Solution Brings Search Results

How To: Create soft, sexy curls with hot rollers

It's time to bring hot rollers back. If you want those sexy, soft curls and are sick of using your brush and hair dryer, try curling your hair with hot rollers. Andi Scarbrough of Byu-ti Salon shows Katherine Kendall a quick and easy way to curl your hair with many cool tips to achieve that "Hollywood Glam" in minutes.

How To: Make a Scooby Snack

You don't have to be Scooby Doo or Shaggy to enjoy this drink. Learn how to make a Scooby Snack cocktail brought to you by American Bartenders School. Bailey's, Midori and Malibu Rum are needed.

How To: Fix an overexposed sky in an image using Photoshop

Depending on lighting conditions, you may need to overexpose the background to get a good shot of your subject. See how you can use Photoshop to bring the overexposed backgrounds back to life. This trick will work if you took a photo of the object and the sky, or if you just have another image of a background you want to use.

How To: Care for a Bonsai plant

If thinking about growing your own Bonsai, remember these are trees. Granted they're miniaturized and kept in small containers but they need to be kept outdoors. One wouldn't bring a Red Maple or Azalea inside, same here. They will require diligent care, they will need to be checked for over or under watering but need to remain outside most all of the year. If a tropical variety - a bright window or greenhouse would be perfect

How To: Prepare northern-style macaroni salad

A delicious macaroni salad recipe is something you will enjoy for years to come. Bring this tried and true northern-style version to your next cookout or picnic. You will need: elbow macaroni, green pepper, plum tomato, yellow onion and mayonnaise.

How To: Enumerate NetBIOS Shares with NBTScan & Nmap Scripting Engine

NetBIOS is a service that allows for communication over a network and is often used to join a domain and legacy applications. It is an older technology but still used in some environments today. Since it is an unsecured protocol, it can often be a good starting point when attacking a network. Scanning for NetBIOS shares with NBTScan and the Nmap Scripting Engine is a good way to begin.

How To: Set Up an Eviltwin

When I tried to set up an eviltwin for a MitM-constelation in kali 2.0, I couldn't provide internet to the victim. The origin was the brctl bridging. I have read many tutorials but all of them where explained in backtrack and older versions of kali. So i was searching for a solution without using brctl and this solution will be explained now. This will just work on unencrypted wireless-environments.

How To: Recover Deleted Gmail Contacts

If you accidentally deleted a few contacts in Gmail, don't worry. You could still restore or find those email ids. This video will show you how to recover those contacts and bring back to your contact list. The process of recovering those contacts is quite easy. So please watch the video and follow all the steps carefully.