How To: Convert audio files with VLC Media Player
How to convert videos to various formats (including web format) with VLC Media Player, free open-source media player
How to convert videos to various formats (including web format) with VLC Media Player, free open-source media player
This tutorial teaches you how to play music files on your Nintendo Wii using an SD card and the
Check out this video from Berkleemusic.com and learn how to export audio files in Digital Performer and expose your music to the world in today's most accessible format, the mp3.
A video on the basics of bittorrent technology and how to get started downloading a Bittrorrent client and torrent files.
Take that Flash SWF file with lots of open space(be it an animation walking around or maybe that slick semi opaque video, or maybe the more practical drop down menu) and use Dreamweaver, HTML, and CSS to place it on a div that floats above your site and allows you to see whatever is underneath of it.
Learn how to build a web-based form using HTML. This tutorial covers using Labels, Text Fields, Text Boxes, Radio Button Groups, Checkboxes, The Clear and Submit buttons, Drop down Menus, as well as many of the properties you can edit while building the form. The form will be ready to be linked with a PHP file for use when you are finished.
Learn how to export a Flash .SWF file and put onto your website using Adobe Dreamweaver.
Learn to use Photoshop and Imageready to add video to a graphics file.
The existing uninstall routine for the Mozilla Firefox web browser may leave profile data and a Program Files folder behind. This is how to remove it.
How to capture video from a camcorder, save file and then upload to YouTube using Windows Movie Maker.
A Cascading Style Sheets (CSS) tutorial. Learn how you can add icons or images to accompany links with common file extensions.
Adobe InDesign can create PDFs natively. In this video we'll see a rarely used feature that allows us to create rollover effects that work beautifully in PDF files. InDesign allows us to create buttons and using the States palette we can create rollover effects.
Elizabeth Jones explains how to export your finished project for the web using Windows Movie Maker. You can select Windows Media low bandwith to significantly decrease the size of your movie file.
GarageBand will recognize General MIDI program changes, so using standard midi files is even better than before. Find out how it works in this video.
The free download manager wget lets you download all the files on a page or directory with a single command. It also allows you to resume downloads after getting disconnected letting you start where you left off instead of starting the download at 0% again. Check out this tutorial and see how to install and use wget.
Find the biggest files on your computer ordered by size. Learn to order folder by filesize so you can find the ones harboring the most diskspace terrorists. Learn to clear up your private data automatically and wipe it clean from being undeleted.
Learn how to make Firefox's interface more minimal by removing the help, view, bookmarks, history, edit, and file menu buttons.
Making text look old and weathered, or rusty and corroded is a long standing effect but it's a good one to know. In this episode, Bert will show you how to do a nice, detailed weathered type from scratch. You may want to download his example files or full rez version to see a detailed view.
Don Schechter gives a rundown of system requirements and how to start, save, and choose settings for new projects using Adobe Premiere. To send your scratch disc, open the capture window by going to file and then capture.
Chances are if you’re using Adobe GoLive CS2, you’re probably also using Photoshop and maybe Illustrator too. The great thing about GoLive is that it works hand in hand with .PSD and .AI files. In this video Terry White will show you how to incorporate them into each other using Smart Objects.
When you download files from certain apps like Safari and Chrome on your Mac, those files are tagged with the "Where from" metadata attribute. Depending on where the file was downloaded from, this attribute may refer to the host's URL, a sender's email address, or another piece of identifying information. While not obvious, you can delete or even change this attribute.
The fight to wrest control of apps from Apple's revenue-focused grip just took a major turn in favor of Epic Games.
Android has not had the best reputation for privacy and security, though Google has made strides in those departments in recent years.
Lossless quality isn't for everyone. If you can't distinguish between lossless audio and other formats, you probably but don't need it. But if you're a musician who's sharing ideas with bandmates or a journalist interviewing people for a video, you might want the best possible quality, which is what lossless offers. And you might not know it, but the Voice Memos app on your iPhone supports it.
Samsung uses their own SamsungOne font for their Galaxy lineup. But if you're coming from an iPhone or another Android device, you might not love it. With the help of this mod, however, you're sure to find a font that's right for you.
The only thing better than programming MicroPython is programming MicroPython over Wi-Fi. So once you set up MicroPython on a microcontroller and have it on its own power source, you won't need to use a data cable to connect to it whenever you need to interact with it, program it, upload files, or grab data.
PirateBox is a great way to communicate with others nearby when cellular and Wi-Fi networks aren't available. With it, you can anonymously share any kind of media or document and even talk to one another by voice — without being online. However, it needs a Raspberry Pi, which is more expensive than ESP32 boards, and if you only need a text-based chat, there's a much simpler option.
In the last decade, the number of people working remotely in the US has increased dramatically, and so has their need for technology and software to supplement that remote work. Whether you work from home or a coworking office space, the requirement for highly compatible and helpful productivity apps is a must if you want to get things done successfully.
Thanks to backups, Signal conversations can span over multiple years and multiple phones. These archives can get rather large as you share photos, videos, and other files with friends. But between the other apps and large files on your phone, you might not be able to afford to keep all those messages.
Harry Potter: Wizards Unite has gained quite the fan base since its launch, but not without a few bumps along the way. Niantic, the game's developer, has a long-running history with trying to block all root users on Android. The methods will vary for each game, but this time around with Wizards Unite, they appear to have a new detection feature at play from the recent 2.9.0 update. Let's find out what's going on.
Samba can be configured to allow any user with write access the ability to create a link to the root filesystem. Once an attacker has this level of access, it's only a matter of time before the system gets owned. Although this configuration isn't that common in the wild, it does happen, and Metasploit has a module to easily exploit this security flaw.
Lenovo has done a great job preventing leaks of their new Moto RAZR. We've seen a few images here and there, but for the most part, we knew very little about the long-rumored phone. But with the announcement date just around the corner, an FCC filing has given us a look at the new RAZR from almost every angle.
While MacOS computers have been spared from some of the most famous malware attacks, there is no shortage of malicious programs written for them. To keep your computer safe from some of the most common types of malware, we'll check out two free tools. These tools can automatically detect ransomware encrypting your files and watch for unauthorized access to your microphone and camera.
One of the first steps in attacking a web application is enumerating hidden directories and files. Doing so can often yield valuable information that makes it easier to execute a precise attack, leaving less room for errors and wasted time. There are many tools available to do this, but not all of them are created equally. Gobuster, a directory scanner written in Go, is definitely worth exploring.
The art of privilege escalation is a skill that any competent hacker should possess. It's an entire field unto itself, and while it's good to know how to perform the techniques involved manually, it's often more efficient to have a script automate the process. LinEnum is one such script that can be incredibly useful for privilege escalation on Linux systems.
KeePassX, 1Password, and LastPass are effective against keyloggers, phishing, and database breaches, but passwords managers rely on the operating system's clipboard to securely move credentials from the password vault to the web browser. It's within these few seconds that an attacker can dump the clipboard contents and exfiltrate passwords.
A hacker with privileged access to a Windows 10 computer can configure it to act as a web proxy, which allows the attacker to target devices and services on the network through the compromised computer. The probes and attacks appear to originate from the Windows 10 computer, making it difficult to detect the attacker's actual location.
For many, the stock version of Android is often considered the epitome of what the operating system should look and feel like by default. It's clean and clear of unwanted extra apps that come pre-installed with the system, provides a fluid and fast user experience, and runs on just about any device that has an unlocked bootloader to install a custom ROM with the stock version ready to go.
The Pixel is the phone to beat when it comes to cameras, and it's largely due to software. While its hardware is solid, Google's machine learning prowess and general coding wizardry are the biggest reasons the Pixel is so good with taking photos and recording video. What this means is that if you can get the Pixel's camera software, you can replicate the Pixel camera experience on other phones.
Information gathering is one of the most important steps in pentesting or hacking, and it can often be more rewarding to run things on the target itself as opposed to just running scripts against it remotely. With an SQL injection, a hacker can compromise a server and, ultimately, upload and run the "unix-privesc-check" script locally in order to further identify possible attack vectors.