Key Data Search Results

How To: Use chord substitutions in the key of G major

Because of its portability, the acoustic guitar can be wonderful songwriting device. However, having a pocket symphony in your head–or pocket, as it were–does you little good if your hands aren't on board. Fortunately, YouTube user Sawlon is here to help you train your head and hands with his series of free video guitar lessons. In this installment, you'll learn how to use chord substituions in they key of G major on acoustic guitar. Remember, the more you practice and the more theory you kno...

How To: Use chord substitutions in the key of E major

Because of its portability, the acoustic guitar can be wonderful songwriting device. However, having a pocket symphony in your head–or pocket, as it were–does you little good if your hands aren't on board. Fortunately, YouTube user Sawlon is here to help you train your head and hands with his series of free video guitar lessons. In this installment, you'll learn how to play use chord substitutions in the key of E major on guitar. Remember, the more you practice and the more theory you know, t...

How To: Autofold with the move tool in Google SketchUp

Autofold is part of the move tool and allows you to automatically create folding edges for new geometry. Take a look at this instructional video and learn how to use the move tool to autofold in Google SketchUp. The autofold can be activated by pressing the Alt key on the PC or the Apple key on a Mac. Autofold let's you move a point, edge or surface in any direction automatically creating fold edges as needed to do so.

How To: Use a light meter for your photo camera

This cinematography tutorial video provides the basics of working with a photographic light meter as well as how to read the meter. A light and flash meter is nothing expensive. All you need is something that will measure the light and your flash. Most light meters are relatively the same. Metering is a relatively simple process. Just key in the ISO, key in the shuttle speed, push the button, and it gives you the f-stop to use on your professional photo camera.

How To: Attend and throw a yard sale

Do you need some extra cash? Is your clutter piling up on you? The perfect summer solution is a how-to on throwing and attending a yard sale. This week we show you how to prep and carry-out a successful yard sale, and show you how to spot a score. A few key points will help you spot the key piece for your wardrobe or next DIY project, whether it involves a yard sale or garage sale or what.

How To: Remove viruses from your computer

Look at this video tutorial to see how to remove viruses from your computer if you live in Charlotte, or anywhere else in the world. This will help you remove viruses from your computer yourself, without paying mega bucks to get it fixed. You'll see how to get a free virus scanner, for virus removal. This could take up to an hour or two, depending upon the data information on your PC.

How To: Use Quicksilver for OS X

In this episode I show you a few of the innumerable uses of Quicksilver. Quicksilver is an unified, extensible interface for working with applications, contacts, music, and other data. The possibilities are endless. These are just a few of the ways that I use Quicksilver on a daily basis.

How To: Free Up Space on Your iPhone Quickly Without Deleting Any Important Data

Even with the convenience of online storage like iCloud and Google Drive, data management can be a constant struggle on your iPhone. If you continuously find yourself having to delete messages, photos, videos, and other files to make room for other things, know that there's an easy way to free up space without erasing anything important or having to dig through documents and data yourself.

How To: Everything You Should Do Before Posting Protest Photos & Videos on Social Media

As protests surge in the wake of George Floyd's murder by a Minneapolis police officer, powerful photographs and videos from the demonstrations have gripped the world, putting our nation's very real and very justifiable widespread civil unrest out into the digital world. Unfortunately, these pictures could put you or others in danger if precautions aren't taken before uploading them online.

How To: Wipe & Obfuscate Identifying Information in Your Protest Photos for More Anonymous Sharing

Every single photo you take carries with it a considerable amount of seemingly "invisible" yet important information known as metadata. Although metadata is usually helpful to sort your photographs by location and date, that same information could potentially be used against you, especially if the pictures are taken during a precarious situation.

How To: Here's Why You Need to Add Python to Your Hacking & Programming Arsenal

Choosing which programming language to learn next can be a truly daunting task. That's the case regardless of whether you're a Null Byter just beginning a career in development and cybersecurity or you're a seasoned ethical hacking and penetration tester with years of extensive coding experience under your belt. On that note, we recommend Python for anyone who hasn't mastered it yet.

How To: Intercept Images from a Security Camera Using Wireshark

It's common for IoT devices like Wi-Fi security cameras to host a website for controlling or configuring the camera that uses HTTP instead of the more secure HTTPS. This means anyone with the network password can see traffic to and from the camera, allowing a hacker to intercept security camera footage if anyone is watching the camera's HTTP viewing page.

How To: Improve Battery Life on Your iPhone Running iOS 12

Performance and stability improvements, as well as new features, are just some reasons to install iOS 12, but new changes mean new battery health challenges. It can be difficult to boost battery life while taking advantage of everything this update has to offer. Luckily, there are plenty of ways to avoid unnecessary battery drain when using iOS 12 on your iPhone.

How To: Comparing the 5 Best Internet Browsers for Android

For all those times when an app either isn't available or simply won't cut it, your phone's internet browser provides access to your favorite websites and services. But some browsers are flat-out better than others, and chances are, the browser that came pre-installed on your phone isn't the best option out there.

How To: Steal macOS Files with the USB Rubber Ducky

If you need a tiny, flexible attack platform for raining down human-interface-device (HID) attacks on unattended computers, the USB Rubber Ducky is the most popular tool for the job. By loading the Ducky with custom firmware, you can design new attacks to be effective against even air-gapped computers without internet access. Today, you'll learn to write a payload to make "involuntary backups" through copying a targeted folder to the Ducky's USB mass storage.

How To: Security-Oriented C Tutorial 0x08 - A Trip Down Memory Lane

Before I continue with a topic on strings, we first require some fundamental understanding of how memory works, i.e. what it is, how data looks in memory, etc. as this is crucial when we are analyzing vulnerabilities and exploitation. I highly suggest that your mind is clear and focused when reading the following article because it may prove to be confusing. Also, if you do not understand something, please verify all of your doubts, otherwise you may not completely understand when we touch on...