Shell Oil Search Results

How To: Make beef wellington singles

This dish is perfect for dinner for two. You need two beef tenderloin fillets with the silver skin cut off, ½ package of phyllo dough, 8 oz of mushrooms, 1½ cup green onions, 2 tbsps of olive oil, 1 tbsp of butter, ¼ cup of parsley, and 2-3 tsps of lemon juice, salt and pepper, Hollandaise sauce. Pan fry the beef for a minute or two on each side if you like it more well done. For the mushroom filling, use fresh mushrooms. Chop up the mushrooms finely. Chop up green onions. Use a little bit of...

How To: Make a spider sushi roll

This video explains how to make a spider roll. First, spread the rice for the spider roll. Make sure that the top and bottom edges have a thickness of 1/8 inches without rice, so that it won't squash it out when rolling. Then add some toasted sesame seeds. Place the rice patty vertical, with top edges empty, and place the deep fried soft shell crab into it. The claws and legs should be outside of it. Put some crab sticks, avocado and some cucumbers onto it and roll with leaf lettuce so that i...

How To: Cover a cake in minutes

Kate Hemmings on The Crafts Channel shows that covering a cake isn't as tricky as you may think. You will need a type of icing that rolls out, such as fondant icing. Ideally, you will want to have fondant icing with glycerine, and so the Pettinice brand is excellent in this case. If you use this icing, you will not encounter problems with cracking of the icing when you try to shape it over the cake.

How To: Make Korean tacos

Sick of the same old taco? Well, mix it up and try a unique cross-cuisine take on the Mexican taco. Everyone can enjoy the unique flavors of Korean inspired kimchi in the personal size and hand-held qualities of a taco shell.

How To: Abuse Vulnerable Sudo Versions to Get Root

Anyone who has used Linux long enough is familiar with sudo. Short for superuser do (or substitute user do, depending on who you ask), it allows users to run commands as either root or another user on the system. From a hacker's point of view, sudo is often all that stands between them and root access. We'll be exploring an older vulnerability in sudo that allows a user to run commands as root.

How To: Get Root Filesystem Access via Samba Symlink Traversal

Samba can be configured to allow any user with write access the ability to create a link to the root filesystem. Once an attacker has this level of access, it's only a matter of time before the system gets owned. Although this configuration isn't that common in the wild, it does happen, and Metasploit has a module to easily exploit this security flaw.

Exploit Development: How to Manipulate Code Execution with the Instruction Pointer

The one thing that separates a script kiddy from a legitimate hacker or security professional is the ability to program. Script kiddies use other people's tools, while hackers and security pros write their own tools. To that end, we're going to see how a stack overflow vulnerability allows us to flood a variable with enough input to overwrite the instruction pointer with our own commands.

The Hacks of Mr. Robot: How to Use the Shodan API with Python to Automate Scans for Vulnerable Devices

Shodan calls itself "the search engine for internet-connected devices." With so many devices connected to the internet featuring varying levels of security, the special capabilities of this search engine mean it can provide a list of devices to test and attack. In this tutorial, we'll use Python to target specific software vulnerabilities and extract vulnerable target IP addresses from Shodan.

How To: Extract Windows Usernames, Passwords, Wi-Fi Keys & Other User Credentials with LaZagne

After exploiting a vulnerable target, scooping up a victim's credentials is a high priority for hackers, since most people reuse passwords. Those credentials can get hackers deeper into a network or other accounts, but digging through the system by hand to find them is difficult. A missed stored password could mean missing a big opportunity. But the process can largely be automated with LaZagne.

How To: Simulate a RAT on Your Network with ShinoBOT

A remote administration tool, or RAT, is a piece of software used for remotely controlling machines. They are commonly used by tech support to gain remote access for troubleshooting purposes, but RATs are also an important part of a hacker's advanced persistent threat (APT) toolkit. Unlike standard administration RATs, these tools are designed to be delivered stealthily and operate undetected.

How To: Make a double-crust apple pie

In this tutorial, we learn how to make a double-crust apple pie. First, bring apples, apple cider, brown sugar, cinnamon, and nutmeg to a boil in a pot. Then, add in a mixture of corn starch and apple cider. Mix this in, then set aside and let it cool while you make the dough. Roll your dough out and then place into the pie plate and pack down. Pour your apple mixture out into the center of the pie shell, then brush the excess dough with water so the top crust adheres better. Push the top cru...

How To: Crack a WPA (and some WPA2s) with BackTrack in Linux

In this video we learn how to crack WPA using Back Track. The first step is the boot into Back Track using a VMware Virtual Machine Image. Next you need to open a shell console. In the console you will type "airmon-ng" and press enter. This does a check to find the wireless guard interface name. Next, type "airodump-ng wlan0" and press enter. This will tell it what wireless card to use and scan for wireless networks. You are looking for the one that comes up WPA. Copy the MAC address then typ...

How To: Make a pull-apart football cupcakes

BettyCrockerTV shows viewers how to make pull-apart football cupcakes! First, you should cook cupcakes, and then arrange the cupcakes on the platter. Start with three rows of three cupcakes. Next add two on each side! Then add one on the end to finish this off. Now it should look like a football. Now to frost, you should not frost each cupcake. Instead, pipes frosting on to all of the cupcakes in the shape of a football. It should take 2 cups of frosting. Now, after piping frosting onto the c...

How To: Properly set up a turntable

Paul demonstrates to viewers how to properly set up a turntable. Each turntable has the same basic parts, so this tutorial should work for most users. There are several components: the platter is the part that spins and it has a slip mat on top. The tone arm is to the right and it has a head shell and stylus cartridge (needle) mounted on the end. The queueing lever is at the base of the tone arm and it raises and lowers the tone arm base. There is also a VTA (Vertical Tracking Angle) adjustme...

How To: Make a spiritual bath

In this video Krazyboy shares his method of creating a spiritual bath. Krazyboy suggests that while spiritual baths are often known to help cleanse the soul, you can also imbue it with an intent (such as love, luck, success). The idea behind a spiritual bath is cleansing and white. A nice feature of spiritual baths is being able to customize it, including ingredients that feel right to you. To begin, fill a large bowl about half way with holy water/new moon water/spring water. Next, add a cou...

How To: Make an easy potato salad

This video demonstrates how to prepare Potato Salad and Deviled Eggs. To begin making potato salad, peel and cube potatoes. Try to make sure they are all the same size. You will need 8 potatoes. Add potatoes to boiling water. Don’t overcook. Drain and chill in the refrigerator.

How To: Make a quick and easy chicken & dumplings

Unexpected guest? Families coming for dinner? or Just in the mood of some soul food? Chicken and dumplings, this fast track version will take few ingredients and little time. This two part tutorial will never have you doubting "whats for dinner?" ever again.

How To: Make a homemade key lime pie

Craving key lime pie? Make one at home! Who knew those tiny little limes could make a pie with so much flavor? Your friends will love this easy to make, tart treat. Learn how to make a homemade key lime pie with help from this instructional video.

How To: Create a geisha makeup look for Halloween

Wash your face and make sure there are no oils or lotions. Use a toner or a makeup primer which you can purchase at drug store. Pull your hair off of your face with a headband. No hair should be near your face, ears or nape of neck. This is the oil undercoat for use with the 'Kabuki Oshiroi' Shiro-Nuri (Doran) face paint. It is softened in the hands and then rubbed over the entire face or other areas to prepare the skin for the white face makeup. This is the stiff wax used to flatten out faci...