices on the same network.

How To: Brute-Force Nearly Any Website Login with Hatch

The tactic of brute-forcing a login, i.e., trying many passwords very quickly until the correct one is discovered, can be easy for services like SSH or Telnet. For something like a website login page, we must identify different elements of the page first. Thanks to a Python tool for brute-forcing websites called Hatch, this process has been simplified to the point that even a beginner can try it.

How To: Use Maltego to Fingerprint an Entire Network Using Only a Domain Name

Hackers rely on good data to be able to pull off an attack, and reconnaissance is the stage of the hack in which they must learn as much as they can to devise a plan of action. Technical details are a critical component of this picture, and with OSINT tools like Maltego, a single domain name is everything you need to fingerprint the tech details of an organization from IP address to AS number.

How To: Display a user or computer name by the time in the Windows taskbar

There could be multiple reasons why you would want to input a name in the Windows taskbar on your PC, like when dealing with a network of computers, to help identify workstations, or simply for a customized personal feel. With this tutorial, you'll see how easy it is to put your user name or computer name (or any other name) down in the taskbar, right besides the time in the bottom right.

How To: Solve percent problems

Percent problems, also called as proportion problems, are simple problems where you deal with percentages. Given a percentage problem you may need to identify the percentage, the part or whole quantity from it. You can use the proportion or percent equation to do this. Proportion equations says that the ratio of part to the whole is equal to the ratio of percentage to one hundred. Percent equation says that the product of the percentage in the decimal form and the whole gives you the quantity...

How To: Answer interview questions with strategy

hcoleman teaches you how to answer interview questions using strategy. When the interviewer asks you to talk about yourself, you should talk about your strengths, abilities, and things that motivate you; things that demotivate you are also important. Your last job question should focus on achievements, leadership, and team skills. Use examples regarding your qualifications. The five years question is about honesty. You should talk about the company you want to work for in 5 years. Identify yo...

How To: Use d-CON Quick Kill Glue Traps to kill mice

d-CON is here to help identify and remedy rodent problems in your dining room. Watch this video tutorial on how to use d-CON Quick Kill Glue Traps to kill mice in the dining room. Signs of a mouse in the dining room include droppings, footprints, gnawing, rubmarks, unusual pet activities, strange sounds, and burrows or nests.