Plants Database Search Results

How To: Brew loose leaf tea

All tea comes from the same plant; however, the way the tea leaves are prepared are very different. Learn about green, white, Oolong, and black tea in this free video series about making the perfect cup of loose leaf tea.

How To: Use basil after the season is over

We next visit the farm, where the real production takes place. They are growing some unusual items. Several herbs, like Shiso or Perilla (Perilla frutescens) are available in green or red varieties. They have a very unique flavor, almost nutty with a touch of citrus and a very aromatic flavor. Jerry uses them to make a green apple shiso ice. And you can use it as a salad green when it's young and actually use the seeds as well. Use the tips in salads and the seeds when they start to form, the...

How To: Do skateboard eggplants at a skatepark

Park Skateboarding: Show Off Your Skills The first skateparks appeared in the 1970s, and nowadays, they're the epicenter of the skateboarding world, a place to see and be seen. That being the case, you don't want to show up to the park without your "A" game. Let our trick guide get you up to speed. Watch this video tutorial to see how to do skateboard eggplants at a skatepark.

How To: Divide and pot Canna lilies

If you want some large, bold foliage in a border during the summer, canna lilies take some beating. They are really easy to grow either in the border or large pots and produce large paddle shaped leaves and tall flower spikes. Canna lilies aren't hardy plants so unless you live in a very sheltered area it is wise to dig them up in autumn and store the fleshy roots in a frost free place. Increasing your stock of canna plants is very easy with the tips from this how to video.

How To: Take cuttings from a blue flower sage

In this gardening tutorial, Martin Fish from Garden News shows you how to take cuttings from Salvia patens or blue flower sage. Cuttings are a way to root new plants from a larger plant. Watch this how to video and you can get tips on how to take a cutting and root a blue flower sage plant.

How To: Track database changes with Oracle

It has often been said that the only constant is change. IT's ability to manage change is an important business success criteria in today's competitive markets. Change can either be planned or unplanned. This presentation will help you understand the effects of change, and how to manage change properly. It will help Oracle database administrators better prepare to implement changes and measure the positive (or negative) affects those changes produce on the system.

News: After 5 Years, Touch ID Is About to Get Read Its Last Rites

RIP Touch ID. Apple's fingerprint sensor on iPhone and iPad models with Home buttons is about to become phased out on Wednesday, Sept. 12. While Touch ID will remain an integral part of models from the iPhone 5S to the iPhone 8 Plus, as well as the iPad Air 2 through the sixth generation iPad, Face ID will completely take over as the default security method for unlocking future iOS devices.

How To: Find & Change Weak Reused Passwords to Stronger Ones More Easily in iOS 12

The option to auto-fill passwords on your iPhone has been around a while now, but iOS 12 improves on it by suggesting strong passwords when first creating an account online in Safari or within apps. Apple has also added "password reuse auditing" for your iCloud Keychain, where all your logins are housed, which will find and change your weak passwords to strong ones.

How To: Quickly Look Up the Valid Subdomains for Any Website

Traditional subdomain enumeration techniques create a lot of noise on the target server and may alert intrusion detection systems to an attacker's intentions. For a stealthier approach, there's a tool with the capability of finding hundreds of subdomains related to the target website without alarming the server administrators.

News: Natural Antibiotic from Cystic Fibrosis Patient Knocks Out TB

A promising new antibiotic has been discovered in, of all things, another bacteria. Burkholderia bacteria live in diverse habitats, including soil, plants, and humans where they thrive by knocking out other microbes that compete with them for resources or threaten their existence. Scientists have discovered they accomplish this by producing a very effective antibiotic.

How To: Scrape Target Email Addresses with TheHarvester

Open-source data scraping is an essential reconnaissance tool for government agencies and hackers alike, with big data turning our digital fingerprints into giant neon signs. The problem is no longer whether the right data exists, it's filtering it down to the exact answer you want. TheHarvester is a Python email scraper which does just that by searching open-source data for target email addresses.

Hack Like a Pro: How to Hack Web Apps, Part 6 (Using OWASP ZAP to Find Vulnerabilities)

Welcome back, my tenderfoot hackers! Web apps are often the best vector to an organization's server/database, an entry point to their entire internal network. By definition, the web app is designed to take an input from the user and send that input back to the server or database. In this way, the attacker can send their malicious input back to the servers and network if the web app is not properly secured.

Sustainable Seafood: The Food Hacks Guide to Doing It Right

Fish is delicious, and as the Harvard School of Public Health points out, incredibly good for you. There are many studies that show regularly consuming a couple of servings of fish per week can help prevent heart disease and may well reduce your chances of stroke, depression, and getting Alzheimer's. After all, there's a reason why fish is called "brain food."

Hack Like a Pro: How to Clone Any Website Using HTTrack

Welcome back, my hacker novitiates! Recently, I demonstrated a hack where you could redirect traffic intended for one site, such as bankofamerica.com, to your fake website. Of course, to really make this work, you would need to make a replica of the site you were spoofing, or better yet, you could simply simply make a copy of the original site and host it on your own server!

Hack Like a Pro: How to Exploit SNMP for Reconnaissance

Welcome back, my rookie hackers! The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked sources for information is the Simple Network Management Protocol (SNMP). Many rookie hackers are not even aware of it, but it can prove to be a treasure trove of information, if you understand how it works and how to hack it.