Machine' Sharp Search Results

How To: Make rabbit toys

There’s nothing a rabbit likes more than toys they can climb inside, shred, and drag around. With a good pair of scissors, you can make a steady supply of bunny-pleasers that won’t cost you a thing.

How To: Shop at a thrift store

Go thrifty! Go vintage! Go second hand. With the right approach and an open mind, a trip to your local thrift store can yield some fashionable bargains. Buying used is a smart solution to this economy, and gives you a smart sense of fashion.

How To: Keep areas clean for your dog

Your dog travels all around the house all day. Here are five places to remember to keep clean. Watch this how-to video as the Dog Channel offers five places your dog encounters that are important to clean regularly. Remember he always travels to his toys, crate and bed.

How To: Make a homemade wallet

Making your own homemade wallet can be a fun and rewarding hobby. Get your sewing machine out and you can add your own style and personality to your wallet. Learn how to make a homemade wallet from a professional seamstress in this free sewing and crafts video series.

How To: Convert an RC bike with a brushless motor

Well I've converted one of these rc bikes into a snarling (ha ha) nitro powered machine. I'm now going to convert my other stock model into a brushless monster. This particular bike had a rather bumpy crossing from the USA when I bought it from ebay. It got damaged in it's box and was returned to the sender. He, very nicely, found a new set of front forks, fitted them and posted it back to me, for no extra charge! Top Man! It's a bit sluggish, stock, so I think sticking a MAMBA MAX 7700kv mot...

How To: Make Day of the Dead paper mache sculptures

In this tutorial, we learn how to make day of the dead paper mache sculptures. First, you will make the paper mache sculptures into different body shapes, then use a sharp knife to carve along the sculpture. Use different paints and colors to make the characters more believable and realistic. Use a thick paper mache when making these, because you will lose a lot of layers when you are thinning it down and shaving it into shape. When finished, you will attach the different pieces of body parts...

How To: Rank up fast in Modern Warefare 2

Mudtokens of YouTube found a way to quickly level up in Modern Warfare 2 and wants to share. His method of doing this is to get 12 of your friends into a ranked lobby, making it a full game. After this, you get one person from each team, who will be the one getting ranked up. For this to work, however, you need 2 load outs, both of which need to have One Man Army and Stopping power, one with a light machine gun, and the other with a riot shield. The two meet up in the game, and take turns blo...

How To: Vote with an electronic touchscreen voting machine

See how to vote in York County in PA by watching this video tutorial. With the new touchscreen electronic voting machines in Pennsylvania, you'll need to check out this video to make sure your ballot gets counted. So, if you want to get out this year and vote for Hillary or Obama, then make sure you do it right, don't screw up! This video is a must for you old folks with no computers skills at all, so get up to date and vote electronically in your county election.

Exploit Development: How to Learn Binary Exploitation with Protostar

Being able to write your own hacking tools is what separates the script kiddies from the legendary hackers. While this can take many forms, one of the most coveted skills in hacking is the ability to dig through the binary files of a program and identify vulnerabilities at the lowest level. This is referred to as binary exploitation, and today we're going to check out a tool known as Protostar.

Hacking Pranks: How to Flip Photos, Change Images & Inject Messages into Friends' Browsers on Your Wi-Fi Network

Networking is built largely on trust. Most devices do not verify that another device is what it identifies itself to be, so long as it functions as expected. In the case of a man-in-the-middle attack, we can abuse this trust by impersonating a wireless access point, allowing us to intercept and modify network data. This can be dangerous for private data, but also be fun for pranking your friends.

How To: Execute Remote Commands on a Disconnected Victim

Do you ever thought that you can't control an Internet disconnected system? I saw a funny video in Chema Alonso's youtube channel (A well-known hacker of my country and creator of Fingerprinting Organizations with Collected Archives among other security tools), and decided to post something similar.

How To: Dehydrate Food Without a Dehydrator

I grew up in a rural town, and that meant that we dehydrated a lot of food. Even with a hungry family of five, there was no way that we could eat all of the season's tomatoes before they molded, or all of the orchard's apples before they grew soft, or all of the wild mushrooms that we picked. And so our dehydrator was always getting a good workout.