Proffer Free Search Results

How To: Draw a flower pot in Flash

In this video tutorial from CreativeCOW leader Tony Ross, learn to use Flash as a drawing tool, while making several pseudo-3D shapes, including a flower pot. Tools include the Rectangle Tool, Oval Tool, Paint Bucket Tool, and Free Transform Tool. Draw a flower pot in Flash.

How To: Completely Empty a Beer Bottle in Just One Second

This how-to video shows to remove beer from a bottle in just one second, win free beers every time with this bar trick. Granted, you probably should just drink the beer instead of spraying it all over the place. Watch this video tutorial and learn how to pour out a beer bottle at super speed. Empty a beer bottle in one second.

How To: Use Winmorph

WinMorph is free morphing and warping software. It runs as a standalone application or as a "plug-in" for various video editors/compositors like Adobe Premiere, VegasVideo and Wax. In this video tutorial you will learn how to do a basic morph in Winmorp. Use Winmorph.

How To: Paint within a shape in Photoshop CS2

In this Photoshop CS2 video tutorial you will learn to paint custom shapes. Learn to use the brushes, Color Picker, and layer style. This example uses a flower shape downloaded from ActionFx.com, but feel free to experiment with other shapes too! Paint within a shape in Photoshop CS2.

How To: Make brown sugar meringue

Chef Gale Gand demonstrates how to make brown sugar meringue. This is a brilliant variation on classic meringue, made with brown sugar, a half a cup of egg yolks and sugar. The egg yolks are beat over a hot water bath to ensure the eggs are free of bacteria. Make brown sugar meringue.

Windows Security: Software Level

As many of you know Windows is not the most secure Operating System in the world, but then again no OS is really secure if the user doesn't know how to protect themselves. Later I will show you how to lower the risk even more on your (the user's) end.

The Ultimate Guide: Diagnosing & Fixing Connection Issues, Part II

Hello everyone and welcome to Part II - The Ultimate Guide: Diagnosing & Fixing Connection Issues. In this tutorial we will discuss more advanced methods that I took in order to fix our home network. I have also attached a link to download the FREE eBook - so feel free to download it to you can refer to this manual when you are experiencing connection issues. I would also like to note that the manual has been loaded onto a free server - it will remain on the server until people stop downloadi...

How To: Hack Coin-Operated Laudromat Machines for Free Wash & Dry Cycles

Most people have had the unfortunate experience of not having a washer and dryer at some point. Apartments in my area tend to charge at least one hundred dollars extra for the units with washer and dryer hookups, and even more if you want a unit with an actual washer and dryer installed already. If you are young and just starting out, this may be hard for you to manage with your current salary. If you have no washer and dryer, the only alternative is the laundromat.

How To: Defend from Keyloggers in Firefox with Keystroke Encryption

Null Byte is looking for moderators. More threats to computers exist every day. Not only do we have computer viruses and malware, but we have rootkits and other nasty pieces of code that can log your keyboard strokes or even add your computer to a botnet to attack other websites. Your computer can be infected even if you have anti-virus software installed. I can't stress enough how easy it is for a hacker to write a piece of code that gets around every piece of anti-virus software.

How To: Create a Free SSH Account on Shellmix to Use as a Webhost & More

Having an SSH or Secure SHell to tunnel your traffic through is something we have talked about many times at Null Byte. As we know, it allows us to securely route and encrypt our traffic through a remote server, effectively anonymizing us and protecting our traffic from all forms of analysis—simultaneously. We have gone over how to make a home SSH tunnel. However, the question has come up, "How can I get an SSH tunnel to somewhere other than my computer?" This would be useful in a situation w...

Toy Challenge: Lego Dinosaur

Check out iPhone app, LEGO Photo. It converts any photo to look like it's built from Legos. Best of all, it's free. I used a photo of a dinosaur I submitted to a previous challenge in Giveaway Tuesdays. See the original here.

How To: Recover a Windows Password with Ophcrack

When Windows stores a password, it is done so by hashing the password in an LM hash and putting it in the Windows SAM file. In the scary moment that you lose your password, but don't want to pay some geek to have full root access to your computer, you need to recover it using Ophcrack. Ophcrack doesn't remove the password, or bypass it, it cracks the password hash using rainbow tables.