Specific Types Search Results

How To: Perform a Swedish massage on the legs and arms

This video massage tutorial shows how to perform a Swedish massage on the arms and legs. The massage strokes are demonstrated twice to give a detailed explanation of the technique and specifics of biomechanics as well as show the flow of a good massage. Watch this instructional video and learn how to give a Swedish massage on the arms and legs.

How To: Practice proper breathing for pilates

Proper breathing is a very important part of Pilates exercise. Many Pilates exercises are taught with specific instructions on how to use the breath with them. Often in our daily lives our breath becomes very shallow, most people only breathe into the upper part of the chest. Watch this pilates how to video to learn proper breathing techniques.

How To: Perform CPR on a baby

Learn live saving techniques by watching this how to video. This video teaches you how to use a pocket mask and perform CPR on a baby. Because babies are much smaller than adults it is important to follow specific guidelines to save their lives.

How To: Use 3D lights in CINEMA 4D if you know After Effects

If you know how to use After Effects, you're probably very familiar with the ability to add 3D lights to a scene, and allow them to interact with 3D layers. In 3D applications like CINEMA 4D, lights are an essential part of your project, but how do you make them look at a specific "point of interest" or object? This tutorial shows you how.

How To: Use the preview range in CINEMA 4D

If you use After Effects you have become familiar with the Work Area, a range of time that allows you to focus on a specific range of time. You can work exclusively in this area, or work in the larger time of the composition, only to preview or render that area of time when you go out to final. In CINEMA 4D, users can achieve similar results using the Preview Range. This tutorial will show you how.

How To: Learn How to Play the Market with This Data-Driven Trading Bundle

If you're reading this, you're likely a tech-savvy coding pro whose analytical talents are mostly applied to designing apps, cracking passwords, and infiltrating networks — all of which are admirable activities for both aspiring and seasoned white hat hackers. But there are other profitable ways that you can put these types of skills to use, namely in the world of investment and trading.

How To: Force Safari to Automatically Show Reader View for Specific Websites on Your iPhone

The Reader mode in Safari is a great way to view a webpage on your iPhone in a stripped-down manner, removing unnecessary images, videos, and advertisements for a streamlined experience free of distractions. Apple's iOS 13 improves upon Safari Reader when it comes to choosing which sites you want it to run automatically on, so everything is more accessible with more controls to work with.

How To: Target Bluetooth Devices with Bettercap

An incredible amount of devices use Bluetooth or Bluetooth Low Energy to communicate. These devices rarely have their radios switched off, and in some cases, are deliberately used as trackers for lost items. While Bluetooth devices support MAC address randomization, many manufacturers do not use it, allowing us to use tools like Bettercap to scan for and track Bluetooth devices.

How To: Use Siri with a Third-Party Weather App Instead of Apple's on Your iPhone

If you ask Siri to check the weather on your iPhone right now, you'll get information from the stock Weather app in iOS — even if you have and prefer other weather apps installed. But that doesn't have to be the case. Thanks to Siri Shortcuts in iOS 12 and later, you can set specific phrases that Siri will respond to for any compatible weather app you want.

How To: Search Real-World Text for Words & Phrases Using Your iPhone

Safari has a convenient "Find" feature to search for specific words and phrases in a webpage, and Apple Books has a similar feature for e-books and PDFs. But those do nothing for you when searching text in the real world. Hardcover and paperback books are still very much a thing, as well as paper-based documents, and finding what you need is as simple as pointing your iPhone's camera at the page.

How To: Use MDK3 for Advanced Wi-Fi Jamming

You may have heard of a signal jammer before, which usually refers to a device that blasts out a strong enough radio signal to drown out the reception of nearby devices like cell phones. Purpose-built jammer hardware is outright illegal in many countries. Still, Wi-Fi is vulnerable to several different jamming attacks that can be done with Kali Linux and a wireless network adapter.

How To: Use Business Chat on Your iPhone to Securely Interact with Companies via iMessage

Apple first announced Business Chat, a new way for customers to communicate with companies, at WWDC 2017. While Business Chat did not arrive with the initial release of iOS 11, Apple pushed it out in iOS 11.3 so companies can offer customer service in a whole new way, and it works pretty much the same in iOS 12 and higher as it did back then.

Dev Report: Machine Learning Agents Come to Unity

As we have seen previously with the likes of SethBling's Mar I/O videos and other examples, video games seem to be a great source for training AI neural networks. Augmented reality and machine learning are part of a collection of technologies that seem to be growing toward a point of maturity, and that will likely cause them to be intertwined for the foreseeable future. As developers, machine learning will definitely change the way we create software in the coming future. Instead of going lin...

How To: Create an Undetectable Trojan Using a Domain Name

In this tutorial I am going to show you how to create an undetectable Meterpreter Trojan using a Domain name. I have taken a few guides/tutorials and built it into one. The first part is creating the DNS Payload. The second part is creating the Executable file. Part 3 is using both in Shellter to create your undetectable Trojan. Part 4 is setting up your listener using Armitage.

How to Meterpreter: Obtaining User Credentials with PowerShell

In this article I will show you how to obtain victim's credentials without cracking any hashes. There are a couple of ways to perform this task (for example dumping the SAM file and cracking the NTLM hashes), but here I will explain how to do it using PowerShell and a bit of social engineering. We are going to create a fake login popup.

How To: Automatically Change Keyboards for Specific Apps on Android

There's no such thing as a perfect Android keyboard. Some, like Swype, have gesture typing down to a science, but lack in predictive technology. SwiftKey, on the other hand, boasts awesome next-word prediction, but less than stellar gesture typing. Many others are optimized for multiple languages, space saving, or emojis, but none are without their flaws.

How To: Improve Battery Life on Android by Optimizing Your Media Scanner

Battery life is extremely unpredictable on an Android. Finding the right ROM and kernel combo can make or break having the kind of battery that will last you all day long. Even if you do find the perfect pair, you then have to worry about apps, widgets, and other processes constantly waking your phone and draining your juice. While your media scanner isn't the biggest battery hog out there, it can definitely take a chunk out of it.

How To: Hunt Down Space-Hogging Files on Your Mac with Disk Inventory X

I love my MacBook Air, but the fact that it runs on only 128 GB of flash storage causes me to move most of my files to the cloud. I don't mind having to be connected to the internet in order to access my files, but it's definitely a hassle trying to figure out which files I should move in order to save the most space. Usually, I don't even bother even trying until I see the dreaded "Your startup disk if almost full" warning. Currently, the only real way to find your biggest files in Mac OS X ...