Named-it Search Results

How To: Play Othello or Reversi

Othello, also known as Reversi, is played with two players, each representing a color on the board. The rules are simple, but strategy is what will help you win. Watch this video to learn how to play Othello or Reversi.

How To: Draw Zero No Louise of Zero No Tsukaima

Learn How to draw Zero no Louise of Zero no Tsukaima Zero no Tsukaima, or The Familiar of Zero as it is popularly known in the west, is a fantasy comedy-romance anime that tells the story of a young female mage named Louise. For the full tutorial with step by step & speed control visit: how to draw.

How To: Do a Charleston dance variation Savoy Kicks

Watch this dance how to video and learn the Charleston Variation: Savoy Kicks. The Charleston is a dance named after Charleston, South Carolina. The dance became popular in the USA after the swing jazz 1923 song "The Charleston" by composer/pianist James P. Johnson came out. The Charleston soon became one of the most popular hits of the time period.

How To: Origami cranes for good luck

According to Japanese legend, folding 1,000 paper cranes in one year will guarantee your wish will come true. A young girl named Sadako did just that in 1955 and wished for world peace—the origami crane has been an international symbol of peace ever since.

How To: Do the classic pass

Follow along with an overeager young magician named Dergen Brown as he teaches you how to do a classic pass card move. If you can ignore the comedy effort in the beginning, you'll learn this basic technique.

Exploit Development: How to Read & Write to a Program's Memory Using a Format String Vulnerability

Format strings are a handy way for programmers to whip up a string from several variables. They are designed to save the programmer time and allow their code to look much cleaner. Unbeknownst to some programmers, format strings can also be used by an attacker to compromise their entire program. In this guide, we are going to look at just how we can use a format string to exploit a running program.

Hack Like a Pro: Scripting for the Aspiring Hacker, Part 2 (Conditional Statements)

Welcome back, my greenhorn hackers! I recently began a series on scripting and have received such positive feedback that I'm going to keep this series going. As I've said before, to graduate from the script kiddie to the pro hacker, you'll need to have some scripting skills. The better you are at scripting, the more advanced your hacking. Ultimately, we are leading up to developing the skills to build your own zero day exploits.