Lines Purchasers Search Results

How To: Create a green smoky eye with your makeup

Get that very "right now" green smoky eye with some help from the professionals at Smashbox Cosmetics. By starting with cream liner Midnight Green and applying little smudges along the line, go back to smudge with your brush to create a smoky effect. Stand our this fall with vivid color and this soft, not-so-innocent makeup look.

How To: Solve quadratic inequalities in calculus

Calculus can be a bit tricky, but don't worry, Watch Math is here to help you out. Watch this math video lesson to learn how to solve quadratic inequalities in calculus. There's no better way to learn mathematics than from an advanced mathematician, like this PhD.

How To: See who is connected to a computer with netstat

Want to see whether your PC is being accessed by hackers? Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is available on Unix, Unix-like, and Windows NT-based operating systems. This video tutorial presents a basic introduction to working with the netstat tool. Determine whether you've been hacked with this how-to.

How To: Hack with Hacme Shipping

Foundstone Hacme Shipping is a web-based shipping application developed by Foundstone to demonstrate common web application hacking techniques such as SQL Injection, Cross Site Scripting and Escalation of Privileges as well as Authentication and Authorization flaws and how they are manifested in the code. Written in ColdFusion MX 7 using the Model-Glue framework and a MySQL database, the application emulates the on-line services provided by major shipping companies. This video will get you st...

How To: Use the sandbox tools in SketchUp 6

SketchUp 5 and up has a Sandbox. But there are a few rules to know before you're allowed to play. In this episode of The SketchUp Show, Alex leads you in creating a landscape from scratch, and a second way to model terrain from existing contour lines using the sandbox tools. Landscapers will love learning to use the sandbox tools in this episode!

How To: Make a newspaper tree

The Professor of Silliness returns with some paper. Watch this instructional video to make a tall tree out of newspaper. You need an old newspaper, masking tape, and scissors. Simply lay out the newspaper pages from end to end and tape them together. Then roll it up at a diagonal, starting from one corner, and pack i it into a compact tube. Use tape to keep the tub intact Use the scissors to cut vertical lines half way down the newspaper tube. Pull out the inner most layer and turn your recyc...

How To: Return to the Default Font in Mail Drafts After Using a Custom One

One of iOS 13's coolest features is the ability to download, install, and choose fonts in select apps like Pages and Mail. However, you might notice an issue when writing an email with a custom typeface: there's no option to return to the default font. What gives?

How To: Use Beginner Python to Build a Brute-Force Tool for SHA-1 Hashes

Developers creating login systems know better than to store passwords in plain text, usually storing hashes of a password to prevent storing the credentials in a way a hacker could steal. Due to the way hashes work, not all are created equal. Some are more vulnerable than others, and a little Python could be used to brute-force any weak hashes to get the passwords they were created from.

How To: Infect Yourself with Greyscale from 'Game of Thrones' for Halloween (Makeup Guide)

There aren't many people who will believe that a prosthetic zipper face or gunshot wound to the eye (disgusting as they are) are real, but greyscale from Game of Thrones? That'll really unsettle people for awhile because it totally looks like an actual, honest-to-God infection that someone in 2017 could conceivably have. Which makes it very effective come Halloween, whether it's for a full-on Princess Shireen, Jorah Mormont, or Stone Man costume, or to just infect a completely different chara...

How To: Top 7 Surface Book Hacks for Artists

The Microsoft Surface has been the go-to device for many professional artists since its initial release back in 2012. Since then, the Surface line has continued to offer customers a portable, high-powered machine that's a near perfect value for both casual and professional artists. And the Surface Book is its best model yet—a full laptop convertible with a detachable screen and a dedicated GPU.

How To: Security-Oriented C Tutorial 0x11 - Command Line Arguments

In many programs on Linux, you'll come across programs which allow you to specify additional arguments instead of just simply running the program by itself. If you've used the Kali distribution, I'm more than certain you'll have come across these with the command line tools, else if you have been following these tutorials, we have already come across three tools which also use the same technique, i.e. gcc, gdb and wc. How do we do this with C? Let's find out.

How To: Hack Your Old Phone Line into an Emergency Power Supply for Your Cell Phone

"Ahoy-hoy." If telephone titan Alexander Graham Bell had his way, we'd all be answering phones like Mr. Burns. Thankfully, frienemy Thomas Edison had enough sense to realize we weren't always on the briny. He preferred "hello" as our standard telephone greeting, which he is credited with coining in 1877. Fellow American pioneer Davy Crockett actually used it as a greeting first in 1833 (as compared to an exclamation)—but in print, not over the phone.

How To: Set up and use IDE / SATA to USB adapters

If you're a certified computer nerd along the lines of NASA scientist Howard from "The Big Bang Theory," then you know how frustrating it can be transferring large amounts of data between an external hard drive or other drive and your main computer, especially when you're in a rush to get experiment data in. Usually this requires mounting the drive into a system or external case first.