Radicals Contained Search Results

How To: Create a Tangent Line with Excel

Given a function, you can easily find the slope of a tangent line using Microsoft Excel to do the dirty work. That is to say, you can input your x-value, create a couple of formulas, and have Excel calculate the secant value of the tangent slope. This is a fantastic tool for Stewart Calculus sections 2.1 and 2.2.

How To: Perform the Black Hole card trick

A magician demonstrates the "Black Hole Card Trick", Elmsley count, and Ascanio spread. Cards Required: 4 kings, 4 aces, 2 black nines, 1 black eight. Top Stack: Black ace, red ace, then black king, red king, black king, red king (black ace should be on top). 2nd Stack: 8, 9, 2 aces, and other 9. Delivery: Flip top stack. Only show kings. Place top stack back. Lay face-down top 4 cards, which are actually 2 aces and 2 kings. Take side "black hole" stack and do an Elmsley count, only revealing...

How To: Design Your Own Video Games with This Pay What You Want Bundle

"I want to make video games" — Is there anyone who hasn't ever thought that? It's almost universal among gamers to want to get on the other side of the screen and design the games themselves, especially those of us who have played less than impressive games and thought that we could do a better job. But it's hard to know where to start — or how — when it comes to creating our own games.

How To: Audit Web Applications & Servers with Tishna

Penetration-testing frameworks can be incredibly useful since they often streamline certain processes and save time by having a lot of tools available in one place. Of course, the most popular pentesting framework is undoubtedly Metasploit, but there are many others out there that cater to particular needs. For auditing web applications and servers, Tishna comes in handy.

How To: Use This Trick to Unlock Hidden Software Update Options on Your iPhone

The automatic software update setting on your iPhone is nice, but you may not always want to install new iOS versions blindly. New updates could contain bugs and vulnerabilities, and your favorite features may even disappear. With the auto-update option turned off, you can manually download and install updates, but there are also hidden options to be more specific about how you want to do it.

How To: Map Wardriving Data with Jupyter Notebook

With the Wigle WiFi app running on an Android phone, a hacker can discover and map any nearby network, including those created by printers and other insecure devices. The default tools to analyze the resulting data can fall short of what a hacker needs, but by importing wardriving data into Jupyter Notebook, we can map all Wi-Fi devices we encounter and slice through the data with ease.

How To: Force Android 10's Gestures to Work with Any Custom Launcher

One vital part of Android 10's new navigation system is the "QuickStep" gesture. Swipe up from the bottom of your screen, then pause. You'll see your recent apps along with a dock containing a handful of icons for quick access. This dock is provided by the phone's launcher, which means your home screen is now integrated into the multitasking UI. So what happens if you change your home screen app?

How To: Hack Apache Tomcat via Malicious WAR File Upload

Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web management interfaces should be scrutinized just as hard as the apps they manage, especially when they contain some sort of upload functionality. By exploiting a vulnerability in Apache Tomcat, a hacker can upload a backdoor and get a shell.

News: Apple Releases iOS 13.2 Public Beta 3 for iPhone

When you sign up to be a public tester for Apple's iOS, you get early access to features most users won't see for months. But you aren't the first — developers get priority when it comes to beta releases, made clear when they received 13.2 beta 3 while public testers were still on beta 2. Well, we public testers finally caught up, after Apple released iOS 13.2 public beta 3 Wednesday, Oct. 16.

News: Apple's iOS 13.1 Public Beta 4 Available for iPhone

It's a strange time for us iOS beta testers. While Apple prepares for the general release of iOS 13 on Thursday, it's also beta testing that software's successor, iOS 13.1. An iPhone updated to iOS 13 on Sept. 19 will only have 11 days before seeing 13.1 in its Software Update page on Sept. 30. To prepare for this release, Apple released the fourth iOS 13.1 public beta, just about the same time as its developer counterpart.

News: Apple Just Released iOS 13.1 Developer Beta 4 for iPhone

Apple's iOS 13 is nearly here. After four months of beta testing, the latest iPhone software update promises over 200 brand new features, like system-wide dark mode and an overhauled Reminders app. That said, it'll be shortlived, as Apple plans to release iOS 13.1 as a supplemental update just 11 days later. In fact, the company just seeded developers the fourth beta for iOS 13.1 today, Sept. 18.

News: Apple Just Released iOS 13.1 Developer Beta 3 for iPhone

It's a big day for Apple. First, the company announced its new suite of phones: iPhone 11, iPhone 11 Pro, and iPhone 11 Pro Max. Then, we get the iOS 13 Golden Master, the beta version of iOS 13 that will eventually release to the general public on Sept. 19. Now, it seems the company has dropped the third developer beta for iOS 13.1, set to release to all compatible iPhones on Sept. 30.

How To: Scan Websites for Interesting Directories & Files with Gobuster

One of the first steps in attacking a web application is enumerating hidden directories and files. Doing so can often yield valuable information that makes it easier to execute a precise attack, leaving less room for errors and wasted time. There are many tools available to do this, but not all of them are created equally. Gobuster, a directory scanner written in Go, is definitely worth exploring.

How To: Complete the Registry of Foundables & Obtain Treasures in Harry Potter: Wizards Unite

From the first moments of booting up Harry Potter: Wizards Unite to the hours of walking you're bound to experience, one thing is clear — encountering Foundables and defeating their Confoundables is a significant plot point of the AR game. While you receive rewards each time you retrieve a Foundable, the real treasure comes from completing parts of the Registry, called "Families."

How To: Mine Twitter for Targeted Information with Twint

Open-source intelligence researchers and hackers alike love social media for reconnaissance. Websites like Twitter offer vast, searchable databases updated in real time by millions of users, but it can be incredibly time-consuming to sift through manually. Thankfully, tools like Twint can crawl through years of Twitter data to dig up any information with a single terminal command.

How To: Get Taylor Swift's 4.26 Instagram Filter Right Now

Is there a bigger name in pop music than Taylor Swift right now? Her 116 million followers on Instagram would probably argue, "No." As such, if you're one of these many followers, you might have seen Taylor advertising a new "4.26" filter on her story. Problem is, there's no clear instruction for actually using the filter. That's where we come in.