Potential Buyers Search Results

How To: Secure the football with Shaun Alexander

Shaun Alexander was an amazingly productive NFL running back. In this video, he takes some time to explain for young running backs how to hold the ball properly, protecting it from the defense and potential fumbles. Proper finger positioning and placing the body between opponents and the ball are both crucial elements.

How To: Practice Emotional Freedom techniques

Craig Brockie delivers the goods with a how to video on Emotional Freedom Techniques, or EFT. Learn these powerful techniques to reach your highest potential and reduce stress, increase focus and will, and overall acheive positive results. Watch this tutorial and you will be able to overcome cravings and reduce stress with EFT.

How To: Carve a figure out of wood

Carved wood figures always present an aura of mystery. From the fearsome tribal masks of Africa to the towering totems of British Columbia, indigenous peoples have long created wooden guardians to channel their spirits and protect their peoples. Puppets can even move like us, mock us, or in the case of Pinocchio, come alive. Be careful wood carvers, for in your hands you possess the power of the gods, the power to create, the power to give life, and hopefully the power to make a cool sculptur...

How To: Calculate NPV & IRR with a TI BAII Plus calculator

The video shows you how to calculate capital budgeting with a Texas Instruments BA2+ financial calculator. Capital budgeting will help you determine cash flows for given investments for a certain number of years in the future, thus helping you determine if the investment is worthwhile. The buttons you will use are the CF (cashflows) button, the NPV (net present value) button, and the IRR (internal rate of return) button. The video uses the example of a $10,000 investment that will return $5,0...

How To: Make a ball float in the air

This video demonstrates Bernoulli's Principle which states that, “For an ideal fluid (low speed air is a good approximation), with no work being performed on the fluid, an increase in velocity occurs simultaneously with decrease in pressure or a change in the fluid's gravitational potential energy..

How To: Audit Web Applications & Servers with Tishna

Penetration-testing frameworks can be incredibly useful since they often streamline certain processes and save time by having a lot of tools available in one place. Of course, the most popular pentesting framework is undoubtedly Metasploit, but there are many others out there that cater to particular needs. For auditing web applications and servers, Tishna comes in handy.

How To: Identify Missing Windows Patches for Easier Exploitation

No operating system is stricken with as many vulnerabilities as Windows, and it's often a race to release the latest patches to fix things. From an attacker's point of view, knowing which patches are present on a Windows machine can make or break successful exploitation. Today, we will be covering three methods of patch enumeration, using Metasploit, WMIC, and Windows Exploit Suggester.

Buyer's Guide: Top 20 Hacker Holiday Gifts for Christmas 2017

Hackers can be notoriously difficult to buy gifts for, so we've curated a list of the top 20 most popular items Null Byte readers are buying during their ethical-hacking studies. Whether you're buying a gift for a friend or have been dying to share this list with someone shopping for you, we've got you covered with our 2017 selection of hacker holiday gifts — just in time for Christmas.

How To: Get the OnePlus 5T's Face Unlock on Any Phone

The OnePlus 5T was just released, and it's packing several new useful features. While many OnePlus 5 buyers are feeling frustrated with the quick release cycle, lots of fans are still clamoring to buy the new device. Aside from the larger screen, most of the buzz around the 5T has centered around the new face unlock method. Thanks to a clever hack, you can now get this feature on almost any phone!

News: Mastercard, Qualcomm-Powered ODG Smartglasses Use Iris Authentication for AR Shopping

As the level of data being generated grows exponentially, past the Information Age and into the coming Hyper-Information Age of immersive computing — as resistant as many of us are to the idea — personal data security is becoming a necessary consideration in our everyday lives. Recognizing this, Mastercard, Qualcomm, and Osterhout Design Group have teamed up to show what secure shopping could look like in the very near future with iris authentication.