Qr Codes Search Results

How To: Create a custom class for your game's hero using Flash

Creating a modern video game is a mammoth undertaking, especially if you are working alone. Hopefully, this video will make it a little bit easier. It will teach you how to create a custom class for your game's hero character using Flash CS4 and Actionscript 3. Doing so will make your main character react in predetermined ways to a variety of actions, which is very useful if you want the character to react consistently throughout the game.

How To: Create a Facebook badge for a website or blog

In this video tutorial, viewers learn how to create a Face-book badge for a website or blog. Begin by going to your Face-book profile. Scroll down the page and click on Create a Profile Badge. Then click on Create Badge and select the layout, format and information that you want to display on your page. Once your finished, click on Save. Now copy the given HTML code and paste it onto your website or blog. This video will benefit those viewers who use Face-book and would like to learn how to e...

How To: Export LinkedIn contacts to an address book

In this Computers & Programming video tutorial you are going to learn how to export LinkedIn contacts to an address book. LinkedIn is great for keeping your contacts in your professional network. To export your contacts go to home page and click on ‘contacts’. Now your full network of contacts will be displayed. On the right hand bottom, click on ‘export contacts’. On the next page select where you want to export the contacts, type in the security code and hit ‘export’ and all the contacts wi...

How To: Create buttons with CSS

In this tutorial freetutorials teaches you how to create navigation style buttons using cascading style sheets, or CSS, in this the first in his series of "HTML Tips & Tricks". As you follow along, you will be shown how to setup and link your cascading style sheet to your HTML document, and where to place it in the document. Once you have done that, he will show you how to create a CSS, add a body and code the buttons in the CSS using notepad.

How To: Use the vi editor for Python programming

If you're interested in learning a general purpose, high-powered programming language, Python might be the way to go. In this installment from his video tutorial series dedicated to programming in the Python programming language, you'll learn how to set up the vi editor to code in Python from the Cygwin Windows/Linux environment. To get started programming with Python, take a look!

How To: Wire for exterior lighting

Exterior lighting can add to the beauty of your home. Watch this how to video and wire exterior lighting yourself following these guidelines and safety tips. Before beginning any outdoor wiring project make sure to check with local utility companies and follow outdoor wiring codes for your area.

How To: Crochet the basic Tunisian stitch

This video crocheting tutorial shows how to crochet the basic Tunisian stitch, and how to use it to perform a color change. Crochet Andy's directions are especially easy to follow thanks to color-coded yarn. Learn how to crochet the basic Tunisian stitch by watching this instructional video.

How To: All the Privacy & Security Settings You Should Check on Your OnePlus

One of the best things about Android is the ability to customize every aspect of your device to make it your own. However, unless you have prior knowledge or experience with every single setting available to you, you might have missed a few critical features without even knowing it. Some settings are easy to find, while others might be tucked away in another menu of their own.

How To: Enable Monitor Mode & Packet Injection on the Raspberry Pi

The Raspberry Pi Zero W and Pi 3 Model B+ include integrated Wi-Fi, Bluetooth Low Energy, and more than enough power to run Kali Linux. They sound like perfect all-in-one penetration testing devices, but the lack of support for monitor mode and packet injection usually meant buying a supported Wi-Fi adapter. Now, it's possible to use monitor mode on the built-in Wi-Fi chip with Nexmon.

How To: Perform Directory Traversal & Extract Sensitive Information

With all the web applications out on the internet today, and especially the ones built and configured by novices, it's easy to find vulnerabilities. Some are more perilous than others, but the consequences of even the slightest breach can be tremendous in the hands of a skilled hacker. Directory traversal is a relatively simple attack but can be used to expose sensitive information on a server.

How To: 8 Passcode Tips for Keeping Hackers & Law Enforcement Out of Your iPhone for Good

There has been significant debate over law enforcement's right to access our digital devices in recent years. New tools from Grayshift and Cellebrite are popping up faster than ever to help government agencies, as well as traditional hackers, break into iPhones. If you're concerned, you can take steps right now to beef up your passcode and prevent outsiders from gaining access to your device.

How To: Exploring Kali Linux Alternatives: Set Up the Ultimate Beginner Arch Linux Hacking Distro with Manjaro & BlackArch

There's no doubt Kali has established itself as the most popular penetration distribution available. However, just because it's the fan favorite of beginners and security researchers doesn't make it right for everyone. Manjaro Linux is a beginner-friendly Arch-based distribution which can be easily weaponized with the Black Arch expansion, creating a friendlier first-time Arch experience.

How To: Secure Your Instagram Account by Adding 2-Factor Authentication & Managing Privacy Settings

The photo-centric Instagram app is a great way to share "evergreen" pictures and videos when compared to Snapchat and Facebook's new Messenger Day feature. But like all social media, keeping the account secure is an essential aspect, as it restricts unwanted viewers from seeing your content and can prevent unauthorized users from accessing your account. Instagram has several methods for locking down the account including a new two-factor authentication (2FA) mechanism.

How To: Introduction to the C.H.I.P by Next Thing Co - IoT Hacking Device?

Hello NullByte, it's mkilic! This time I'm here with the C.H.I.P from NTC. Although it is not too popular, the C.H.I.P is a brand new micro computer. It is very similar to the Raspberry Pi or Beaglebone Black. The key difference with this particular board is its cost and size. The C.H.I.P only costs $9 and measures 2.5 x 1.5 inches. In addition to this, the C.H.I.P has built in 802.11 b/g/n Wifi and Bluetooth 4.0. Considering these great specs, what could a Hacker use this for? Step 1: The In...

How to Train Your Python: Part 10, Making Our Own Functions

Welcome back! In the last iteration of how to train your python, we covered error detection and handling. Today we'll be diverging from this and discussing functions. More specifically, we'll be creating our own functions. First we'll need to understand exactly what a function is, then we'll get on to making our own! So, let's get started!