Program Doc Search Results

How To: Copy & burn xBox 360 games perfectly every time

Want free Xbox 360 games? Well, join the club. But you can actually do something about it and download and burn Xbox 360 games with a few programs and a little knowhow. If you want the keys to the Xbox kingdom, just watch this video tutorial that shows you how to burn Xbox 360 games perfectly every time. This only works for the Windows Vista OS and works more smoothly if you have a great DVD burner.

How To: Use a singleton pattern in PHP programming

This PHP newbie video with teach you what a Singleton Pattern is and how to use it in your PHP programming. PHP OOP Singleton is great for a database connection when you only want one consistent connection in your application. So, to prevent wasting space accidentally by calling it twice in different areas, this is good way to protect it. Singleton is very popular and used often in Database Connections.

How To: Open folders with the shell function in Microsoft Visual Basic 6

In this clip, you'll learn how to use the shell function to use the shell function to open folders. Whether you're new to Microsoft's popular event-driven program language & IDE or a seasoned developer merely looking to improve your chops, you're sure to find benefit in this free Visual Basic programming lesson. For more information, including a complete demonstration and detailed, step-by-step instructions, take a look.

How To: Control forms within the Microsoft Visual Basic 6 IDE

In this clip, you'll learn about basic form control within Visual Basic 6. Whether you're new to Microsoft's popular event-driven program language & IDE or a seasoned developer merely looking to improve your chops, you're sure to find benefit in this free Visual Basic programming lesson. For more information, including a complete demonstration and detailed, step-by-step instructions, take a look.

How To: Use the draw tools in Adobe Flash CS3

Before you can work in Adobe Flash CS3, you'll need to know how to work with it. Learn how with this clip. Whether you're new to Adobe's popular Flash-development platform or a seasoned web developer looking to better acquaint yourself with Flash CS3, you're sure to benefit from this free software tutorial. For more information, including detailed, step-by-step instructions on how to use the program's draw tools, watch this video guide.

How To: Use Bafran computer program to animate flying Legos

As many of you stop-motion animation practitioners out there have probably realized, Legos are a great material for that medium, allowing for great diversity while being relatively easy to work with. Can they fly though? This video features a British boy explaining how to use a free computer program called Bafran to make Lego characters appear to be flying in an animated video.

How To: Set Up a New MacOS Computer to Protect Against Eavesdropping & Ransomware

While MacOS computers have been spared from some of the most famous malware attacks, there is no shortage of malicious programs written for them. To keep your computer safe from some of the most common types of malware, we'll check out two free tools. These tools can automatically detect ransomware encrypting your files and watch for unauthorized access to your microphone and camera.

Exploit Development: How to Read & Write to a Program's Memory Using a Format String Vulnerability

Format strings are a handy way for programmers to whip up a string from several variables. They are designed to save the programmer time and allow their code to look much cleaner. Unbeknownst to some programmers, format strings can also be used by an attacker to compromise their entire program. In this guide, we are going to look at just how we can use a format string to exploit a running program.

Exploit Development: How to Manipulate Code Execution with the Instruction Pointer

The one thing that separates a script kiddy from a legitimate hacker or security professional is the ability to program. Script kiddies use other people's tools, while hackers and security pros write their own tools. To that end, we're going to see how a stack overflow vulnerability allows us to flood a variable with enough input to overwrite the instruction pointer with our own commands.

How To: The Easiest Way to Get Android N on Your Nexus Before Anyone Else

Out of nowhere, Google released a preview build of the upcoming Android N release back in March—a full two months early. As if that weren't enough excitement for one day, they topped themselves by following up that announcement with the debut of a new "Android Beta" program that allows users with eligible devices receive preview builds as a regular OTA update, meaning no losing data or manual installation.

How To: Security-Oriented C Tutorial 0x11 - Command Line Arguments

In many programs on Linux, you'll come across programs which allow you to specify additional arguments instead of just simply running the program by itself. If you've used the Kali distribution, I'm more than certain you'll have come across these with the command line tools, else if you have been following these tutorials, we have already come across three tools which also use the same technique, i.e. gcc, gdb and wc. How do we do this with C? Let's find out.