Particles Named Search Results

How To: Lead a double life

Whether you want to juggle two wives or keep you alter ego separate from your day job, here are the precautions you must take. Learn how to lead a double life.

How To: Origami a paper rose

While you can't make a silk purse from a sow's ear, you can make a rose out of a single square of paper and call it whatever name you want. Origami is, of course, the traditional Japanese art of paper-folding to create any shape imaginable. Make a rose when you don't have the money to buy someone the real thing, or even as a gift that will last. Watch this video crafting tutorial and learn how to origami a folded paper rose.

How To: Identify the model number and ID tag on fridge freezer

Check out this instructional home repair video to learn how to identify and find your manufacturer's label and model number on your refrigerators and freezers. The model number is usually essential. People make the mistake of assuming that the name and number on the front panel is all you need. Many fridge and freezer manufacturers use the model number as well as the serial number. Most have the ID plate inside of the door by the salad bowl, while some hide it behind the kick plate at the bas...

How To: Install a TA07 radio in a 2007 Toyota Tundra

Scosche Industries offers this instructional users guide for its TA07 radio replacement interface in a 2007 Toyota Tundra. The TA07 will work with select 2004 and up Toyota vehicles equipped with JBL and JBL Synthesis systems. The TA07SR radio replacement interface was designed to make installation of any brand name aftermarket head-unit simple. The TA07SR allows the customer to replace the factory head unit with an aftermarket head unit and utilize their factory amplifier without having to "...

How To: Do the sissone a la seconde ferme ballet dance move

In this dance how to video, Larry Payne demonstrates the sissone a la seconde ferme (to the second position closed), then en avant (in front), finishing with a "changement." The step sissone is named for the person who invented it. ballet move. This is a basic move for the beginning ballet dancer. Follow along with this dance tutorial and you can do the sissone a la seconde ferme ballet move.

How To: Mix a 007 margarita cocktail

James Bond might have switched to margaritas if he had ever taken a sip of this cocktail. Never forget the ingredients, the drink name is an acronym. Tequila, orange liqueur (Cointreau), orange juice, 7-Up and lime make up the 007 margarita cocktail. Follow along with bartender Alex as he gives step by step directions for how to mix up this citrus-y specialty drink. Watch this video beverage making tutorial and learn how to mix the 007 margarita cocktail.

How To: Cook Indian style macaroni and cheese (desi mac)

Now give us a good reason why the grown-ups should be left out when the kids eat that yummy Mac ‘n’ Cheese! Here is a recipe for ‘Desi’ Mac (macaroni and cheese), as the name suggests, is full of flavor and other goodies that you will be proud to eat as well as serve your family! Watch this how to video and give macaroni and cheese a grown up Indian flavor.

How To: Make a DIY wedding and engagement centerpiece

This how-To video shows you how to make an attractive and romantic centerpiece for your wedding, engagement party, or shower. A lovely mirrored acrylic heart with the couple’s first names, also in mirrored acrylic, is the center point. Turn off the lights and light up the tea candles for that romantic moment! Coordinating ribbon, metallic paper poof flowers, and onion grass lend accents. This is also suitable for Valentine’s Day, Sweetest Day, anniversaries, and other romantic events.

How To: Make the ultimate BLT

The BLT sandwich dates back to late Victorian Tea Sandwiches. The acronym, BLT comes from diner waitresses and cooks who abbreviated the sandwichs name at busy lunch counters across America. In its simplest form, the BLT brings together a delicious combination of flavors. To make my ultimate BLT you will need: thick-cut slab bacon - you can use turkey bacon for a leaner alternative, butter lettuce and arugula, red ripe tomato, your favorite bread, mayonnaise and blue cheese dressing. I think ...

How To: 6 Home Screen Hacks for Your iPhone Apple Won't Tell You About

Apple offers many ways to customize the Home Screen on your iPhone, from adding widgets and scheduling rotating wallpapers to hiding apps and entire pages. But some of the best ways to customize your Home Screen are options Apple won't even tell you about, either because they haven't become official features yet or because Apple is OK with the workarounds.

How To: Hide All App, Folder, and Widget Names on Your iPhone or iPad's Home Screen

In recent years, Apple has made it much easier to customize the Home Screen on your iPhone or iPad, and some of the newer tools are perfect for neat freaks. Nonetheless, a tidy Home Screen can still feel cluttered when iOS and iPadOS force widgets, apps, and folders to have names — but a few workarounds can help you remove some of those icon labels for good.

How To: Create Custom Netflix Watch Lists for Categories & Genres, Then Say Goodbye to Your Overcrowded 'My List'

One of the biggest bummers about Netflix is the inability to create different lists for your favorite movies and TV shows. Instead, you're only able to lump titles into the single default "My List," and that can be impossible to browse. It doesn't separate titles into categories or genres, and titles are arranged for you automatically, so there's not much room for customization.

How To: Use 'Sign in with Apple' on iOS 13 for Better Security & Privacy

We've all seen the login pages that allow you to log in to third-party accounts using your credentials from Facebook, Google, or Twitter. It saves you the trouble of creating another account and remembering more passwords — but it can also become a privacy and security issue, which is why Apple created the "Sign in with Apple" feature for iOS 13.

How To: Spot Fake Businesses & Find the Signature of CEOs with OSINT

Businesses leave paper trails for nearly every activity they do, making it easy for a hacker or researcher to dig up everything from business licenses to a CEO's signature if they know where to look. To do this, we'll dig into the databases of government organizations and private companies to learn everything we can about businesses and the people behind them.

How To: Make Siri Start a New Blank Apple Pages Document on Your iPhone

We're basically living in the future, so let's work like we are. For decades, we have, without question, opened a word processor like Pages, and clicked or tapped our way to starting a new document. What's wrong with that? It's unnecessary. We all have a digital assistant living in our iPhone, one that can start up a new Pages doc by verbal request.

How To: Delete Telegram Messages & Whole Conversations for Everyone in the Chat

If you're looking to keep your conversations private, look no further than Telegram. Its cloud-based chats are secure and its optional end-to-end encrypted chats even more so, but you can't really prevent someone in the conversation from sharing your messages. However, you can lessen that chance by taking back your messages, deleting them for both you and the other end of the discussion.

How To: Exploit EternalBlue on Windows Server with Metasploit

Particular vulnerabilities and exploits come along and make headlines with their catchy names and impressive potential for damage. EternalBlue is one of those exploits. Originally tied to the NSA, this zero-day exploited a flaw in the SMB protocol, affecting many Windows machines and wreaking havoc everywhere. Here, we will use EternalBlue to exploit SMB via Metasploit.

How To: Report to Yelp Wrong Hours, Addresses, Numbers & Other Incorrect Business Listing Information

Business hours and addresses change, but they're not always updated on Yelp by business owners for the rest of us to see. Showing up when a business is closed or going to the incorrect address is a major annoyance, which is why the company allows us, the customers, to help update business information through the Yelp mobile app on iOS and Android. If owners won't do it, somebody has to.

How to Hack Wi-Fi: Disabling Security Cameras on Any Wireless Network with Aireplay-Ng

Electronic warfare tactics work by jamming, disrupting, or disabling the technology a target uses to perform a critical function, and IoT devices are especially vulnerable to attacks. Wireless security cameras like the Nest Cam are frequently used to secure critical locations, but a hacker can surgically disable a webcam or other Wi-Fi connected device without disturbing the rest of the network.

ARCore 101: How to Create a Mobile AR Application in Unity, Part 1 (Setting Up the Software)

If you've contemplated what's possible with augmented reality on mobile devices, and your interest has been piqued enough to start building your own Android-based AR app, then this is a great place to to acquire the basic beginner skills to complete it. Once we get everything installed, we'll create a simple project that allows us to detect surfaces and place custom objects on those surfaces.

How To: Use the Chrome Browser Secure Shell App to SSH into Remote Devices

Many guides on Null Byte require using the Secure Shell (SSH) to connect to a remote server. Unfortunately for beginners, learning to use SSH can become a confusing mix of third-party programs and native OS support. For Chrome OS users, using SSH is even more difficult. We'll fix this by using the Chrome Secure Shell to establish an SSH connection from any device that can run a Chrome browser.

How To: Scrape Target Email Addresses with TheHarvester

Open-source data scraping is an essential reconnaissance tool for government agencies and hackers alike, with big data turning our digital fingerprints into giant neon signs. The problem is no longer whether the right data exists, it's filtering it down to the exact answer you want. TheHarvester is a Python email scraper which does just that by searching open-source data for target email addresses.

How To: Build a Directory Brute Forcing Tool in Python

While attempting to hack a web app, there may come a point where the attacker may have to escape the default directory in order to access unauthorized files. This is known as a directory traversal attack. Much as the name implies, this attack involved traversing the servers directories. But in order to move to an unauthorized directory, we need to know where those directories are. Today we'll be building a tool to brute force these directory locations based on HTTP response codes. Before we g...