Sensitive Action Search Results

How To: Use white balance & automation in Photoshop

In this Photoshop tutorial the instructor shows how to automate white balance. Normally there is a good chance that a group of photos were taken in a particular environment and if there was a white balance defect it would have affected all those pictures. So you will need to automate white balance correction to apply it to all those pictures at the same time. Take a group of photos which has white balance so that you can apply the technique on them. To do this go to Window actions and create ...

How To: Create a sound on/off button in Flash

Tasktutorial teaches you how to create a sound on/off button using Flash. Name the first layer Actionscript. Go to frame 1, then window - actions. Add stop(); Go to frame 2, then window - actions. Add stopallsounds(); Create a new layer and select the text tool. Write off on. Change the color to black. Select the text and hit CTRL + B to break apart the letters. Select off, hit F8 and select convert to button. Name it off. Do the same for on, but name it on. Double click to open the off butto...

How To: Hide All Traces of Your Apps & Pictures on Android

Unlike some of the popular app lockers out there, a nifty app fittingly named App Hider completely erases apps, files, and their associated footprints from your smartphone. Think of App Hider as a micro-OS within your smartphone's system. This miniature ecosystem can operate copied apps independently, thus giving it an unprecedented layer of privacy and freedom within your handset.

How To: Use Websploit to Scan Websites for Hidden Directories

Websites are often misconfigured in ways that allow an attacker to view directories that are not ordinarily meant to be seen. These directories can contain sensitive information such as private credentials or configuration files that can be used to devise an attack against the server. With a tool called Websploit, hackers can scan targets for these hidden directories without difficulty.

How To: Exploit Remote File Inclusion to Get a Shell

A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website defacement to full-on code execution. For this reason, RFI can be a promising path to obtaining a shell.

Hacking macOS: How to Perform Situational Awareness Attacks, Part 1 (Using System Profiler & ARP)

The first few minutes after gaining access to a MacBook are critical — but where do we begin? Using tools built into macOS, we can develop an in-depth understanding of running background processes, detect antivirus software, locate sensitive files, and fingerprint other devices on the network. All of this can be done without installing additional software or modifying any files.

News: Mastercard, Qualcomm-Powered ODG Smartglasses Use Iris Authentication for AR Shopping

As the level of data being generated grows exponentially, past the Information Age and into the coming Hyper-Information Age of immersive computing — as resistant as many of us are to the idea — personal data security is becoming a necessary consideration in our everyday lives. Recognizing this, Mastercard, Qualcomm, and Osterhout Design Group have teamed up to show what secure shopping could look like in the very near future with iris authentication.

Action Launcher 101: How to Use Quicktheme to Make Your Home Screen Match Your Wallpaper

If you're like me, you change your wallpaper often. After maybe a week of looking at the same picture, you just have to have something different. Depending on the new wallpaper, you may spend another hour changing the background color of folders, the app drawer, and even Quickpage to match your overall theme. But you probably don't want to spend that much time tweaking your layout every week, so let me show you a way that reduces the time from an hour to a few seconds.

News: Like Peaches? Protective Virus Could Save Millions of Dollars in Fruit from Fire Blight

Peach trees and other related plants are susceptible to the devastation caused by fire blight, a contagious bacterial disease. Once contracted, infected trees have to be burned to contain the disease and prevent spread to nearby trees. Increasing resistance to antibiotic treatment has sent scientists in search of alternative ways to deal with the bacteria and prevent its catastrophic damage.

Ranked: The 3 Best Gaming Phones

Mobile gaming still isn't on par with video game consoles or PCs, but we've come a long way from Snake. Modern games running on the latest smartphones boast downright impressive graphics—even more so when you consider how compact the system has to be in order to fit in people's pockets.

How to Train Your Python: Part 3, Basic String Manipulation

Last time in how to train you python, we covered the basics of variables and output. While we were covering variables, we talked briefly about strings. "String" is just a fancier way of saying "Word". A string is simply a set of characters encased in quotations, this lets python know that it is a word. Sometimes when we do things with strings we'll need to change them in order to do something. Python is case sensitive, for example "Null-Byte" is not the same as "null-byte". This is where mani...

News: Everything You Need to Know About the New Samsung Galaxy S5

The Samsung Galaxy S5 was just officially announced at Mobile World Congress. The new flagship device will be available worldwide beginning April 11, 2014, including all major U.S. and international carriers. With over 200 million Galaxy devices sold to date, the S5 doesn't stray too far from the trend, at least not aesthetically. We've still got a high-grade plastic shell with perforated back covers, and four color choices at launch. Our highlights of the release event are as follows.

How To: Make a rotating SWF logo in Photoshop

This video shows how to make a rotating SWF logo in Photoshop. Choose any desired logo that will be used later in the SWF file. Save the logo to the desktop. Use any kind of editing pogram. Make sure we only have what we want showing the area coloured with small squares is invisible. Open any version of Adobe Flash. Create a new "Actionscript 2" file. Then set workspace size to 240X320 and background color to match the picture we choose before. Make sure we select Flash Lite 2.0. Then go to F...

How To: Resize an image in Adobe Photoshop to submit to Alamy

In this how to video, you will learn how to re-size any image in Photoshop to submit to Alamy. You will need the file to be 48 megabytes and uncompressed. First, open the image in Photoshop. At the bottom, you will see the current image's file size. Now go to image and image size. Increase the size by two or by five percent. Make sure re-sample image and constrain proportions are selected. Make sure bicubic smother is selected at the bottom of the window. At the top of this window, you will s...

How To: Use panning to capture great action shots with movement

When shooting action shots such as runners, bikers, cars, or sports shots, a cool effect that you will see in a lot of professional photography where the person is nice and clear, but the background is blurred to give the intention of being in motion and having a lot of speed. A slow shutter speed is a part of it to capture the image while still showing motion in the photo. In this video you will get tips on how to create the panning effect that will create the desired effect.

How To: Earn the "Dodge This" achievement in Red Dead Redemption on the Herd mission

This achievement can be earned on the Outlaw to the End downloadable cooperative mission in Read Dead Redemption. To get the Dodge This achievement, start a private match with a friend on the Herd mission. Once the mission starts, select the bolt action rifle and the rolling black rifle. Use the bolt action as your primary weapon, and shoot the TNT crate next to the tent on the righthand side. Quickly switch over to your rolling black rifle. Have your teammate use one of the repeaters to weak...

How To: Set up and manipulate action constraints in Blender

This Blender tutorial discusses how to set up action contraints, where you can use a bone to control things like finger curl/expand, or something more advanced, like facial expressions. Whether you're new to the Blender Foundation's popular open-source 3D computer graphics application or are a seasoned digital artist merely on the lookout for new tips and tricks, you're sure to be well served by this free video software tutorial from the folks at CG Cookie. For more information, including ste...

How To: Walkthrough "S.O.G." on Veteran in Call of Duty: Black Ops

Now that you've beaten the Executive Order mission in Call of Duty: Black Ops, it's time for mission 5— S.O.G. This two-part video will give you all the knowhow for beaten this level and moving on to number 6. Watch all of the gameplay action in this complete walkthrough! Then check out all of the other Call of Duty: Black Ops tutorials and walkthroughs on WHT for more warfare action!

How To: Install actions for Adobe Photoshop Elements 8 in Mac OS X

Interested in installing actions for use in PSE 8 on your Apple computer? This clip will teach you what you need to know. Whether you're new to Adobe's popular raster graphics editing software or a seasoned professional just looking to better acquaint yourself with the program and its various features and filters, you're sure to be well served by this video tutorial. For more information, including detailed, step-by-step instructions, watch this free video guide.

How To: Assemble a bike

Riding a bike is a great way to get exercise and as means to getting around but incorrect bike assemble will make for a bad time. Double check all your work and make sure everything is lubed up and fastened before taking your bike out for a spin.

How To: Explore Shamanism through Ayahuasca

"Shamanism: Other Worlds" explores the ancient spiritual Amazonian enlightenment drug Ayahuasca. This documentary investigates Ayahuasca and its use largely as a religious sacrament. Those whose usage of ayahuasca is performed in non-traditional contexts often align themselves with the philosophies and cosmologies associated with ayahuasca shamanism, as practiced among indigenous peoples like the Urarina of Peruvian Amazonia. The religion Santo Daime uses it. While non-native users know of th...