Submit Application Search Results

How To: Use proportions to solve application problems

In this video they are showing how to use proportions to solve word problems. In the first example they used 2/3 is equal to x/6. To solve for x, you begin by cross multiplying setting up and equation 3x=12. Next, divide 12 by 3 which equals 4. So x equals 4. In the next example, she has given a situation where she is making a ranch dip using a ranch powder and sour cream. She want to use 80oz of sour cream and she wants to know how much powder ranch she will need. She know that for 16oz of s...

How To: Drive a manual car

This is a presentation from WatchMojo detailing the operation of a manual/standard automobile. Explanation includes the placement of pedals listed from left to right as the clutch, the brake, and the gas. There is also an explanation on the gearshift which includes a diagram of where gears are located. Explanation for the beginning of driving includes instructions as follows; ensuring that the ground is flat, the application of the parking brake, the process of depressing the clutch, placing ...

How To: Do the Horse Stable glitch in FarmVille (03/09/10)

This is a recent glitch, similar to the chicken coop glitch, where you can make your horse stable completely ready. Just watch this brief video tip to see how to benefit from the Horse Stable glitch in FarmVille (03/09/10). It's a simple glitch in the game that allows you to use a horse that is unready to make a stable 100% ready and be able to collect from it. This is very helpful when you are trying to achieve the HorsePower ribbon on Farmville.

How To: Stack crops in FarmVille (02/16/10)

This is an easy glitch in FarmVille that's been around for a long time. Stacking crops. If you want to learn how to stack your crops in FarmVille, just watch this video tip on how to do it (02/16/10). This glitch allows you to grow many more crops than usual, using your limited space on your farm to maximize the most crops in the least amount of space. By doing this glitch, you can easily achieve mastery for all crops in a quicker time frame.

How To: Handle a PC freeze

If you work with a computer, at some point in time your computer is going to freeze. Hopefully, you've been saving any important data or writing you've been doing because there are a few easy steps to take to get that computer running smoothly.

How To: Shop the App Store on the Apple iPhone 3G

Right out of the box, iPhone is incredibly easy to use. If you want to get the most out of every feature, you’ve come to the right place. This video tutorial straight from Apple will teach you how to shop the App Store on the Apple iPhone 3G. The iPhone redefines what a mobile phone can do.

How To: Clean and polish a headlight using Autosol Polish

Watch this video tutorial from the Polish Guy to see how to clean and polish a headlight using Autosol Polish. In this polishing tip we clean a headlight from a Ford F150 using Autosol metal polish. The video includes polishing instructions for cleaning a car or truck headlight by hand as well as using a drill with a buffing wheel.

How To: Hack a remote Internet browser with XSS Shell

XSS Shell is a cross-site scripting backdoor into the victim's browser which enables an attacker to issue commands and receive responses. During a normal XSS attack an attacker only has one chance to control a victim's browser; however, the XSS Shell keeps the connection between the attacker and the victim open to allow the attacker to continuously manipulate the victim's browser. XSS Shell works by setting up an XSS Channel, an AJAX application embedded into the victim's browser, that can ob...

How To: Create podcasts in Audacity

Learn how to use Audacity, a free audio editing application that can be used to record music, podcasts, and more. You will learn how to install the LAME Encoder, set your preferences, save the project, record, preview your recordings, edit content, remove noise, adjust volume, time shift, and exporting. Each of these is an important part of the podcast creation process and you will learn to do it all in this Audacity video series.

How To: Create a movie or podcast in Windows Movie Maker

Windows Movie Maker is the basic video application included with Windows XP. Learn how to use Windows Movie Maker to create a movie with transitions, effects, background music, and voice over narration. If you have never made a podcast or simple movie before, this series is a great way to get started without needing additional software if you have a Windows XP OS.

How To: Identify Web Application Firewalls with Wafw00f & Nmap

Web application firewalls are one of the strongest defenses a web app has, but they can be vulnerable if the firewall version used is known to an attacker. Understanding which firewall a target is using can be the first step to a hacker discovering how to get past it — and what defenses are in place on a target. And the tools Wafw00f and Nmap make fingerprinting firewalls easy.

News: Apple's iOS 12.4.1 for iPhone Fixes Jailbreak Vulnerability, 12.4.2 Patches Other Security Issue

While all eyes might be on the next beta release for iOS 13, Apple is still pumping out updates for iOS 12. The company released iOS 12.4.1, the first update since iOS 12.4, on Aug. 26. The latest update includes a patch for the jailbreak vulnerability recently discovered in 12.4. One month later, on Sept. 26, iOS 12.4.2 came out for older iPhone models.

How To: Beat LFI Restrictions with Advanced Techniques

One of the most common web application vulnerabilities is LFI, which allows unauthorized access to sensitive files on the server. Such a common weakness is often safeguarded against, and low-hanging fruit can be defended quite easily. But there are always creative ways to get around these defenses, and we'll be looking at two methods to beat the system and successfully pull off LFI.

How To: Advanced Techniques to Bypass & Defeat XSS Filters, Part 1

There is no shortage of defenses against cross-site scripting (XSS) since it is so prevalent on the web today. Filters are one of the most common implementations used to prevent this type of attack, usually configured as a blacklist of known bad expressions or based on regex evaluation. But there is hope with a wide variety of techniques that can be used to defeat these filters.

SQL Injection 101: How to Avoid Detection & Bypass Defenses

It is often said that the best hackers remain unknown, and the greatest attacks are left undiscovered, but it's hard for an up-and-coming penetration tester or white hat to learn anything unless one of those factors is actually known or discovered. But the end goal here in our SQL injection lessons is to make that statement as true as possible for us when performing our hacks.