Secure Platform Search Results

How To: Connect to a MySQL database using DreamCoder via SSH

If you're new to DreamCoder for MySQL, one of the first things you may want to know how to accomplish is to connect to a remote MySQL database securely via SSH tunneling. Happily, this tutorial will walk you, step by step, through the process. To learn how to establish a secure connection between a given MySQL database and the DreamCoder for MySQL, take a look!

How To: Comfort a baby

Babies have no way of communication other than crying. = Touch is one of a baby's most highly developed senses at birth. Holding, caressing and cuddling your infant is crucial to helping her feel safe and secure. There are a number of tips demonstrated in this instructional video to help calm a crying baby. Watch this video child care tutorial and learn how to comfort a baby.

How To: Install a deadbolt

This video demonstrates how to install or replace a dead bolt in your door. Having a dead bolt lock gives you a added sense of security, because it is more secure than just the lock on the door handle.

How To: Defeat the Corrupted in Prince of Persia (2008)

If you're having difficulty dispatching any of the Corrupted from 2008's Prince of Persia, this helpful battle guide from IGN might be just what you need. If forewarned is forearmed, this video tutorial will arm you to the teeth with the necessary knowledge to beat each of Ahriman's four lieutenants – the Hunter, Warrior, Alchemist & Concubine.

How To: Use a gas smoker with tips from Lowe's

In this video from Lowe's we learn how to use a gas smoker. This tip comes from Lowe's. You can cook with a smoker anytime of year. He is using a gas smoker. Keep this away from siding. The fire source heats the moist wood chips, which release the smoke that flavors the food. You need tongs and a meat thermometer for sure. Before you cook for the first time, season the smoker by smoking some wood chips without food in it. He is cooking a pork shoulder which he uses a dry rub, wraps in plastic...

How To: Make Thai spring rolls

Place 2 Tbsp. oil in a wok or large frying pan over medium to high heat. Add garlic, galangal (or ginger), shallots, and chili. Stir-fry until fragrant (about 1 minute). Stir-frying Tip: Add a little water to the wok/pan when it gets too dry instead of more oil.

How To: Prepare and cook a meal as a Boy Scout

As a Boy Scout, when the First Class rank is attained, a scout has learned all the basic camping and outdoors skills of a scout. He can fend for himself in the wild, lead others on a hike or campout, set up a camp site, plan and properly prepare meals, and provide first aid for most situations he may encounter. A First Class scout is prepared.

How To: Stop severe bleeding (British Red Cross)

Everyone gets cut every once in a while, but sometimes those cuts can be more serious than expected. It could turn into severe bleeding, and there's a certain way to deal with this type of bleeding in a victim. How would you treat someone who was bleeding severely?

How To: Expand Your Analytical & Payload-Building Skill Set with This In-Depth Excel Training

It's nearly impossible not to be at least somewhat familiar with Microsoft Excel. While it's needed for many office jobs and data analysis fields, hackers could also benefit from improving their spreadsheet skills. Many white hats already know some of the essential Excel hacks, such as cracking password-protected spreadsheets, but there's so much more to know from an attack standpoint.

How To: Learn to Code Your Own Games with This Hands-on Bundle

We've shared a capture-the-flag game for grabbing handshakes and cracking passwords for Wi-Fi, and there are some upcoming CTF games we plan on sharing for other Wi-Fi hacks and even a dead-drop game. While security-minded activities and war games are excellent ways to improve your hacking skills, coding a real video game is also an excellent exercise for improving your programming abilities.

How To: Spy on SSH Sessions with SSHPry2.0

SSH, or the secure shell, is a way of controlling a computer remotely from a command-line interface. While the information exchanged in the SSH session is encrypted, it's easy to spy on an SSH session if you have access to the computer that's being logged in to. Using a tool called SSHPry, we can spy on and inject commands into the SSH sessions of any other user logged in to on the same machine.

How To: Get Twitter's Emojis on Any Android Phone

The art of emoji — the next level beyond the simple text-based emoticons we used once upon a time in the not so distant past. We rely upon emojis so much in our always-connected world of today simply because they help portray emotion into our typed out words. They've not been around very long, but have taken the world by storm just as quickly as they made their first appearance in our society.