Machine Traits Search Results

How To: Fix Defective Pixels & Improve Image Quality on LCD & LED Monitors

I have owned quite the plethora of electronics in my life. A commonality between most of these devices' screens is frozen or dead pixels. This is probably the most annoying thing about buying new hardware—your LCD, or worse, LED display has one or more pixels that continues to stay lit. Most of the time, this will appear in the form of a brightly colored pixel that never changes, or a pixel that never displays the right color. Once you notice it's there, you just can't stop staring at it. It ...

How To: Get tattoo advice and tips

Expert tattoo artist Rick Wyckoff offers a wealth of knowledge on the history of tattoos, explains how the tattoo machine works, and offers tips on how to care for a new tattoo, how to preserve the pigment, and how to deal with the pain that comes with being tattooed.

How To: Use Reason 3.0 music software

In this series of online video tutorials you'll learn how to use Reason 3.0 music recording software. Expert Jerus Arte demonstrates how to use the program, from installing it on your computer and setting it up with the right preferences, how to control the master volume, and how to use features like the NN-19, the NN-XT, the Dr, Rex loop player, and the Redrum machine. He shows you how to use effects like the compressor and reverb, and how to mix down your song into a format that can be burn...

How To: Lose the freshman 15

It’s easy to gain a little extra weight in college but there are ways to defy this weight gain trend. It won’t work without will power but you can limit your unhealthy food intake and sneak in some unconventional exercise routines.

How To: Understand 4-track reel to reel tape recorders

In these music studio recording and production videos, learn how to use a 4-track reel to reel tape recorder to capture your vocals, guitar parts, drums, record songs, or even make a demo CD. Our expert will walk you through the operation of a fairly simple reel to reel machine in several steps, including the basic and advanced functions, rear components, using mics and connecting to other mixing boards, recording on four different tracks, mixdown, bouncing tracks, and final tips for masterin...

How To: Know materials and supplies needed for sewing

In this informative video clip series, our expert seamstress will show you everything you need to begin a sewing project either by machine or by hand. Learn how to measure fabric and what types of measuring devices are available, see the types of scissors, rulers, thimbles and pins are available to choose from, and get pointers on fray checkers and seam rippers. Everything you'll need to begin a sewing project is right here!

How To: Pressure wash your house

In this DIY home improvement video series, learn how to pressure wash the exterior of your house—as well as the sidewalks, driveway and deck. Our expert will show you where to get a pressure washing machine, how to hook it up, what wands and tips to use, and how to start the pressure washer. Then follow him as he takes you around the house—from roof, to eaves, to windows, to exterior walls—showing you the proper pressure washing techniques for cleaning. After watching these videos, you should...

How To: Repair a lawnmower

In this series of expert videos, you will learn more about lawnmower maintenance. Watch these videos to see how easy do-it-yourself lawnmower maintenance can be! You will learn how to clean your lawn mowing machine, and keep it free of dirt, rust, and grass clippings. Get tips on changing the oil and air filter on your lawnmower. Learn how to mix two-stroke fuel for your mower. Watch as our expert removes gas, foam filters, and dirty spark plugs from a lawnmower. When changing the blades of y...

How To: Use SELinux Targeted Policy to Secure Your Hosts

Hackers often rely on lazy system admins and unpatched vulnerabilities to get access to a host. Keeping intruders off of our machines requires us to update daily, only run the services we need, and read the code, among other things, but we can still make mistakes. Luckily for us, we can limit the damage caused by those mistakes by running SELinux.

Exploit Development: How to Manipulate Code Execution with the Instruction Pointer

The one thing that separates a script kiddy from a legitimate hacker or security professional is the ability to program. Script kiddies use other people's tools, while hackers and security pros write their own tools. To that end, we're going to see how a stack overflow vulnerability allows us to flood a variable with enough input to overwrite the instruction pointer with our own commands.

How To: Do pilates reformer exercises

In this series of health and fitness videos you’ll learn how to use a pilates reformer and several exercises you can do with the machine. Expert April Plank shows you how to do a number of pilates exercises, including leg circles, bicep curls, roll backs, and Y position exercises just to name a few.

How To: Disable iOS 17's Live Voicemail on Your iPhone's Incoming Call Screen

Apple's Live Voicemail lets you preview what an incoming caller is speaking to your voicemail system in real time. It's a revolutionary feature like Visual Voicemail on the original iPhone, only better since it helps you screen calls to quickly decide whether to answer or ignore callers. It's similar to answering machines, whose popularity peaked in the mid-90s, but you quietly read transcribed messages instead.

How To: Use Linux Smart Enumeration to Discover Paths to Privesc

Privilege escalation is the technique used to exploit certain flaws to obtain elevated permissions relative to the current user. There are a vast number of methods out there to go from user to root on Linux, and keeping track of them all can be difficult. This is where automation comes into play, and a privilege escalation script called Linux Smart Enumeration is one to take advantage of.

How To: Protect Up to 10 Devices with This All-in-One VPN

With millions of people working from home as a result of the coronavirus outbreak, hacking is on the rise. Nefarious black hats are taking advantage of the fact that workers have been forced to abandon their secure office networks in favor of home wireless connections. And white hats are spending even more time at home trying to be the next great ethical hacker.