On Line Slots Search Results

How To: Use perspective in Photoshop

A very important thing to keep in mind when you're creating images from scratch or even putting things into existing images is the concept of perspective. Bert goes back to basics to teach this concept, starting with a horizon line and adherence to the rules of mother nature.

How To: Sculpt a purple clay electric eel

First of all take the clay and make a roll. Now keep rolling to form a roll that has one end large and the other end smaller at the tip. Now bend the roll upwards from the middle. Now take a match stick. Now use this to make a hole to make the mouth. Use to fingers to make the corners of the mouth round in shape. Make the mouth wide and open. Now make the eyes by using a matchstick to pierce the sockets. Now take a little clay and then make a roll of it. Now make a leg out of it by making the...

How To: Create a geisha makeup look for Halloween

Wash your face and make sure there are no oils or lotions. Use a toner or a makeup primer which you can purchase at drug store. Pull your hair off of your face with a headband. No hair should be near your face, ears or nape of neck. This is the oil undercoat for use with the 'Kabuki Oshiroi' Shiro-Nuri (Doran) face paint. It is softened in the hands and then rubbed over the entire face or other areas to prepare the skin for the white face makeup. This is the stiff wax used to flatten out faci...

How To: Find Vulnerable Webcams Across the Globe Using Shodan

Search engines index websites on the web so you can find them more efficiently, and the same is true for internet-connected devices. Shodan indexes devices like webcams, printers, and even industrial controls into one easy-to-search database, giving hackers access to vulnerable devices online across the globe. And you can search its database via its website or command-line library.

Hack Like a Pro: Snort IDS for the Aspiring Hacker, Part 2 (Setting Up the Basic Configuration)

Welcome back, my tenderfoot hackers! As you should know from before, Snort is the most widely deployed intrusion detection system (IDS) in the world, and every hacker and IT security professional should be familiar with it. Hackers need to understand it for evasion, and IT security professionals to prevent intrusions. So a basic understanding of this ubiquitous IDS is crucial.

How-to Ruby : Simple SSH Bruteforcer

Hello fellow training hackers. I do not know if many of you are familiar with ruby, but since it is a useful scripting language, that hasn't been covered too much here on Null Byte, I thought why not do some How-tos about it now and then.

How To: Make Colorful Ice Candles

See how to make homemade "ice" candles out of taper candles (or wax flakes). Cut up the taper candles, heat them until melted, then pour into a container lined with ice (chipped ice, not cubes) with the wick dangling in from above. The ice will create an interesting design in the candle.