Tom of Videomaker teaches how to use the green screen to make a character appear in front of a set or to achieve the website spokesperson effect. Install a green screen in such a way that the fold at the corner of the wall and the ground is instead curved in order to create an even transition from the top to the bottom of the green screen. Build the base at the bottom part of the screen by weighing down the fabric at the corners and stretch it evenly. Light the green screen separately from th...
Want to forget about always pulling out your credit card to purchase something on your BlackBerry? There's a little application that can do it all for you? But how? Best Buy has answers. The Best Buy Mobile team explains how to use the BlackBerry Wallet application. This application can store personal information such as credit card information and shipping addresses on a secure website for easy access when shopping online.
AVG Free from Grisoft provides you with basic antivirus and antispyware protection for Windows and is available to download for free. The only trick is finding it on the AVG website. In this video tutorial, you'll learn how to find and install AVG on your own Windows PC. Take a look!
If you visit the same pages over and over, you may want to consider setting multiple start pages. While you may not have even known such a thing was possible, the set-up procedure is simple in both Mozilla Firefox and Windows Internet Explorer 7. Learn how to use browser tabs to open up multiple websites when you launch your browser with this how-to.
Want to watch your favorite Internet clips in the woods? Or on a boat? This video tutorial offers step-by-step instructions on downloading streaming video from video sharing websites like YouTube and Dailymotion using the media-convert web application. For more, or to get started using Media Convert for yourself, watch this video how-to!
Interested in pen spinning? Want to pick up a few moves? Pen spinning is the skilled movement of a writing instrument or pen with one's hands. It is used as a source of self entertainment (often for students), but there is a great deal of pen spinning culture (competitions, websites, etc.). Watch this pen spinning tutorial video and learn how to perform the "Continuous Middle Backaround 1.5" move.
This tutorial demonstrates how to quickly and easily create graphical navigation bars with DHTML menus for your website, using Xara Menu Maker.
A quick demo of how easy it is to create graphical website button bars with DHMTL menus using Xara Webstyle.
This website (www.someecards.com) is full of interesting e-cards that say what you really think instead of sugar coating it. Have fun with this one :-)
This walks you through how to create an animated GIF image file that can be used in websites, as avatar's, as icons, etc. You'll be using Microsoft Paint to create each frame of the animation, and an application called Unfreez (found here) to animate them together.
The extract tool in Photoshop is one of the most frequently used - and useful - tools you'll ever learn to use. Extracting allows you to remove a picture from its background or even filter away flyaway hair.
You can make almost any website your homepage but what if you have more than one favorite? How do you choose? With FireFox you don't have to because you can set multiple homepages.
This video explains how to organize your photos into folders on the Pictage Photo Lab website.
See how to add grungie borders to your images to give them a cool effect in Photoshop. If your borders are white and the background of the background of the website or page you are uploading them to is also the borders will blend in giving it an even cooler look. This is a great Photoshop picture effect!
How to write Page Titles for your Title Tags from Search Marketing Vancouver. Learn how effective Title Tags can improve your SEO Results on Google and increase traffic to your website.
In this video, you'll discover how to upload files to your own website or blog using FTP.
This tutorial demonstrates how to create message boxes for a website using Adobe Dreamweaver.
Another NewDarkRoom.com Video tutorial. This tutorial will show you how to get more room out of your photo booth by hiding all the unwanted parts past your seamless paper. As usual you will be able to find a more detailed larger video at our website.
If you're putting your email address online on your own website, or sites like facebook or myspace, you may want to be a bit clever about it. Check out this tutorial and see how to protect your email address from spam.
Django is a Python web framework used for rapid application development in any environment. In under 10 minutes, you can go from a bare Linux (Ubuntu) installation to a fully functional Django server.
As a means to combat annoying and intrusive advertisements in Safari, Apple added native support for content blockers on the iPhone. Instead of being bombarded by notifications, banners, and pop-ups, content blockers prevent them from opening, which can also be said about those annoying cookie consent notices that many websites now have.
If you surf the web on your iPhone, you no doubt run into this problem all the time: a website wants your location. It can happen when performing a location-based task, such as using a store locator, or whenever a web app just wants to deliver better ads or local recommendations. If you're tired of allowing or denying permission each time, there's an easy way to stop the annoying security pop-ups.
It's pretty much a given at this point that Facebook has a lot of data on us. While you might be conscious of the data you share with Facebook when you post, upload photos, or chat with friends on Messenger, you might not be thinking about all the data it receives from websites and apps you use outside the social media giant. Now, you can actually do something about it.
Correctly identifying the underlying technologies that run on a website gives pentesters a considerable advantage when preparing an attack. Whether you're testing out the defenses of a large corporation or playing the latest CTF, figuring out what technologies a site uses is a crucial pen-tester skill.
Apple has seemingly always made it a priority to show how much it cares about user security and privacy — enough that it has a page dedicated to it, proclaiming that "privacy is a fundamental human right." It's true that there are few issues more important than user privacy when it comes to technology, and Apple only makes things better in iOS 13.
If you need to know whether you are really a Hufflepuff or a Gryffindor, then it's time to get yourself an augmented reality sorting hat.
During the keynote at WWDC earlier this year, Apple introduced the latest iteration of its mobile operating system, iOS 12. Despite a thorough demo on stage, Apple glossed over new eye tracking features that use ARKit 2. Developers can now use the TrueDepth camera on the iPhone X, XS, XS Max, and XR to determine where your eyes are looking, opening up incredible new possibilities for new apps.
Nmap is more powerful than you know. With a few scripts, we can extend its functionality beyond a simple port scanner and start to identify details about target servers sysadmins don't want us to know.
Reconnaissance is the phase of an attack where a red team or hacker designs a strategy based on the information they can learn about the target, as well as what the available attack surface looks like. These scans can take time to discover relationships, but Raccoon OSINT scanner coordinates multiple automated scans to produce invasively detailed reports on a target with a single command.
Mozilla has created yet another browser for Android. Similar to Firefox Focus, Firefox Rocket was designed to address specific problems: limited internal storage and low data caps. However, in the process of solving these problems, they created one of the fastest browsers on the market.
Hackers rely on good data to be able to pull off an attack, and reconnaissance is the stage of the hack in which they must learn as much as they can to devise a plan of action. Technical details are a critical component of this picture, and with OSINT tools like Maltego, a single domain name is everything you need to fingerprint the tech details of an organization from IP address to AS number.
A convincing domain name is critical to the success of any phishing attack. With a single Python script, it's possible to find hundreds of available phishing domains and even identify phishing websites deployed by other hackers for purposes such as stealing user credentials.
Identifying vulnerable devices and services on a target router can be difficult without leaving logs and other traces of an active attacker on the network. However, there is a way to covertly decrypt and view Wi-Fi activity without ever connecting to the wireless network.
If you're a Harry Potter fan who has ever wanted to have your own Hogwarts adventure, you're in luck — Jam City is close to releasing "Harry Potter: Hogwarts Mystery," a mobile game that allows you to attend the magical school yourself. In fact, it's so close you can pre-register for the game right now.
Coinhive, a JavaScript cryptocurrency miner, was reportedly discovered on the BlackBerry Mobile website. It was placed there by hackers who exploited a vulnerability in the site's e-commerce software that allowed them to anonymously mine cryptocurrency every time the website was viewed. There's no doubt Coinhive, an innovative mining method, is being abused and exploited by hackers in the wild.
I don't know about you, but I was obsessed with handheld gaming devices when I was younger. Between my Game Boy and multiple Tamagotchis, I was guaranteed hours of entertainment that could fit comfortably in the palm of my hand.
Getting cool new features before everyone else is just plain fun. To be on the bleeding edge can require a lot of effort at times, since the fastest way to get an update is to find it as soon as it leaks, then get to work on sideloading the new version. Luckily, there's an easier way to get the latest features on your favorite apps, with WhatsApp being no exception.
Welcome back, my greenhorn hackers! Throughout this series on Metasploit, and in most of my hacking tutorials here on Null Byte that use Metasploit (there are many; type "metasploit" into the search bar and you will find dozens), I have focused primarily on just two types of modules: exploits and payloads. Remember, Metasploit has six types of modules:
YouTube, the popular video streaming website owned by Google, announced on October 21st that it will be launching a new subscription service titled "YouTube Red" for $9.99 a month. Under the membership, subscribers will be able to watch videos without ads. Yup, all videos—from music to trailers to gaming and everything in-between—completely ad-free. Additionally, individuals can save videos to watch offline on their mobile devices as well as play videos in the background.
Usually when a hacker takes control of a system, they use it for a good purpose (on their end, anyway). But some hackers have made jokes or pranks with their hacks. Here is a list of the top of them...