A PA system, or public address system, is an electronic amplification system with a mixer, amplifier, loudspeakers, cables, mikes and cords. Learn how to properly set up a PA system with tips from a multimedia technology expert in this free technology video series.
Our expert, Hayley Kaufman, shows you step-by-step makeup applications. Learn how to properly clean your face, and learn how to clean your brushes as well. Hayley shows you the basics of applying foundation, concealer, and eyeshadow. She also gives you tips for applying evening eyeshadow. If you have been curious of trying to apply body makeup, Hayley shows you how to achieve a natural yet beautiful look.
In this video series, learn how to operate one of those tools. Our expert will demonstrate how to use and maintain an electric sander. He'll demonstrate how to load various types of sandpaper, how to empty the bag, and how to properly store the tool.
In this series of videos you'll learn how to properly use and maintain a pressure washer. Expert Matthew Christian shows you various types of pressure washers, how to set up the machine for use, and offers some basic safety tips.
In this how-to video series, learn how to use a cordless nailer from certified building contractor Matthew Christian. Matthew will demonstrate how to load nails in a cordless nailer, how to unjam a cordless nailer, how to change air cartridges and air filters in a cordless nailer, how to properly handle a cordless nailer, how to change the battery in a cordless nailer, how to charge cordless nailer batteries, how to oil cordless nailers, how to flush a cordless nailer.
Whether you are a budding magician, or just a card game enthusiast looking to bone up on his skills, impress your friends and learn some of the many ways to perform card flourishes. Our expert magician will demonstrate each flourish, with step-by-step instructions and tips for properly performing them.
In this how-to video clip series on how to maintain healthy teeth and gums, learn how to practice good dental hygiene, including how to prevent gingivitis, plaque buildup and cavities, how to brush your teeth properly, whether to use an electric toothbrush, how to clean your tongue, how to prevent bad breath, how to floss correctly, and other tips and techniques for a healthy mouth.
In this do-it-yourself motorcycle maintenance course on video, learn how to properly repair and maintain your bike, so that you can ride cross country without having to stop in at a mechanic. The ultimate riding experience is characterized by freedom and independence. Imagine cruising down the highway, going 75mph, mirrored sunglasses and bandana in place, sun setting behind you—only to have your ride stall out just as you realize how cool you must look.
This video series shows you how to install new bathroom light fixtures, how to repaint properly, install a new fan grill and change shelf paper. This is a great and inexpensive way to update your bathroom.
In this power tool video series, learn how a fixed base power router works. Our expert will demonstrate how to properly use this woodworking tool, including general shop and tool safety tips, what you need to know before making a cut, installing and removing the bit, setting cut depth, and determining the direction of feed for the router.
Our experts Glenn Soanes and Roger Manzo are professionals who know how to instruct even the worst of bowlers in this fine sport. They will first address the basics that we all must know like your stance, how the ball is properly held and the release. Then they venture off into the actual game and show you how to pick up many different kinds of spares of several difficulty levels.
In this series of video clips, expert interior designer Craig Hale demonstrates how to properly hang a picture or other wall décor. You’ll learn what sorts of tools and drywall anchors you’ll need, as well as several design tips, including how to hang art at eye level, how to create a color scheme for multiple frames, and how to group various sizes of wall hangings in vertical, symmetrical and asymmetrical design schemes. Craig shows you various techniques for hanging plates, sconces and othe...
If you’re camping outdoors, you’ll probably need to know how to make a campfire at some point. Fire is an important tool to have for cooking food and purifying water, for warmth and light, and for protection from wild animals at night. In this video series, learn the proper way to make a safe, long-burning campfire. Our expert, Brian Rajchel, will show you how to choose the right area in your campsite for the fire, how to build a fire pit, how to start a fire without matches, and how to prope...
Ready to take the next step in your career and become an Amazon Web Services certified cloud practitioner in 2021? The complete AWS Certified Cloud Practitioner All In One Bundle is the easiest option to help you kill the exam — and right now, the entire bundle of courses is on sale with 91% off, for just $24.99 (regular price $300).
While there are many advantages to working from home, properly managing your time can be a real issue. Working remotely requires a particular skill set, including an ability to focus, self-motivate, and communicate from a distance. Thankfully, all of these skills are teachable.
Since its introduction in iOS 11, the Screen Recording tool has been a great way to show less tech-savvy users how to use their iPhones better. It's never been easier to show your grandmother how to disable Live Photos or lower screen brightness. However, banner notifications can appear during a recording, forcing you to start over. They can even interrupt a screen share during a Zoom or Skype meeting.
Hacking web applications can sometimes be challenging due to the sheer amount of moving parts they possess. At the core of these apps are HTTP requests and parameters, but these things are often concealed from the user, due to security reasons, convenience, or both. However, a tool called Arjun can be used to discover hidden HTTP parameters in web apps.
Anyone who has used Linux long enough is familiar with sudo. Short for superuser do (or substitute user do, depending on who you ask), it allows users to run commands as either root or another user on the system. From a hacker's point of view, sudo is often all that stands between them and root access. We'll be exploring an older vulnerability in sudo that allows a user to run commands as root.
If you've ever tried to update your Android phone manually, you know the process can be unnecessarily hard. There are so many steps and parts, that if one thing goes wrong, the whole process doesn't work. Recognizing this, the Android team came up with an even easier way.
One of the scariest things about the COVID-19 virus is that you can show no symptoms but still be infected (and contagious). Naturally, we all want to know whether we're carrying the new coronavirus, but if you're showing signs of COVID-19, how can you be tested to know for sure? Websites are popping up to help with that, screening for symptoms, and directing you to a testing site if needed.
Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web management interfaces should be scrutinized just as hard as the apps they manage, especially when they contain some sort of upload functionality. By exploiting a vulnerability in Apache Tomcat, a hacker can upload a backdoor and get a shell.
While consumer-grade smartglasses are the holy grail for tech companies, smartglasses maker Vuzix knows where its bread is buttered, and that's in the enterprise segment.
The Pixel 4 is one of the most talked-about phones of 2019, and it has many things going for it, especially in the world of rooting and modding. Just as with previous Pixel generations, unlocking the bootloader is the gateway to realizing your device's true potential. It can make way for such things as TWRP, Magisk, custom ROMs, and many other device-specific mods just the same.
Apple unveiled the latest generation of its flagship earbuds, AirPods Pro, on Monday, Oct. 28. Aside from the increased price tag, new in-ear design, and wider charging case, the biggest change by far is in Active Noise Cancellation. Finally, we can listen to AirPods on a plane, walking by a busy road, anywhere with a lot of noise pollution. But how does it work?
If you have friends who aren't privacy-conscious, you've surely heard the old "What do I have to hide?" excuse. Despite the fact that billions of people are using the internet each day, many of them don't know the dangers that can find them. And many don't know the tools to combat them.
I've been using the Galaxy Note 10+ as my daily driver for a while now. I love it, but as with any phone, it loses its pizzazz after a while. But since it's an Android phone, there's always a way to add fresh features and functionality to the UI.
Drone mishaps, such as the collision that scratched a military helicopter in New York, are becoming something of an everyday hazard.
One of the first steps in attacking a web application is enumerating hidden directories and files. Doing so can often yield valuable information that makes it easier to execute a precise attack, leaving less room for errors and wasted time. There are many tools available to do this, but not all of them are created equally. Gobuster, a directory scanner written in Go, is definitely worth exploring.
Samsung has stepped up its camera game with the Galaxy S10's dual- and triple-lens systems. But as impressive as the hardware is, the native Samsung Camera app still isn't as good with image processing and video stabilization as the Google Camera app for Pixel phones. Thankfully, you can get the best of both worlds.
Popping a shell is often the main goal of a hacker, and it can be exciting when executed properly, but sometimes they do have their limitations. Metasploit's Meterpreter probably needs no introduction, but this powerful, dynamic payload can offer a leg up over normal shells. To prove it, we'll show how to take a normal command shell and elevate it to a Meterpreter session.
Dark mode support has steadily made its way to mainstream acceptance, with big-name apps like YouTube, Reddit, and Twitter adopting the feature to satisfy user demands. In this regard, Facebook is lagging, yet to offer the sought-after feature for easier viewing in low-light conditions. If your iPhone is jailbroken, however, you don't have to suffer like everyone else.
Things that are supposed to make life easier for developers and users are often easy targets for exploitation by hackers. Like many situations in the tech world, there is usually a trade-off between convenience and security. One such trade-off is found in a system known as Distributed Ruby, which can be compromised easily with Metasploit.
Nothing beats a human translator, but Google Translate and other software-based solutions have developed into decent alternatives for help with basic translations. Need an English word translated into German? No problem — but what if you need to have a conversation with someone who doesn't speak your language? Is Google Translate capable of doing that? The answer is not really.
It wouldn't be iPhone season without a new controversy. Chargegate, Apple's latest PR nightmare, is the name being used for charging issues on some iPhone XS and XS Max devices. If you plug in your iPhone at night — or whenever — then wake up or come back later and see that your iPhone has even less battery power, you're affected. But there is a fix you can implement right now.
Having an efficient workflow is an integral part of any craft, but it's especially important when it comes to probing apps for vulnerabilities. While Metasploit is considered the de facto standard when it comes to exploitation, it also contains modules for other activities, such as scanning. Case in point, WMAP, a web application scanner available for use from within the Metasploit framework.
Android does a great job at multitasking. Split-screen mode and picture-in-picture are terrific at letting you manage more than one app at a time. But there are some limitations. For instance, when you're playing a video and you open a second video in split-screen, the first one pauses. Thankfully, Samsung has a fix for this.
A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website defacement to full-on code execution. For this reason, RFI can be a promising path to obtaining a shell.
Apple released iOS 12 beta 9 to public beta testers on Monday, Aug. 27. The update comes at the same time as the release of dev beta 11. This is surprising, as Apple typically releases developer betas at least a few hours before the public version. Then again, everything Apple is doing with its iOS 12 beta as of late is surprising.
On August 1, Google Play started requiring new app submissions to target at least Android 8.0 Oreo's API. Then, as of November 1, all updates to existing apps were required target the same API. While at first glance, this change may mean little to you, it will have a profound impact on Android. Now, your favorite apps will be getting better.
When it comes to the sub-$250 price range, the new Nokia 5.1 might be the perfect phone. Of all the new models announced at Nokia's event in Moscow, the Nokia 5.1 offers the most with the least compromises. For a third of the cost of a flagship, you get a phone with a premium build, solid specs, and good battery life.