Qr Codes Search Results

How To: Optimize SQL performance

Gain insight into best practices for SQL Server optimization and ways to alleviate many root causes that can impact performance of your SQL Server database. Kevin also will discuss how to manage for planned and unplanned changes, speed time to implementation of your applications and ensure that your databases are running as they should.

How To: Improve the quaity of your YouTube video playback

You can improve the quality of the video you watch on YouTube. Sometimes when you watch the video in YouTube, probably you will have notice that the video is little blurry or text which is being shown in that video is blurry like low quality video. So you can improve it by just adding a little code in the url of that video. So put that code "&fmt=18" in the end of the url of that video and press the enter key and that's it. Now you can see the difference between before and now. The video qual...

How To: Put a search box in Thesis theme navigation bar

First go to your word press admin and click on "custom file editor" in thesis options. Select custom_function.php in file selected menu and click on "edit selected file". Because of warning, we need to do it via ftp. So go to that ftp path which is showing in the video and open up the launch.php. Now copy that code which is showing in the video and past it in there, close and save the file. Now to change the style of your search box, go to your custom file editor, select the custom.css and cl...

How To: Use VBA code for conditional formatting in MS Excel

New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun and Mr. Excel, the 22nd installment in their joint series of digital spreadsheet magic tricks, you'll learn how to use VBA code for conditional formatting as well as how to do it using the OFFSET, MOD and ROWS functions.

How To: Do reverse lookups with VBA code in Microsoft Excel

New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun and Mr. Excel, the 7th installment in their joint series of digital spreadsheet magic tricks, you'll learn how to complete a reverse lookup (find value inside table and then retrieve column and row header). Mr. Excel uses Excel VBA code (macro) and ExcelIsFun uses a formula with the INDEX, IF, SMALL, MATCH, TEXT, CHAR and...

How To: Dress for ballet class

Just starting your ballet classes? Not sure what to wear? In this video, learn from one ballet teacher what to wear and how to follow dress code. Ballet dress code usually consists of pulling the hair back in a tight bun and wearing a black leotard, pink tights, sometimes a ballet skirt and pink ballet shoes.

How To: Get free Redbox DVD rentals

Learn how to get free Redbox DVD rentals. Redbox movies can be found in large stores, usually supermarkets, where you can rent a movie, and return them to the same box when you are done. In order to get the free movie, you must obtain a code, which you will enter during the rental process. On the website, sign up for what is called "Free Movie Monday". Redbox will send a code to your cell phone on the first Monday of every month. One thing to remember is to not be late returning the movie, or...

How To: Create a custom flash cursor in Flash

In this flash tutorial the instructor shows how to create a custom cursor. This is created using shapes and simple Action Scripts. First open the flash tool and create a simple shape. Then convert the shape in to a movie clip and add simple animation to it where it switches colors. Now create a new layer and add Action Script code as shown in the video. This Action Script code is a command to make the shape follow the cursor. Now the shape follows the cursor as the cursor moves and appears as...

How To: Check fuel pressure regulators for leaks on GM engines

A leaking fuel pressure regulator can cause your car or truck to be hard to start or die out. This may give a check engine light, also. It's a very common problem on many Chevy, Buick, Pontiac, and Oldsmobile 3.1L - 3.4L V6 engines. These are also know as the 3100 and 3400. Misfire codes P0300 and oxygen sensor codes will be stored in the computer memory. So, if you want to learn how to check your fuel pressure regulator for leaking gas on GM engines, then this video tutorial is for you.

How To: Your iPhone Can Help Keep Clutter from Piling Up in Mail and Messages — Here's How

Many of your accounts online likely require two-factor authentication (2FA) or two-step verification (2SV) to confirm your identity when logging in, and there's a good chance the second factor or step for each is a one-time email or SMS verification code. If you get a lot of email and SMS codes, it can clutter your Mail and Messages apps with junk if you don't delete the messages after signing in.

How To: Get Root Filesystem Access via Samba Symlink Traversal

Samba can be configured to allow any user with write access the ability to create a link to the root filesystem. Once an attacker has this level of access, it's only a matter of time before the system gets owned. Although this configuration isn't that common in the wild, it does happen, and Metasploit has a module to easily exploit this security flaw.

How To: Get Started Writing Your Own NSE Scripts for Nmap

The road to becoming a skilled white hat is paved with many milestones, one of those being learning how to perform a simple Nmap scan. A little further down that road lies more advanced scanning, along with utilizing a powerful feature of Nmap called the Nmap Scripting Engine. Even further down the road is learning how to modify and write scripts for NSE, which is what we'll be doing today.

How To: Exploit Remote File Inclusion to Get a Shell

A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website defacement to full-on code execution. For this reason, RFI can be a promising path to obtaining a shell.

How To: Exploit Shellshock on a Web Server Using Metasploit

One of the most critical bugs to come out in the last five years was Shellshock, a vulnerability which allows attackers to execute arbitrary code via the Unix Bash shell remotely. This vulnerability has been around for a while now, but due to the ubiquity of Unix machines connected to the web, Shellshock is still a very real threat, especially for unpatched systems.

How To: Use Beginner Python to Build a Brute-Force Tool for SHA-1 Hashes

Developers creating login systems know better than to store passwords in plain text, usually storing hashes of a password to prevent storing the credentials in a way a hacker could steal. Due to the way hashes work, not all are created equal. Some are more vulnerable than others, and a little Python could be used to brute-force any weak hashes to get the passwords they were created from.

How To: Easily Detect CVEs with Nmap Scripts

Nmap is possibly the most widely used security scanner of its kind, in part because of its appearances in films such as The Matrix Reloaded and Live Free or Die Hard. Still, most of Nmap's best features are under-appreciated by hackers and pentesters, one of which will improve one's abilities to quickly identify exploits and vulnerabilities when scanning servers.

How To: Create a Reusable Burner OS with Docker, Part 1: Making an Ubuntu Hacking Container

Containers are isolated software instances representing applications, servers, and even operating systems—complete with all of their dependencies, libraries configuration files, etc.—and they're taking over the corporate world. The ephemeral, portable nature of containers help them stay current and speedy, and they can work on pretty much any computer, virtual machine, and cloud.

How To: Build a Directory Brute Forcing Tool in Python

While attempting to hack a web app, there may come a point where the attacker may have to escape the default directory in order to access unauthorized files. This is known as a directory traversal attack. Much as the name implies, this attack involved traversing the servers directories. But in order to move to an unauthorized directory, we need to know where those directories are. Today we'll be building a tool to brute force these directory locations based on HTTP response codes. Before we g...