Machine' Sharp Search Results

How To: Reduce the size of a t-shirt

If you've ever wondered how to resize a T-Shirt to a smaller perfect fit, then follow these simple steps presented by Stacey from Sewing Republic. To shrink down your T-Shirt, follow theses steps: You will need an oversized shirt, a smaller shirt to use as a pattern and your sewing machine. 1. Turn both shirts inside out, and lay the fitted shirt on top. 2. Fold the sleeves back and pin the shirts together. 3. Trace around the fitted shirt with a fabric marking pen. Add 1/2 inch for your seam...

How To: Make a mini bell pepper for a dollhouse

To make a hollow clay bell pepper, you will first need four thin strips of aluminum foil. Roll each one into a tiny, thin strip. You will also need pearlized white clay rolled out very thin (number seven on a pasta machine), and rolled out green, red, or yellow clay (number four on a pasta machine). Take your four strips of tin foil and line the up on one end placing them together in a bundle. Place on the white clay and the clay around it one time, remove the excess. Use your fingers to make...

How To: Use Amaco bead rollers

Our instructor will choose set 2, 6 and 8 to show you what the company offers. On the wrappers are pictures of the types of beads possible with each set. She will create from set 2 today, which makes oval beads. Inside of the packages, such as this package which holds set 2 are several items. First is the thin metal pins or rods that can go into the baking oven with the polymer clay molded around them. Next, two pieces for the mold, a bottom and top that fit together with grooves. There are a...

How To: Hack Apache Tomcat via Malicious WAR File Upload

Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web management interfaces should be scrutinized just as hard as the apps they manage, especially when they contain some sort of upload functionality. By exploiting a vulnerability in Apache Tomcat, a hacker can upload a backdoor and get a shell.

How To: Enumerate NetBIOS Shares with NBTScan & Nmap Scripting Engine

NetBIOS is a service that allows for communication over a network and is often used to join a domain and legacy applications. It is an older technology but still used in some environments today. Since it is an unsecured protocol, it can often be a good starting point when attacking a network. Scanning for NetBIOS shares with NBTScan and the Nmap Scripting Engine is a good way to begin.

How To: Securely Sync Files Between Two Machines Using Syncthing

Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mitigate these risks, we'll use a secure, open source, and decentralized alternative.

How To: Use Pupy, a Linux Remote Access Tool

In one of my previous articles, I discussed ShinoBot, a remote administration tool that makes itself obvious. The goal is to see if the user could detect a remote administration tool or RAT on their system. In this article, I'll be demonstrating the use of Pupy, an actual RAT, on a target Ubuntu 16.04 server.

Knives 101: How to Care for Your Knives Like a Pro

Ask 100 chefs what the most important tool in their kitchen is, and you'll get 100 chefs saying the exact same thing: their set of knives. For home cooks and professional chefs alike, nothing is more important (or exciting) than a good knife. A good knife allows you to work more quickly, more efficiently, more consistently, and more safely. And best of all, they're just a lot of fun.

How To: Reconstruct a t-shirt into an off the shoulder top

In this video, we learn how to reconstruct a t-shirt into an off the shoulder top. First, take a large shirt of your choice color and cut along the line on the shoulder, leaving a 1/4" seam allowance. Next, roll the hem and sew with a sewing machine. Next, cut a strap 4" wide and fold in half, then sew along the edge. After this, use a safety pin to pin one side to the shirt and then to the other side of the shirt. After these are secure, draw marks along the neck line of the shirt. Cut out t...

How To: Make a hedgehog plushie

In this tutorial, we learn how to make a hedgehog plushy. First, choose a fabric to use, then cut out the shape of it. Once you have done this, cut it out again and pin the two pieces of fabric together. After this, use a sewing machine to sew all of the sides together, leaving a hole in the bottom. Now, turn the hedgehog inside out and then iron him flat. Place some stuffy cotton into the plushy until it is as full as you would like it. Then, sew the hole together so none of the stuffing can...