Sources Accessibles Search Results

How To: Fire up your metabolism

This video focuses on strategies you can use to boost your metabolism--one-step needed in order to lose belly fat. Obtaining a faster metabolism will train your body to burn more calories throughout the day. The first step to boost your metabolism is through strength training, which means developing leaner muscle mass. This will result in long-term investment for caloric burning. The second step involves exercising in the morning; this will help you burn calories more easily throughout the da...

How To: Dougie (dance)

JusJerk has the Stick Figures, a jerk dance crew, show us how and what the "Dougie" looks like, a popular dance from Georgia that has spread out through out the United States. Watch and get inspired as several Stick Figure members show off their best Dougie moves.

How To: Get Icy (Cydia) on your iPhone or iPod touch

If you've been using Cydia and you noticed that there's a lot of loading and waiting, check out this video to learn how to install Icy. Icy is very much like Cydia except less loading and waiting. It's much faster and you don't lose any of your sources you've added from Cydia or Installer; they are synced into icy.

How To: Draw a hentai style Defective Reaper from Soul Chasers

This video drawing tutorial demonstrates an original fanart of Defective Reaper (meaning not "eyeballed", "copied" ,"pose-jacked", or "traced" from another existing source). For devotees of anime or hentai style, or those looking to get inspired by the Japanese manga type technique, this video will offer some inspiration. Check out this video drawing tutorial and learn how to sketch a hentai style Defective Reaper from Soul Chasers.

How To: Set up a MySQL database for Moodle in WebMin

Interested in teaching an online course using your own server but can't quite figure out how to install everything you'll need? This video demonstrates how to setup a MySQL database for use with Moodle, the free, open source course management utility, which requires a MySQL database to run. For step-by-step instructions, take a look.

How To: Record a screencast in Linux

From brute force hardware-based solutions like pointing a camcorder at your monitor to more elegant, software-based solutions like (the free and open source) Xvidcap, there are no shortage of ways to create a screencast while running Linux. In this how-to from Linux Journal Online, Shawn Powers offers a comparative look at many of the most popular techniques employed by Linux users.

How To: Do "Continuous Middle Backaround 1.5" pen spinning

Interested in pen spinning? Want to pick up a few moves? Pen spinning is the skilled movement of a writing instrument or pen with one's hands. It is used as a source of self entertainment (often for students), but there is a great deal of pen spinning culture (competitions, websites, etc.). Watch this pen spinning tutorial video and learn how to perform the "Continuous Middle Backaround 1.5" move.

How To: Cook a hamburger properly

The U.S. Centers for Disease Control estimates that 73,000 people contract E. coli O157:H7 each year. The primary source of these illnesses is ground beef that has been improperly handled and cooked. Watch this video to learn how you can avoid the spread of this bacteria.

How To: Create Packets from Scratch with Scapy for Scanning & DoSing

By using almost any packet-crafting tool, a hacker can perform denial-of-service (DoS) attacks. With the power to create just about any packet with any characteristics, a hacker can easily find one that will take down a host or network. Nmap and Hping are effective packet manipulation tools, but there's also Scapy, which is almost infinitely customizable.

How To: Leverage a Directory Traversal Vulnerability into Code Execution

Directory traversal, or path traversal, is an HTTP attack which allows attackers to access restricted directories by using the ../ characters to backtrack into files or directories outside the root folder. If a web app is vulnerable to this, an attacker can potentially access restricted files that contain info about all registered users on the system, their permissions, and encrypted passwords.