Local Cover Search Results

How To: Scratch records

DJ Fooders teaches you some advanced record scratches for intermediate and advanced DJs. Techniques covered included scribbles, the transform, flares, the orbit, the tweak, the crab, and record control techniques.

How To: Play 9th chords

This guitar lesson covers two shapes of the 9th chord (dominant). They are great substitutes for the regular 7th chords you might use in a normal blues. Any time you would normally play a 7th chord you could substitute it for a 9th chord.

How To: Make low-carb snacks

Michel Nischan shows you some great low-carb snacks, such as mozzarella sticks and peanut butter covered vegetables. However, the best low-carb snack is the Mexican pizza. Created with a toasted tortilla, refried beans, strained salsa, and low fat cheese. Bake it in the oven for four minutes, and you have one tasty snack

How To: Position finger and thumb

Learn how to position fingers and thumb while playing the acoustic guitar. Follow along with Peter Vogl as he covers left hand finger placement, left thumb placement, and holding the pick. Click on the QuickTime icon above to watch a video of this lesson.

How To: Swim

Learn a short history on swimming and how to do the strokes. Even if you're not an avid swimmer, we recommend watching this... It was made by a fifteen year old! Strokes covered are the butterfly, breaststroke, backstroke and freestyle.

How To: Craft a duct tape Halloween bag

You've had pumpkin bags and you've had ghost bags, now you can have a Halloween colored duct tape bag to collect candy in this year. This bag is fun to use and just as much fun to make. Plus, by adding some reflective tape your bag will help keep you safe.

How To: Protect plants from frost

Frost is in the air. If you have tender plants like basil, pepper or impatients when that cold weather comes it will zap those plants. Often, if you can get through those first couple frosts, an Indian summer, that can last weeks and weeks, will follow. If you can protect your plants during this time you can have blooms for much longer. There are several ways to protect your plants. You can use a traditional device like a glass cloche. The nice thing about them is they are decorative and will...

How To: Find & Exploit SUID Binaries with SUID3NUM

File permissions can get tricky on Linux and can be a valuable avenue of attack during privilege escalation if things aren't configured correctly. SUID binaries can often be an easy path to root, but sifting through all of the defaults can be a massive waste of time. Luckily, there's a simple script that can sort things out for us.

How To: 7 Free Pass 'n' Play Games for Your Phone That Make Coronavirus Bearable at Home

If you're quarantining with other people, consider yourself lucky — but it's not always easy. Staying in one space for so long with too many people can be challenging, so you need to find things to do to make the time go by (and to keep everyone sane). Our advice? Try out these seven free multiplayer games that only require one iPhone or Android device to play.

News: Get Dinner Delivered to You from Almost Any Restaurant with These Apps

Whether you were exposed to the COVID-19 virus or just taking precautionary measures, self-quarantining is a tremendous disruption for anyone. Still, we all have to eat, pandemic or not. But unless you like eating canned food for two weeks, you're going to want to explore other options. That's why food delivery apps are going to be so necessary during such a hectic and uncertain time.

News: If You Have Philips Hue Bulbs, This $25 Accessory Is a MUST

I got my first Philips Hue White and Color Ambiance bulbs because they're the consensus best of the best for colored lighting. But after spending 90 bucks on two light bulbs, when it came to all the accessories like switches and buttons, I went with cheaper third party options. Little did I know, I was overlooking a great first-party accessory with a surprisingly reasonable price.

How To: Get Root Filesystem Access via Samba Symlink Traversal

Samba can be configured to allow any user with write access the ability to create a link to the root filesystem. Once an attacker has this level of access, it's only a matter of time before the system gets owned. Although this configuration isn't that common in the wild, it does happen, and Metasploit has a module to easily exploit this security flaw.

How To: Beat LFI Restrictions with Advanced Techniques

One of the most common web application vulnerabilities is LFI, which allows unauthorized access to sensitive files on the server. Such a common weakness is often safeguarded against, and low-hanging fruit can be defended quite easily. But there are always creative ways to get around these defenses, and we'll be looking at two methods to beat the system and successfully pull off LFI.

How To: Exploit EternalBlue on Windows Server with Metasploit

Particular vulnerabilities and exploits come along and make headlines with their catchy names and impressive potential for damage. EternalBlue is one of those exploits. Originally tied to the NSA, this zero-day exploited a flaw in the SMB protocol, affecting many Windows machines and wreaking havoc everywhere. Here, we will use EternalBlue to exploit SMB via Metasploit.

How To: Get Started Writing Your Own NSE Scripts for Nmap

The road to becoming a skilled white hat is paved with many milestones, one of those being learning how to perform a simple Nmap scan. A little further down that road lies more advanced scanning, along with utilizing a powerful feature of Nmap called the Nmap Scripting Engine. Even further down the road is learning how to modify and write scripts for NSE, which is what we'll be doing today.

How To: Crack Shadow Hashes After Getting Root on a Linux System

After gaining access to a root account, the next order of business is using that power to do something more significant. If the user passwords on the system can be obtained and cracked, an attacker can use them to pivot to other machines if the login is the same across systems. There are two tried-and-true password cracking tools that can accomplish this: John the Ripper and Hashcat.