On Line Businesses Search Results

How To: Apply glittery eye makeup for New Year's

This makeup tip is perfect for a glittery eyeshadow for New Year's as inspired by the cover of Sephora's magazine. First, apply a semi-dark gray eyeshadow along your eyelid and on the outside corners of your eyes. Using a fluffier brush, apply a lighter white-silver eyeshadow and then use dark black eyeliner along the line of your eye. Use silver glitter along your eyelids in a few layers and black layer on the outside of your eyelids for that perfect festive New Year's look.

How To: Create Ke$ha's "Tik Tok" toe nails

This tutorial teaches you how to do the same nail design as Ke$ha from her video "Tik Tok" had her nails done. First you apply a base polish to protect your nails. Apply a gold polish all over the nail, about three solid coats and then let them dry. Paint on a rich wine color to the corner of each nail end. Use a dotting tool and clean polish to pick up the rhinestones. Apply a little bit of nail glue on the seam of the two colors to help the Rhine stones stay put. Take a fine tip brush with ...

How To: Tattoo professionally step-by-step

For people who would like to learn how to make a professional tattoo, this is the tutorial to watch. For making a basic arm tattoo, the subject should be seated upright in a military position. You should apply some alcohol and then some antiseptic to the area to disinfect the area and place the stencil over the area. It is suggested that the subject shave his or her arm in order to get the best effects. The tattoo stencil should be placed over the center line of the arm and align it properly,...

How To: Create a green smoky eye with your makeup

Get that very "right now" green smoky eye with some help from the professionals at Smashbox Cosmetics. By starting with cream liner Midnight Green and applying little smudges along the line, go back to smudge with your brush to create a smoky effect. Stand our this fall with vivid color and this soft, not-so-innocent makeup look.

How To: Solve quadratic inequalities in calculus

Calculus can be a bit tricky, but don't worry, Watch Math is here to help you out. Watch this math video lesson to learn how to solve quadratic inequalities in calculus. There's no better way to learn mathematics than from an advanced mathematician, like this PhD.

How To: See who is connected to a computer with netstat

Want to see whether your PC is being accessed by hackers? Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is available on Unix, Unix-like, and Windows NT-based operating systems. This video tutorial presents a basic introduction to working with the netstat tool. Determine whether you've been hacked with this how-to.

How To: Hack with Hacme Shipping

Foundstone Hacme Shipping is a web-based shipping application developed by Foundstone to demonstrate common web application hacking techniques such as SQL Injection, Cross Site Scripting and Escalation of Privileges as well as Authentication and Authorization flaws and how they are manifested in the code. Written in ColdFusion MX 7 using the Model-Glue framework and a MySQL database, the application emulates the on-line services provided by major shipping companies. This video will get you st...

How To: Use the sandbox tools in SketchUp 6

SketchUp 5 and up has a Sandbox. But there are a few rules to know before you're allowed to play. In this episode of The SketchUp Show, Alex leads you in creating a landscape from scratch, and a second way to model terrain from existing contour lines using the sandbox tools. Landscapers will love learning to use the sandbox tools in this episode!

How To: Make a newspaper tree

The Professor of Silliness returns with some paper. Watch this instructional video to make a tall tree out of newspaper. You need an old newspaper, masking tape, and scissors. Simply lay out the newspaper pages from end to end and tape them together. Then roll it up at a diagonal, starting from one corner, and pack i it into a compact tube. Use tape to keep the tub intact Use the scissors to cut vertical lines half way down the newspaper tube. Pull out the inner most layer and turn your recyc...

How To: Up Your Linux Game with This $19.99 Bundle

When we think about operating systems, we tend to view them from the perspective of a user. After all, most of us have spent a substantial amount of time on our computers, and so we've become more than acquainted with the ins and outs of whatever system we have running on our personal device. But there is one operating system that, while being less commonly used on the user side, is behind a great deal of design and business technology: Linux.

How To: Return to the Default Font in Mail Drafts After Using a Custom One

One of iOS 13's coolest features is the ability to download, install, and choose fonts in select apps like Pages and Mail. However, you might notice an issue when writing an email with a custom typeface: there's no option to return to the default font. What gives?

How To: Use Beginner Python to Build a Brute-Force Tool for SHA-1 Hashes

Developers creating login systems know better than to store passwords in plain text, usually storing hashes of a password to prevent storing the credentials in a way a hacker could steal. Due to the way hashes work, not all are created equal. Some are more vulnerable than others, and a little Python could be used to brute-force any weak hashes to get the passwords they were created from.

How To: Infect Yourself with Greyscale from 'Game of Thrones' for Halloween (Makeup Guide)

There aren't many people who will believe that a prosthetic zipper face or gunshot wound to the eye (disgusting as they are) are real, but greyscale from Game of Thrones? That'll really unsettle people for awhile because it totally looks like an actual, honest-to-God infection that someone in 2017 could conceivably have. Which makes it very effective come Halloween, whether it's for a full-on Princess Shireen, Jorah Mormont, or Stone Man costume, or to just infect a completely different chara...

How To: Security-Oriented C Tutorial 0x11 - Command Line Arguments

In many programs on Linux, you'll come across programs which allow you to specify additional arguments instead of just simply running the program by itself. If you've used the Kali distribution, I'm more than certain you'll have come across these with the command line tools, else if you have been following these tutorials, we have already come across three tools which also use the same technique, i.e. gcc, gdb and wc. How do we do this with C? Let's find out.

How To: Hack Your Old Phone Line into an Emergency Power Supply for Your Cell Phone

"Ahoy-hoy." If telephone titan Alexander Graham Bell had his way, we'd all be answering phones like Mr. Burns. Thankfully, frienemy Thomas Edison had enough sense to realize we weren't always on the briny. He preferred "hello" as our standard telephone greeting, which he is credited with coining in 1877. Fellow American pioneer Davy Crockett actually used it as a greeting first in 1833 (as compared to an exclamation)—but in print, not over the phone.