Specific Types Search Results

How To: Use three point lighting

Does your video look flat? By using Three Point Lighting, you will be able to give your flat video more dimension. In this tutorial, Israel Hyman demonstrates the effects of the key light, the fill light, and the back light. This is a long standing lighting technique that you definitely should know if you plan on shooting any type of video.

How To: Shoot the puck

Coach Tom Martin discusses different techniques for shooting and the various types of shots used in the game. Among these are the wrist shot, snap shot, and the slap shot. A recap is given at the end of the video. Throughout the video, tips appear in the form of pop ups.

How To: Hit an overhead smash

Tennis Pro Brad Gilbert discusses and shows techniques for hitting an overhand smash. The types of overheads discussed are the basic, scissor-kick, backhand, and bounce. They are summarized at the end of the video. Additional information is given in sidebars and popups during the video so it's easy to understand.

How To: Fix a loose kitchen cabinet door

How to fix those loose and jiggly cupboard doors on your kitchen or bathroom cabinets. For this repair, you're going to need a flat head or phillips head screwdriver. Now, the type of screwdriver you're going to need is really dependent on the type of screw you have holding your cabinet door to your cabinet. We're going to use a phillips head screwdriver because, as you can see here, the top of our screw head is shaped like that of a crosshair. If it were shaped like one long groove in a stra...

How To: View Your Stadia Gaming Sessions from Your Google Account History

Since Stadia is an early access game streaming platform, Google is still working on bringing big things to the table. You can expect wireless Stadia controller support for many more devices, high-quality 4K gaming on all Chrome web browsers, and more Google Assistant features. They also managed to silently sneak in a way to keep track of your Stadia gaming sessions too, which is pretty handy.

How To: Brute-Force SSH, FTP, VNC & More with BruteDum

Brute-forcing is an easy way of discovering weak login credentials and is often one of the first steps when a hacker finds network services running on a network they gain access to. For beginners and experienced hackers alike, it's useful to have access to the right tools to discover, classify, and then launch customized brute-force attacks against a target. BruteDum does it all from a single framework.

News: The Best New Siri Features & Commands in iOS 13 for iPhone

Apple's latest update for iPhones, iOS 13, introduces over 200 new and exciting features. Many of those changes come to Siri, resulting in a better, more useful version of the digital assistant we've known for years. If you simply look at iOS 13's webpage, however, you wouldn't realize just how much Siri has changed this time around. We're here to fill in the blanks.

How To: Use LinEnum to Identify Potential Privilege Escalation Vectors

The art of privilege escalation is a skill that any competent hacker should possess. It's an entire field unto itself, and while it's good to know how to perform the techniques involved manually, it's often more efficient to have a script automate the process. LinEnum is one such script that can be incredibly useful for privilege escalation on Linux systems.

How To: iOS 13 Makes It Easier to Request Desktop & Mobile Sites for Webpages on Your iPhone

Ever since iOS 7, you could ask Safari on iPhone to show you the desktop version of a website, and in iOS 9, it became even easier to do. However, it's always been a hidden feature, something you wouldn't know is there without reading articles or tips online telling you what to do. Apple's iOS 13 update shines a light on it so everyone will know it's there, ready to use.

How To: Control Network Traffic with Evil Limiter to Throttle or Kick Off Devices

If you find yourself with a roommate hogging limited data bandwidth with video games or discover a neighbor has invited themselves into your Wi-Fi network, you can easily take back control of your internet access. Evil Limiter does this by letting you control the bit rate of any device on the same network as you, allowing you to slow or even stop data transfer speeds for them completely.

How To: Turn Off Those Annoying Amber Alerts & Emergency Broadcasts on Your Android

To bring things up to code with a new FCC standard, Android recently added an "Emergency broadcasts" feature that will make your smartphone notify you whenever a potential safety threat or Amber Alert is posted in your area. Even if you have your phone set to silent, these emergency alerts will cause your device to emit a loud, piercing sound when a potential threat is nearby.

How To: Set Different Downtime Schedules on Your iPhone for Each Day of the Week

When Apple released its Downtime feature in iOS 12, it gave us an easy way to control how much time we spend on our iPhones — but it wasn't perfect. When setting Downtime, you' were forced to use the same time schedule for every day of the week, so your weekdays and weekends had the same restrictions. Apple fixed that issue in iOS 12.2 and later, so lockout periods can be more customized.

News: What the Irregular Heart Rhythm Notification Means on Your Apple Watch

Waking up your Apple Watch to see "your heart has shown signs of an irregular rhythm suggestive of atrial fibrillation" might come as a shock. While your watch can send you warnings if it detects a fast or low heart rate, those messages are pretty vague, while the abnormal arrhythmia alert can downright scary. So what should you do if you receive one of these AFib notifications?

How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack

Cracking the password for WPA2 networks has been roughly the same for many years, but a newer attack requires less interaction and info than previous techniques and has the added advantage of being able to target access points with no one connected. The latest attack against the PMKID uses Hashcat to crack WPA passwords and allows hackers to find networks with weak passwords more easily.

SQL Injection 101: How to Avoid Detection & Bypass Defenses

It is often said that the best hackers remain unknown, and the greatest attacks are left undiscovered, but it's hard for an up-and-coming penetration tester or white hat to learn anything unless one of those factors is actually known or discovered. But the end goal here in our SQL injection lessons is to make that statement as true as possible for us when performing our hacks.

How To: Use Keyboard Shortcuts to Type Out Emoticons Faster on Your iPhone

Sure, emojis are all the rage, but there's not an emoji for every emotion or feeling just yet. That's where emoticons come into play, emoji's older typographical sibling. Unfortunately, emoticons can be hard to type out, easy to forget, and ASCII art, in general, can be pretty time-consuming to create from scratch — but there's an easy way to forgo all these issues — make keyboard shortcuts.

How To: Save Your GarageBand Songs as Custom iPhone Ringtones & Alert Tones

When you make an awesome song or beat that you're proud of in GarageBand for iOS, one way to show it off is to turn it into a ringtone or alert tone for your iPhone. That way, anytime you get a phone call or a notification, your musical creation will sound off, and everyone around you will hear it in all its glory. Plus, it's way cheaper to make your tones than to buy them off of iTunes.

Exploit Development: How to Read & Write to a Program's Memory Using a Format String Vulnerability

Format strings are a handy way for programmers to whip up a string from several variables. They are designed to save the programmer time and allow their code to look much cleaner. Unbeknownst to some programmers, format strings can also be used by an attacker to compromise their entire program. In this guide, we are going to look at just how we can use a format string to exploit a running program.

How To: Write an XSS Cookie Stealer in JavaScript to Steal Passwords

JavaScript is one of the most common languages used on the web. It can automate and animate website components, manage website content, and carry out many other useful functions from within a webpage. The scripting language also has many functions which can be used for malicious purposes, including stealing a user's cookies containing passwords and other information.

How To: Take Control of the Mouse & Keyboard in Python

While hackers adore the command line, working with the GUI (graphical user interface) of an operating system has some advantages. This is especially true when it comes to post-exploitation. When we can control the mouse and keyboard of a remote computer, we can truly say we have complete control over the device. Today, I'm going to introduce to you the PyAutoGUI module, which does just that, and just how much fun you can have with it!

How To: Format WhatsApp Messages with Italic, Bold, Strikethrough, or Monospaced Text

Unless you're a WhatsApp pro user, you may be surprised to know that there are text formatting options that you can apply to your messages. Markdown characters can help you emphasize certain words or phrases by making them italicized or bold, and it'll even let you cross out words and change the font. It's one of those nice touches that isn't available in most other messaging apps.

Messages 101: How to Hide Alerts for Specific Conversation Threads

When somebody is in the middle of rapid firing you some text messages and they become too much for you to bear, you have a few options on your iPhone. You can simply leave the conversation, if it's an iMessage group chat with four or more participants, or you can put the whole message thread on silent, which applies to everyone, no matter if it's iMessage, SMS, MMS, or a group conversation.

News: Compound in a Frog's Defensive Slime May Treat Your Next Flu Infection

Our quest to find novel compounds in nature that we can use against human diseases —a process called bioprospecting — has led a research team to a small frog found in India. From the skin slime of the colorful Hydrophylax bahuvistara, researchers reported finding a peptide — a small piece of protein — that can destroy many strains of human flu and can even protect mice against the flu.