How To: Scratch records
DJ Fooders teaches you some basic record scratches for beginning DJs. Techniques covered included the baby scratch, forward scratch, chops and stabs, and the tear.
DJ Fooders teaches you some basic record scratches for beginning DJs. Techniques covered included the baby scratch, forward scratch, chops and stabs, and the tear.
DJ Fooders teaches you some advanced record scratches for intermediate and advanced DJs. Techniques covered included scribbles, the transform, flares, the orbit, the tweak, the crab, and record control techniques.
This video explains electricity as the flow of atomic particles called electrons. Animations demonstrate electron flow. Batteries are described as chemical devices designed to create electron flow. Terms covered in video include Volts, current and Amperes
This guitar lesson covers two shapes of the 9th chord (dominant). They are great substitutes for the regular 7th chords you might use in a normal blues. Any time you would normally play a 7th chord you could substitute it for a 9th chord.
Frank Crow teaches how to detune your snowboard for a better ride. Learn about your effecive edge versus your full wrap ege. De-Burring is also covered.
Build sound board for a studio at home, to insulate noise and sound. The subject of this DIY project was originally covered in a written article that is still required reading to finish the project as it gets into more detail regarding the actual construction of the boards.
In this tutorial you'll see how to use the included Apple templates as a framework for creating your own custom templates in DVD Studio Pro 4. The video also covers drop zones.
Safety on a motorcycle means more than wearing a helmet. Chopper Chick Jackie Nunes covers safety and styles of jackets on the market today.
How to make succulent grilled pork chops is covered in this video. There are easy step by step instructions and ingredients needed for your dish.
Michel Nischan shows you some great low-carb snacks, such as mozzarella sticks and peanut butter covered vegetables. However, the best low-carb snack is the Mexican pizza. Created with a toasted tortilla, refried beans, strained salsa, and low fat cheese. Bake it in the oven for four minutes, and you have one tasty snack
Elderly woman shows how to prune plants properly. Video covers which plants to prune, when to prune, cleaning prune tools and how to prune the individual plants. Watch video for best results.
Robert Jackson shows how to take a shower properly. He covers things such as shower curtains, shower structure and cleaning. Watch video for best results.
Learn how to position fingers and thumb while playing the acoustic guitar. Follow along with Peter Vogl as he covers left hand finger placement, left thumb placement, and holding the pick. Click on the QuickTime icon above to watch a video of this lesson.
Learn a short history on swimming and how to do the strokes. Even if you're not an avid swimmer, we recommend watching this... It was made by a fifteen year old! Strokes covered are the butterfly, breaststroke, backstroke and freestyle.
You've had pumpkin bags and you've had ghost bags, now you can have a Halloween colored duct tape bag to collect candy in this year. This bag is fun to use and just as much fun to make. Plus, by adding some reflective tape your bag will help keep you safe.
Want to supply your head with a little extra jazz factor? Why not tie a scarf around it? You have only one head, but any number of ways to decorate it with a scarf.
Frost is in the air. If you have tender plants like basil, pepper or impatients when that cold weather comes it will zap those plants. Often, if you can get through those first couple frosts, an Indian summer, that can last weeks and weeks, will follow. If you can protect your plants during this time you can have blooms for much longer. There are several ways to protect your plants. You can use a traditional device like a glass cloche. The nice thing about them is they are decorative and will...
Apple finally unveiled the iPhone 14, 14 Plus, 14 Pro, and 14 Pro Max, and there are a lot of improvements that'll make you want to trade in your current iPhone stat. But I wouldn't be so quick to upgrade because there's one "feature" that will make many of you rethink getting a new iPhone 14 series model.
File permissions can get tricky on Linux and can be a valuable avenue of attack during privilege escalation if things aren't configured correctly. SUID binaries can often be an easy path to root, but sifting through all of the defaults can be a massive waste of time. Luckily, there's a simple script that can sort things out for us.
If you're quarantining with other people, consider yourself lucky — but it's not always easy. Staying in one space for so long with too many people can be challenging, so you need to find things to do to make the time go by (and to keep everyone sane). Our advice? Try out these seven free multiplayer games that only require one iPhone or Android device to play.
Whether you were exposed to the COVID-19 virus or just taking precautionary measures, self-quarantining is a tremendous disruption for anyone. Still, we all have to eat, pandemic or not. But unless you like eating canned food for two weeks, you're going to want to explore other options. That's why food delivery apps are going to be so necessary during such a hectic and uncertain time.
I got my first Philips Hue White and Color Ambiance bulbs because they're the consensus best of the best for colored lighting. But after spending 90 bucks on two light bulbs, when it came to all the accessories like switches and buttons, I went with cheaper third party options. Little did I know, I was overlooking a great first-party accessory with a surprisingly reasonable price.
Nearly every connection to the internet is dependent on the Domain Name System. DNS, as it's more commonly called, translates domain names like gadgethacks.com into IP addresses, which is what network devices use to route data. The problem with DNS servers is that they don't have your privacy in mind.
Samba can be configured to allow any user with write access the ability to create a link to the root filesystem. Once an attacker has this level of access, it's only a matter of time before the system gets owned. Although this configuration isn't that common in the wild, it does happen, and Metasploit has a module to easily exploit this security flaw.
Pokémon, Google, and augmented reality go together like wasabi, soy, and ginger, and the trio has come together again for the release of the latest game from the Pokémon universe.
I've just recently hopped on the AirPods bandwagon, and I can't see myself ever going back to the wired EarPods that Apple includes with every iPhone. The only issue is that I paid full price, but you don't have to with 2019's Black Friday deals, some of which are happening right now.
Lenovo has done a great job preventing leaks of their new Moto RAZR. We've seen a few images here and there, but for the most part, we knew very little about the long-rumored phone. But with the announcement date just around the corner, an FCC filing has given us a look at the new RAZR from almost every angle.
He might be an O.G. rapper, but Snoop Dogg has officially entered the cutting-edge of technology via a hidden feature included with his newest music release.
One of the most common web application vulnerabilities is LFI, which allows unauthorized access to sensitive files on the server. Such a common weakness is often safeguarded against, and low-hanging fruit can be defended quite easily. But there are always creative ways to get around these defenses, and we'll be looking at two methods to beat the system and successfully pull off LFI.
Particular vulnerabilities and exploits come along and make headlines with their catchy names and impressive potential for damage. EternalBlue is one of those exploits. Originally tied to the NSA, this zero-day exploited a flaw in the SMB protocol, affecting many Windows machines and wreaking havoc everywhere. Here, we will use EternalBlue to exploit SMB via Metasploit.
With an inconspicuous Android phone and USB flash drive, an attacker can compromise a Windows 10 computer in less than 15 seconds. Once a root shell has been established, long-term persistence to the backdoor can be configured with just two simple commands — all while bypassing antivirus software and Windows Defender.
To build hype for the HoloLens 2 among developers, Microsoft is borrowing a page out of Magic Leap's playbook.
Things that are supposed to make life easier for developers and users are often easy targets for exploitation by hackers. Like many situations in the tech world, there is usually a trade-off between convenience and security. One such trade-off is found in a system known as Distributed Ruby, which can be compromised easily with Metasploit.
These days, it's easy to cut the cord. Thanks to a new crop of streaming TV apps, you can get the same service offered by a traditional cable subscription at a fraction of the price. After some extensive testing, we believe we've found the absolute best apps for cord cutting.
Before you can dive into customizing your OnePlus 6T, you must take the initial step of unlocking the bootloader to gain the ability to install TWRP, Magisk, custom ROMs, and other mods.
If you store important, sensitive information on your iPhone in Notes, you'll want to be more careful. When Notes syncs across your iPad and Mac via iCloud — devices that family members or coworkers may share — you run the risk of having your notes read, edited, and deleted by other people. Such a catastrophe is easily avoided.
The macOS 10.14 security update tried to make parts of the operating system difficult for hackers to access. Let's take a closer look at how its new feature works and what we can do to spoof the origin of an application attempting to access protected data.
The march towards mainstream adoption of eSIM technology got a massive boost with the arrival of the iPhone XS, XS Max, and XR. We're now one step closer to ditching physical SIM cards altogether. If you're on the fence about this new technology, you may be surprised by the benefits it brings to the table.
The road to becoming a skilled white hat is paved with many milestones, one of those being learning how to perform a simple Nmap scan. A little further down that road lies more advanced scanning, along with utilizing a powerful feature of Nmap called the Nmap Scripting Engine. Even further down the road is learning how to modify and write scripts for NSE, which is what we'll be doing today.
After gaining access to a root account, the next order of business is using that power to do something more significant. If the user passwords on the system can be obtained and cracked, an attacker can use them to pivot to other machines if the login is the same across systems. There are two tried-and-true password cracking tools that can accomplish this: John the Ripper and Hashcat.