Prime Time Programming Search Results

How To: Create metallic looking objects in Adobe Photoshop

Need a little help with your new Adobe Photoshop graphics editing program? Working with Photoshop can be a bit tough if you don't know what you're doing, so instead of getting out the books, check out this 'no nonsense' video tutorial to learn how to create metallic looking objects in Adobe Photoshop. Photo manipulating and editing is always tricky, so just watch to see how to create metallic looking objects, for beginners.

How To: Create and use patterns in Adobe Photoshop

Need a little help with your new Adobe Photoshop graphics editing program? Working with Photoshop can be a bit tough if you don't know what you're doing, so instead of getting out the books, check out this 'no nonsense' video tutorial to learn how to create and use patterns in Adobe Photoshop. Photo manipulating and editing is always tricky, so just watch to see how to create and use patterns, for beginners.

How To: Create realistic perspective using Photoshop

This is a tutorial video from Sessions Online Schools of Art & Design's "Photoshop Basics" course. This video is part of Sessions' Graphic, Web, Multimedia Arts, Digital Arts, and Marketing Design certificate programs. You are distorting layers using the transform tool. Use the line tool to check the work. GO Edit: Transform - Distort.

How To: Use NLP anchoring

Here is a Neuro Linguistic Programming (NLP) anchoring technique to help you neutralize negative thoughts and emotions. NLP anchoring is a simple, yet safe and powerful tool for self improvement and growth.

How To: Avoid spam email

Make it harder for spammers to clog your inbox with ads and scams. Learn how to avoid spam email with this Howcast video. You will need a secondary email address, a keen eye, and an anti-spam program. Tip: Never click on links in spam email - including "unsubscribe" links, and never, ever reply!

How To: Use Microsoft Office OneNote 2007

Do you ever wish you had a way to jot down an idea, and then illustrate it with a page from a document, a photo and a sound clip, all without opening multiple applications? Microsoft Office OneNote 2007 note-taking program is that advanced notepad, and is better than ever with new additions to the interface that make it even easier to organize yourself. For more on using MS Office OneNote, watch this video tutorial.

How To: Creating a custom class in Flex 3

In this programming tutorial, Mike Lively of Northern Kentucky University explains the six parts of a Flex 3 class. He demonstrates how to create and extend a class using Flex 3, and how to bring that class into a Flex project using xmlns name space. Learn how to work with custom classes in this beginners Adobe Flex Builder 3 tutorial.

How To: Install Cairngorm in Adobe Flex 3 and use MVC

In this tutorial, Mike Lively of Northern Kentucky University discusses the MVC (Model Viewer Controller) architecture, installs Cairngorm into Adobe Flex 3, and discusses one of David Tucker's examples. The MVC model is comprised of a Model (encapsulates information from the d base (XML file), View (presentation layer that the user interacts with, and Controller (processes and responds to events and invokes changes to the model and viewer). See how to use the MVC model and install Cairngorm ...

How To: ReDrum a new way in Reason

There are many ways to program or automate the redrum in Reason. This music production tutorial looks at an innovative way to auto-quantize using the Drum Solo options. Watch and learn this easy keyboard setup with a lot of potential for ReDrum in Reason.

How To: Use ADSR and AHDSR envelopes in music softwares

This music production tutorial covers ADSR and AHDSR envelopes, how to understand and implement them in Reason, FL Studio, Reaktor and almost every piece of music software. The tutorial shows you how to work with envelopes in each program and includes several takes on common use. If you are new to midi sequencers and synthesizers in Reason, Reaktor, FL studio etc., watch this important tutorial on using ADSR and AHDSR envelopes.

How To: Hack an iPod on a Mac

When performing this iPod hack, make sure to turn off your iTunes and keep it from popping up after you've plugged in your iPod via USB. Take a look at this tutorial and learn how to hack into you iPod on your Mac with the program Alterpod. With luck, no error log will pop up once you click restore.

How To: Configure your Wiimote using the Darwinremote

Following the immediate release of the Nintendo's Wii, many people speculated whether or not the interaction with the Wiimote would only last as long as the novelty did. Naturally, the Wiimote requires to be reconfigured now and then given its heavy use. Take a look at this instructional video and learn how to configure your Wiimote on your Mac with a free program known as Darwinremote.

How To: Defragment or format a Mac hard drive

In this episode of Ask the Techoes, D.Lee and Brandon answer viewer questions on how to defrag a Mac hard drive, erasing an NTFS hard drive on Mac OS 10.4, how to uninstall programs and their related files on a Mac, questions with Parallels, and how to create a wireless USB hub. Send us your questions at askthetechies@gmail.com Hosts: D.Lee Beard & Brandon Jackson http://AskTheTechies.com

Community Byte: HackThisSite, Realistic 5 - Real Hacking Simulations

Eventually, we plan on doing some root the box competitions here at Null Byte, but we're still looking for a server to play on. Anyone want to donate one? You won't regret it. Root the box is like 'king of the hill', except you have to hack a server and maintain access. Each server will have numerous known security holes, but until then, let's get back to the regular weekly coding sessions and realistic hacking missions on HackThisSite.

How To: The Hacks Behind Cracking, Part 2: How to Generate Software Keys

If you've ever heard software piracy terminology being discussed, I'm sure the term KeyGens came up. KeyGens is short for key generator, which is a program that exploits algorithmic faults in software by generating software license keys that appear to be genuine. Normally used as a technique to protect the source code software and prevent piracy, a key generator exploits the key algorithm to effectively nullify the need for any software licenses. For example, we must try to find patterns in t...

News: Kinect Hacked To Play Full-Body World of Warcraft

The world has been overflowing with Microsoft Kinect hacks, each more amazing than the last. The latest innovation, created by a group of engineers at USC, promises an exciting future in gaming (and gets gamers off their asses). The program is called FAAST, and allows for full body motion control in different PC applications, such as World of Warcraft, as demonstrated below: Previously, Hacked Kinect Captures 3D Video in Real Time.

How To: Create a fog effect when creating an OpenGL program in MS Visual C++

In this clip, you'll learn how to create an eye-catching fog effect when working in MS Visual C++. Whether you're new to Microsoft's popular general-purpose programming language and IDE or are a seasoned developer merely looking to improve your chops, you're sure to find benefit in this free, official video tutorial. For more information, including detailed, step-by-step instructions, take a look. Create a fog effect when creating an OpenGL program in MS Visual C++.