Submitting Software Search Results

How To: Model a simple 3D chair in Houdini

Interested in making a chair within Houdini? Pull one up and see how it's done. Whether you're new to Side Effects Software's popular 3D production program or a seasoned graphic artist just interested in better acquainting yourself with the application, you're sure to be well served by this free video tutorial. For more information, including detailed instructions, take a look.

How To: Create 3D, glossy text in Adobe Photoshop CS$

Want to create full 3D text but don't have fancy 3D modeling software? Never fear. With Adobe Photoshop CS5, it's easy to generate 3D, glossy header text. Whether you're new to Adobe's popular graphics editor or a seasoned design professional looking to get better acquainted with the industry-standard app, you're sure to benefit from this free software tutorial. For more information, watch this designer's guide.

How To: Install Windows XP on a Vista machine using freeware

You might have difficulty installing Windows XP on a computer that has Windows Vista because it will say it’s incompatible. You’ll have to make a cd with an extracting software. You’ll need several more programs and software. It’ll take some effort but if you follow along this video you should be able to achieve the goal.

How To: Use the Motorola Droid software

This video gives a tour of the Motorola Droid software. The video begins with the user turning on the cell phone and guides you through navigating the gui (graphic user interface). The easy to use Youtube desktop widget is featured as well as the scrolling desktop that's moved by a flick of the finger tip in either a left to right or right to left direction.

How To: Avoid computer viruses

At least with a stomach virus you may drop a few pounds; a virtual virus just screws up your computer. Take these precautions to avoid problems. You will need anti-virus software, spyware, a firewall, and a healthy dose of skepticism. You can find free safety software on the internet.

How To: Crop, resize and retouch images in IrFanView

This software tutorial takes a look at some of the editing capabilities inside of the freeware image viewing application IrfanView. Learn how to use IrfanView to crop, resize and retouch images. If you can't get your hands on Photoshop or a professional image editing software, download and try IrfanView for your basic editing needs.

How To: Use Sizer v3.3 for screen recordings

This software tutorial is on downloading and using Sizer to resize windows for exact screen grabs. Sizer is a free open source software that allows you to size a window to an exact numeric size instead of dragging the window around randomly. This is great for screen recordings with softwares like Camtasia, or for image screen grabs. See how to download and use Sizer in this tutorial.

How To: Clone in Wax 2.0

This software tutorial shows you how to use the video editing software Wax 2.0 to clone someone in a video. Learn to make multiple versions of yourself interact in one video in this Wax 2.0 cloning tutorial.

How To: Make a Guitar Hero clone

Everyone and their moms are into Guitar Hero nowadays. If you can't afford this great game, check out this tutorial and learn how to create your own Guitar Hero clone using free software and a controller that you can make using parts that total around $22. The free software used in this instructional video is called Frets on Fire.

How To: Manually kern type in Inkscape

If you do any amount of graphic design or layout design, then you know the importance of using kerning when working with typeface. This Inkscape software tutorial shows you how to manually kern text within Inkscape. This isn't the best graphic design software, but it is open source and if you are using it for layout you may need to use text kerning and will find this video helpful.

How To: Remote control a PC

Are you the go-to guy/girl whenever your friends and family need tech support? You might want to consider installng LogMeIn - remote desktop software. The Lab Rats, Andy Walker and Sean Carruthers, will show you the benefits of LogmeIn software.

How To: Permanently Disable the 'Software Update' Notification on Your Samsung Galaxy — No Root Needed

Updating your Galaxy to the latest software version is optional, but you wouldn't know that from the persistent notification and status bar icon that are constantly reminding you to. Thankfully, you're just an app away from hiding these eyesores without the need to update your phone.

How To: Use This Trick to Unlock Hidden Software Update Options on Your iPhone

The automatic software update setting on your iPhone is nice, but you may not always want to install new iOS versions blindly. New updates could contain bugs and vulnerabilities, and your favorite features may even disappear. With the auto-update option turned off, you can manually download and install updates, but there are also hidden options to be more specific about how you want to do it.

News: HoloLens Assists in Live Surgery

Numerous examples exist of doctors and surgeons using HoloLens to plan surgeries. The device has even been used to view reference images during a procedure and stream it to a remote audience. Until recently, it has not been used to augment the surgeon's view of the patient during a live surgery.

News: Hello to the Null Byte Community!

Hello, Null Byters. I'm Barrow, and I'm excited to introduce myself as the new admin here on Null Byte. Just like previous admins have done before me, I will be writing new guides, updating older guides if they need it, and responding to some of your issues in the forum. Before I get started with any of that, though, I wanted to talk a little bit about myself and the future of Null Byte.

Hack Like a Pro: How to Change the Signature of Metasploit Payloads to Evade Antivirus Detection

Welcome back, my budding hackers! I've written several listener guides on creating a malicious PDF or malicious Word document that would carry in it a payload with the Meterpreter, or reverse shell enabling you to own the system. One of the hurdles to using these techniques is the antivirus (AV) software on the target system. For instance, if you try to email a malicious PDF or Word doc, it's likely that the victim system will alert the victim that it contains a virus or other malware.