Remote Base Search Results

Quick Tip: Use a Wired Headset as a Shutter Release Trigger for Your DSLR Camera

Whether you're trying to get an unconventional angle or just want to include yourself in the picture, there are plenty of times when a remote trigger can come in really handy. Of course, if you want to buy one, you have tons of options. But if you already have an Xbox 360 headset, all you have to do is plug it in. YouTube user Gurnarok accidentally found that by plugging his Xbox headset into his camera's remote port, the on/off toggle triggered the shutter release and flash.

How To: Upload files from Firefox with the FireFTP extension

Go to web browser, click on tools- under tools click on 'Fire ftp.' Add an account to get into recall server. Under 'MANAGE ACCOUNTS' - click 'Add new one.' In host type 'Recall.(yourserver.)' then click on 'anonymous.' Click 'okay.' Now hit 'Connect.' the ftp server is then going to connect to your remote server. On right side you can see the remote server and it's file structure. Clicking on plus button (+) will expand the file tree structure. At this point you can see all the folders but y...

How To: Set up your Canon 580EX II at the Master Mode setting

So you want to control the flashes on your camera using a remote, and you know that you need to get to Master mode on your Canon 580EX II to be able to do that. But Canon made Master mode for this particular model of camera very difficult to locate and enable. However, this video shows you every single step you need to take with your camera in order to be able to set up this particular functionality for your next shoot!

How To: Pick blackberries and make blackberry jam

These days, with so many digital distractions clogging the cloud - Twitter, Facebook, Blackberries, and iPads just to name a few - very few of us spend quality time just talking and cooking and eating with those we love. Take some time out to remember what it felt like to move without a Wii remote by learning how to pick blackberries and preserve jam.

How To: Eavesdrop on a Bluetooth headset

Few Bluetooth users realize that Bluetooth headsets can be hacked or otherwise exploited to a remote attacker the ability to record and inject audio through the headset while the device is not in an active call. SANS Institute author and senior instructor Joshua Wright demonstrates, and explains, the security vulnerability in this how-to. For more information, including step-by-step instructions on how you can replicate this hack yourself, take a look.

How To: Exploit Java Remote Method Invocation to Get Root

In the world of technology, there's often a trade-off between convenience and security. The Java Remote Method Invocation is a system where that trade-off is all too real. The ability for a program written in Java to communicate with another program remotely can greatly extend the usability of an app, but it can also open up critical vulnerabilities that allow it to be compromised by an attacker.

How To: Assemble a shock assembly on an RC vehicle

Squirrelod shows you how to put together a shock assembly or a shock absorber on a Factory Team remote control car kit. He takes us through building the piston - shaft, dampener, nuts and over rings step by step. Practical tips and tricks involved in building up the shaft and the recommended oil used are presented. This is not something that should be done in a hurry since time is needed to let the oil settle thus removing any air bubbles in the piston. Although the instructions for different...

How To: Break in the brushed motor of an RC car

It's simple: if you've got a brushed motor, you'll want to break it in under controlled circumstances before taking it out into the world. Why break in your engine? The main idea of breaking in your engine is to wear down your engine's brush so as to maximize surface contact with the commutator, reducing resistance (and therefore waste energy) and thereby increasing power. For detailed instructions on breaking in your remote control vehicle's engine, watch this RC hobbyest how-to.

How To: Make your home safe and secure with tips from Lowe's

In this tutorial, we learn how to make your home safe and secure with tips from Lowe's. You should do a safety check on your house at least once a year. Start with the entryway, making sure you have an insulated wood door in the doorway. Make sure there is a lock and a deadbolt lock on the door as well. Once inside, make sure you have timers to control your lighting, so it can come on even when you're not at home to detract any robbers. In the garage, make sure you have an electronic door ope...

How To: Build a remote-controlled camera mount

Kip Kay, from Make Magazine, shows you how to take your radio controlled vehicle and turn it into a spy car, by mounting a camera onto it. Follow Kip, as he shows you how to remove the body from your radio controlled car, mount the camera inside the chassis using the triPod mounting screw hole on your video camera, and put it all back together. In just few short steps you, too, can have your very own radio controlled spy car.

How To: Remove and Install Tires on a Remote-Controlled Car

If you call yourself a hobbyist or a kid at heart, you know that remote-controlled vehicles are more than just fun. If you're a serious R/C man, you'll know all about doing everything to your model truck or car, like fixing wheels, vamping the pinion gears, waterproofing, troubleshooting, electronic diagnostics, setting up, programming, and finally... racing. As much as you know about these remote-controlled vehicles, it will never be enough; you'll always be looking for more...

How To: Exploit Remote File Inclusion to Get a Shell

A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website defacement to full-on code execution. For this reason, RFI can be a promising path to obtaining a shell.

How To: Create a Zerg Invasion map with the StarCraft 2 Editor

Starcraft 2, like it's predecessor before it, has a very robust level editor that allows you, the DIY modder, to create nearly any scenario within the bounds of the Starcraft 2 engine that you could imagine. We have compiled videos on how to do all sorts of fun things with it, from making RPG's and Tower Defense games to just making you dream Starcraft 2 level. This video will teach you how to make a Starship Troopers (film, not book) style map where a group of Terrans have to defend a remote...

How To: Configure F5's FirePass v7 SSL Endpoint Security

Learn how to configure the features in F5's FirePass v7 SSL VPN Endpoint Security. Peter Silva shows some of the new Endpoint Security features in the recent FirePass v7 release. Watch how to create policies, enforce host checks and other protective measures for your Remote Access deployments. For more information, and to get started configuring your own installation of FirePass v7, take a look.

How To: Remove the harmful cmdd.exe file

Here is a basic walk-through of how to remove the harmful file known as the cmdd.exe. The cmdd.exe file is a backdoor trojan virus that can allow a hacker remote access to a computer infected with it. Your computer can be infected with this threatening virus at any time and it must be removed immediately. This video provides several techniques that can be used to completely get rid of the file from your computer.