Military Sites Search Results

How To: Make a kitty litter deep cleansing facial mask

Yep Kitty Litter, but DON'T FREAK OUT! Read or watch the video before you make any assumptions. This mask is perfect for oily, dirty, large pores skin! If you need to detoxify your skin, this is the best mask to use, and you can make it right at home! Use this once every 2 weeks. You should deep cleanse your face once every 2 weeks to remove impurities. Unscented Kitty Litter is made out of Clay, Bentonite clay to be excat. Bentonite is clay that is is rich in minerals and it comes from volca...

How To: Use the Kongregate badge hack (09/20/09)

Kongregate is a site that allows users to upload games. Users must go to the site to download the hack. On the site, select Kongregate. Then select the first topic and click on KBH 2.0.14. Once downloaded, you can extract the files onto your desktop. Open up the file and follow the video on how to use it. It also comes with the auto rater. This video will benefit those viewers who play games on the Kongrgate website and would like to earn badges.

How To: Customize HTC Home plug-in for WIndows Mobile devices

This video tutorial shows you how to use a free program to customize the HTC Home plug-in for Windows Mobile touchscreen devices. You can use any Windows Mobile cell phone or other device for this hack. YOu can run applications like Streaming Media on your HTC Home site from your smartphone. Just watch and learn.

How To: Create a book in iPhoto '08

This tutorial shows you how to use iPhoto '08 to create a book (or photo album) of your photos. The cool part is when you're done making it, you can upload it to the Apple site to buy your book and have it printed and shipped to your door.

How To: Do Muay Thai boxing moves

Born in New York, raised in Los Angeles, Ric O'Kane started competing as a martial artist at 18. He has trained at the World Famous Jet Center in Van Nuys, California where he fought with Benny “The Jet” Uriquidez in the early ‘80’s to mid ‘90’s. Ric holds four titles. Muay Thai, otherwise known as Thai Boxing is a hard martial art practiced mainly in Thailand. Named as the national sport, a modified version of Muay Thai is practiced by the military in self defense.

How To: Save your life by sawing your trapped arm off à la Danny Boyle's 127 Hours

How far would you go to save your life? For James Franco, who plays real-life hiker Aron Ralston in Danny Boyle's "127 Hours", staying alive means cutting off your own arm with a dull pocketknife. If you've seen the movie (or even heard about all the people who fainted and threw up after watching it), you know that it presents one of the most grueling self-amputation and bone breaking scenes in movie history.

How To: Fix, enhance, and retouch photos in Photoshop

Pixel Perfect is the "perfect" show to help you with your Photoshop skills. Be amazed and learn as master digital artist Bert Monroy takes a stylus and a digital pad and treats it as Monet and Picasso do with oil and canvas. Learn the tips and tricks you need to whip those digital pictures into shape with Adobe Photoshop and Illustrator. In this episode, Ben shows you how to fix, enhance, and retouch photos in Photoshop.

How To: Prepare and cook a meal as a Boy Scout

As a Boy Scout, when the First Class rank is attained, a scout has learned all the basic camping and outdoors skills of a scout. He can fend for himself in the wild, lead others on a hike or campout, set up a camp site, plan and properly prepare meals, and provide first aid for most situations he may encounter. A First Class scout is prepared.

How To: Enable the web server for your Mac Mini server

How to Use Your Mac as a Server: Turn your Mac Mini into a server! Yes, that's right, with a little know-how and a little spunk, you can turn an inexpensive Mac Mini computer into a server to provide services over you network. You won't even need the Mac OS X Server, just the Mac OS X Client, so there is no extra software to buy, just the Mac Mini and it's operating system.

How To: Browse Privately & Securely with This VPN

If you're looking to improve your browsing experience, then a VPN is the right way to go. If you're tired of censored or geographically blocked sites and wary of companies selling your data, then a good VPN can be your answer to a problem that limits every aspect of your experience online.

How To: Phish Social Media Sites with SocialFish

Phishing is the easiest way to get your password stolen, as it only takes one mistake to log in to the wrong website. A convincing phishing site is key to a successful attempt, and tools to create them have become intuitive and more sophisticated. SocialFish allows a hacker to create a persuasive phishing page for nearly any website, offering a web interface with an Android app for remote control.

How To: Get a Real System-Wide Dark Mode on Your iPhone for Less Battery Drain & More Night-Friendly Views

A universal dark theme has long been one of the most sought-after features we've been urging Apple to introduce for iOS. While this wish went unfulfilled with iOS 12, there's renewed hope that it'll finally touch down with iOS 13's arrival. The jailbreak community, however, has had this functionality available for quite some time, and you can too if you're running the right iOS version.

How To: Automate Wi-Fi Hacking with Wifite2

There are many ways to attack a Wi-Fi network. The type of encryption, manufacturer settings, and the number of clients connected all dictate how easy a target is to attack and what method would work best. Wifite2 is a powerful tool that automates Wi-Fi hacking, allowing you to select targets in range and let the script choose the best strategy for each network.

How To: Leverage a Directory Traversal Vulnerability into Code Execution

Directory traversal, or path traversal, is an HTTP attack which allows attackers to access restricted directories by using the ../ characters to backtrack into files or directories outside the root folder. If a web app is vulnerable to this, an attacker can potentially access restricted files that contain info about all registered users on the system, their permissions, and encrypted passwords.