Submit Application Search Results

How To: Turn a human into a statue in Photoshop

Have you ever wanted to build a statue of the one you love to show them how much they mean to you? Well, I'm guessing your no stone sculptor so you'll have to resort to the powers of Photoshop. In this tutorial, learn how to turn any human or person in a photo into a statue in the application, Photoshop.

How To: Install awning mounts onto Thule's load bars

Learn how to install a ladder rack awning onto Thule's professional load bars as well as their other lines of load bars. One technical note here, this awning is specified for three load bars, instead of the two shown in this video. Chances are this will be used on a van as opposed to a pickup truck bed but everything still applies to that application.

How To: Get music off an iPod and onto a Mac

Want to learn the easiest way to get music off an iPod and onto a Mac? A Webb from howdoimac.com recommends using iPodDisk, a great little application that mounts your iPod as a hard drive. Your simply drag your music off the drive onto your computer and into iTunes!

How To: Install PSP custom firmware 3.03 OE-C

Installing custom firmware on your PSP allows you to run outside and homebrew applications, run games directly from your PSP, and burned games on your PSP. Note that you need to have PSP firmware version 1.5 to install this otherwise you will have to downgrade.

How To: Use Metasploit's WMAP Module to Scan Web Applications for Common Vulnerabilities

Having an efficient workflow is an integral part of any craft, but it's especially important when it comes to probing apps for vulnerabilities. While Metasploit is considered the de facto standard when it comes to exploitation, it also contains modules for other activities, such as scanning. Case in point, WMAP, a web application scanner available for use from within the Metasploit framework.

Hacking macOS: How to Steal Signal Conversations from a MacBook with a USB Rubber Ducky

Developed by Open Whisper Systems, Signal is a free, open-source encrypted communications app for both mobile and desktop devices that allows users to make voice calls, send instant messages, and even make video calls securely. However, a vulnerability was recently discovered for the desktop version that can be turned into a USB Rubber Ducky payload to steal signal messages with a single click.