Remote Base Search Results

How To: Find the Enclave Remnant Power Armor in Fallout: New Vegas

Power Armor that isn't faction based, mostly around the Brotherhood of Steel, is very hard to come by in Fallout New Vegas. Wearing faction based armor can have negative effects if you're traveling in the territory of a faction that doesn't like that faction, regardless of your standing with that faction. Now THAT's a mouthful! But, there is a suit of Enclave Remnant Power Armor laying at the crashed Enclave Vertibird. Check out this video for the location of the Power Armor!

How To: Use noodle-based compositing in Blender

Conceptually, what is node-based compositing and what do nodes do? This clip uses the factory analogy to convey the concept. Blender can process video, images, sequences, and families of images in a directory. Then you'll fire up Blender and talk about threading nodes and how images are duplicated and routed through the compositing network ("noodle"), how threads are created between sockets. Creating threads, cut threads. The clip also points out common threading errors and misrouting threads...

How To: Do a Vanessa Hudgens smokey eye look

A major Hollywood player since she was a preteen, Vanessa Hudgens knows what looks on the red carpet and what doesn't. And, like most girls, she's found that the smokey eye never fails to make your eyes pop and to the make the eyes of nearby cartoon wolves pop out.

How To: Translate your name into Japanese in 2 easy ways

This is a video that explains to a person how to write their name in Japanese. The woman shows two ways as to how to translate your name in Japanese. The first is how the name is pronounced, and the second way is to translate your name based on the meaning. Usually the name is translated based on pronunciation in the native language. The name is pronounced similarly but not exactly the same. For example Rachel is pronounced "Reicheru". She also shows a website where more information can be fo...

How To: Make a floral Birthday "cake" table centerpiece

This video describes how to make a "no calorie" birthday cake centerpiece with carnations in soft and sweet hues of pink, yellow, white and cantaloupe. first a flower foam was taken. Then the toothpicks were used to join the flower foam together. Then trace out a circle from the foam using a kitchen knife. Add some water to the base of the cake. With equal size flowers decorate the base of the cake. Then the cake is beautifully covered with different types of flowers. decorate with as many fl...

How To: Make a Midori based "Green Iguana" cocktail

In this video tutorial, viewers learn how to make a Midori based "Green Iguana" cocktail. The video lists all the required ingredients to make a "Green Iguana" cocktail. The ingredients include: an ounce of Midori, half an ounce of tequila and 2 ounces of homemade sweet sour mix. To make the "Green Iguana" cocktail, follow these steps: mix all three ingredients in a cup, mix ingredients by shaking and add ice. This video will benefit those adult viewers who enjoy alcoholic beverages and are w...

How To: Apply flawless falsh lashes by Illamasqua

This video teaches the secrets of applying flawless false lashes. An excellent summary is given below. First hold the lashes with tweezers to your eyelash to check the size of it. Cut it off a bit if the false lashes are big compared to your eyelashes. Now apply some glue carefully to the base of the false eyelash. Close your eyes and stick the false lashes to the base of your eyelash and hold it for a few seconds to let it dry. After the glue gets dried blend the false lashes to match with y...

How To: Declaratively and programmatically use master pages

In this video tutorial, Chris Pels will show several aspects of defining and using master pages in an ASP.NET web site. First, see how to create master pages declaratively using the ASP.NET master page model and learn what information is best suited to a master page compared to an individual content page. Next, see how to programmatically assign master pages on-the-fly in an individual content page. Also learn how to create a base page class which assigns a master page programmatically for al...

How To: Get Root with Metasploit's Local Exploit Suggester

So you've managed to get a shell on the target, but you only have measly low-level privileges. Now what? Privilege escalation is a vast field and can be one of the most rewarding yet frustrating phases of an attack. We could go the manual route, but like always, Metasploit makes it easy to perform local privilege escalation and get root with its exploit suggester module.

How To: The Paranoid Mac Owner's Guide to Defeating Remote Snooping & Evil Maid Attacks

If you're worried about the security of your Mac, there are easy measures to prevent the most dangerous attacks. Named after the tactic of accessing an unattended computer in a hotel room, we can thwart "evil maid" attacks with Do Not Disturb and LuLu, free macOS tools by Objective-See that keep an eye on unattended computers and flag suspicious network connections that indicate a malware infection.

News: iOS 12.3 Features You Don't Want to Miss, Including Apple TV Channels, AirPlay 2-Enabled TVs & Apple Pay in Apple Apps

Apple released iOS 12.3, the latest version iOS 12 for iPhone, on May 13. Great features to know about include Apple TV Channels such as HBO and Showtime that you can subscribe to in the TV app, support for audio, image, and video streaming to AirPlay 2-enabled TVs, and the ability to use Apple Pay to pay for content and subscriptions inside Apple's own apps.

How To: Exploit DDE in Microsoft Office & Defend Against DDE-Based Attacks

In our previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when an MS Word document is opened. Because Microsoft built DDE into all of its Office products as a way to transfer data one time or continuously between applications, we can do the same thing in Excel to create a spreadsheet that runs malicious code when opened. The best part is, it will do so without requiring macros to be enabled.

How To: Use Pupy, a Linux Remote Access Tool

In one of my previous articles, I discussed ShinoBot, a remote administration tool that makes itself obvious. The goal is to see if the user could detect a remote administration tool or RAT on their system. In this article, I'll be demonstrating the use of Pupy, an actual RAT, on a target Ubuntu 16.04 server.

News: Project Halium Could Open the Floodgates for Non-Android Custom ROMs

Rooting a phone lets us install custom operating systems, known as ROMs, which replace the device's preinstalled OS. Most custom ROMs are based on code from the Android Open Source Project (AOSP), which gives them a look and feel similar to Google's version of stock Android. But every now and then, you'll see a ROM that isn't based on Android, though these are few and far between — at least, until now.

How To: Set Up a Headless Raspberry Pi Hacking Platform Running Kali Linux

The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, broadcast an FM radio signal, and apparently even fly a goddamn missile into a helicopter.

How To: Install the shower base and connect it to the drain

Before you whip out your iPhone and call your neighborhood plumber for a job that's sure to cost you a pretty penny, check out this video to learn how to do some impressive plumbing yourself. Using a few tools you probably already have lying around your house, you'll learn how to install a shower base in your shower unit and then connect it with the drain - effectively, you'll be setting up a plumbing system.

How To: Start a home-based business and be your own boss

Many people think that once they start a business of their own they'll be cruisin' through life. No set hours, no boss to insult you, and no getting up at 6 AM to commute to work. But being your own boss comes with a lot of responsibility. If you're ready to take the good with the bad, check out this video to learn how to begin a home-based business.