Shell Oil Search Results

How To: Hair Chalk

In this video, we show you how to add some green to your hair (or any colour for that matter) using chalk. It is simple and won't damage your hair or your clip-in extensions.

How To: Build a Rustic Timber Table

These three videos will show you how to build a rustic, distressed kitchen table. I'll be walking you through the process of selecting some recycled timber from a junk pile, and with a little care and some simple joinery techniques, transform that waste timber into a distressed timber kitchen or dining table. In fact, you could use the table for whatever you wanted really.

How To: Adjust a Sliding Door

How to adjust a sliding door. Sliding doors are great when they are sliding but can be a real pain in the bum when they don't. Today's video will concentrate on adjusting the wheels to help alleviate some of these annoying issues. It doesn't matter if it's a robe sliding door, a closet sliding door, a glass sliding door or a patio sliding door, the principle is still the same. Obviously there can be other factors like the sliding door track or the sliding door wheels being in a state of disre...

How To: Discover the Hidden Colors in Everyday Objects with This DIY Video Spectrometer

A spectrometer is a device that splits light into all of the different colors it's composed of that can't be seen with the naked eye. It does this by using a prism to refract or bend the light. Jeffrey Warren over at Public Labs created a tutorial showing how you can make your own video spectrometer and create spectra like the one pictured below. Any guesses as to what the subject is? Believe it or not, that's what whipped cream looks like when viewed through a spectrometer. You can do this w...

How To: Peel hard boiled eggs in five seconds

The man in the video shows us how to peel an egg open in 5 seconds by slamming the egg down on the counter (not to hard but at a sufficient speed) and rolling it for a bit then peeling it off with ease. As shown with the comments on the video's page, this task is not as simple as the title states. It takes a lot of practice to crack the egg just right without smashing it, but if done correctly, gets you that perfect, out of the shell, hard-boiled egg. This video teaches you that practice make...

How To: Make a Left 4 Dead dedicated server

If you don't want to shell out the money to rent a dedicated server in order to host a Left 4 Dead game server, follow this tutorial on how to create one on your home computer. Keep in mind that if you intend on letting other people play it, you will need a fast connection to prevent lag.

How To: Make a chicken and noodle casserole with Betty

Chicken noodle soup is a very comforting dish, but sometimes you need something a bit heartier. In this video, Betty shows us how to make her favorite chicken noodle casserole. This dish is bursting with flavor and very filling. The casserole is perfect for a chilly winter evening or anytime you need some extra lovin'.

How To: Cook braised lamb shanks

Lamb shanks are very easy to cook. Take 6 lamb shanks and put them in a bowl. Put some olive oil, salt, pepper, rosemary, and thyme on them. Make sure you coat every shank with the seasoning as you turn the shank in the bowl several times. Put them in the oven for 30 minutes at 450 degrees. While the lamb shanks are cooking. Use a saucepan on medium to medium-high setting and heat 2 tablespoons of butter in it. Put some diced celery, carrots, and onions into the pan and saute them in the butt...

How To: Make a kitty litter deep cleansing facial mask

Yep Kitty Litter, but DON'T FREAK OUT! Read or watch the video before you make any assumptions. This mask is perfect for oily, dirty, large pores skin! If you need to detoxify your skin, this is the best mask to use, and you can make it right at home! Use this once every 2 weeks. You should deep cleanse your face once every 2 weeks to remove impurities. Unscented Kitty Litter is made out of Clay, Bentonite clay to be excat. Bentonite is clay that is is rich in minerals and it comes from volca...

How To: Get Twilight eyes from the hit movie

This is a metallic sparkily super fun look inspired from Twilight the vampire movie! This is what you need: Eyes, Bare Essentials- Platinum, Twiligth Coastal Scents - neutral palette, Urban Decay - oil slick, MAC - frost pigment, MAC ~ black track, Bare Essentials ~ sparkle mascara & MAC- pro long lash. Cheeks: MAC ~ dainty. Lips: Duwop ~ Venom gloss tulip. Where this to tomorrow's midnight showing of the movie TWILIGHT!!!

How To: Bake halibut fish in parchment paper

In this cooking tutorial, Better TV shows you how to lighten up a recipe without sacrificing the taste. Watch this how to video to learn how to prepare halibut fish by baking it in parchment paper. You will need: Parchment paper, string, West coast halibut, tomatoes, olive oil, garlic, Fava beans, white asparagus and sugar.

How To: Make a Sicilian pizza

Watch this instructional video to learn how to cook a Sicilian pizza. All you need is flour, yeast, olive oil, salt, water, tomato sauce, and cheese. This food is mouth watering.

How To: Clean up a cracked egg

Those smooth oval shells just seem to jump right out of your hands. When an egg hits the floor it is a gooey mess but not need to use an entire roll of paper towels trying to pick up the pieces. Cover with salt and the mess and be swept up after only a few minutes.

How To: Top 10 Browser Extensions for Hackers & OSINT Researchers

While modern browsers are robust and provide a lot of functionality, they can be unlocked to do some pretty spectacular things with browser extensions. For hackers and OSINT researchers, these tools can be used to defeat online tracking, log in to SSH devices, and search the internet for clues during an investigation. These are a list of my top ten favorite browser extensions for hackers — and how to use them.

How To: Use the Koadic Command & Control Remote Access Toolkit for Windows Post-Exploitation

Koadic allows hackers to monitor and control exploited Windows systems remotely. The tool facilitates remote access to Windows devices via the Windows Script Host, working with practically every version of Windows. Koadic is capable of sitting entirely in memory to evade detection and is able to cryptographically secure its own web command-and-control communications.

How To: Exploit DDE in Microsoft Office & Defend Against DDE-Based Attacks

In our previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when an MS Word document is opened. Because Microsoft built DDE into all of its Office products as a way to transfer data one time or continuously between applications, we can do the same thing in Excel to create a spreadsheet that runs malicious code when opened. The best part is, it will do so without requiring macros to be enabled.

How To: Detect Bluetooth Low Energy Devices in Realtime with Blue Hydra

Bluetooth Low Energy (BLE) is the de facto wireless protocol choice by many wearables developers, and much of the emerging internet of things (IoT) market. Thanks to it's near ubiquity in modern smartphones, tablets, and computers, BLE represents a large and frequently insecure attack surface. This surface can now be mapped with the use of Blue Hydra.

How To: Using BASH for Computer Forensics

Greetings to all geeks, hackers, nerds, and explorers of Null Byte. Welcome to my brand new tutorial, "Using BASH for Computer Forensics". This tutorial will give you a look at how the computer programming language, Bash, can be used to find out details on apple devices for later use.