Test Recognizing Search Results

How To: Determine your VO2 maximum

Backpacker magazine associate editors Jason Stevenson and Shannon Davis demonstrate how to estimate your VO2 Max in this April 2007 SkillsCast. Find out how a simple running test can determine your VO2 Max, and why raising your score can make you a better backpacker, increase your endurance and fitness level.

How To: Prevent blisters on the trail

Backpacker editor-in-chief Jon Dorn explains 5 field-tested techniques for eliminating the three main causes of blisters: heat, moisture, and friction. Learn more from Backpacker's Gear School in the March 2007 Gear Guide, and at www.backpacker.com/video.

How To: Ingest vitamin D and minerals to fight MS

It is argued that sun exposure and warm weather helps people cope with and fight multiple sclerosis. Sun is important to produce vitamin D. There are arguments that vitamin D deficiency is connected with cases of multiple sclerosis. Get a blood test to make sure your vitamin levels are optimum and you are suffering from no mineral or vitamin toxicity.

How To: Use an oscilloscope

Oscilloscopes visualize electronic signals. This information can be useful for tests, debugging, and reverse engineering. If you work with electronic circuitry, being able to use an oscilloscope is a must have skill. Here Bre Pettis and Make Magazine hook you up with great tips.

How To: Audit Web Applications & Servers with Tishna

Penetration-testing frameworks can be incredibly useful since they often streamline certain processes and save time by having a lot of tools available in one place. Of course, the most popular pentesting framework is undoubtedly Metasploit, but there are many others out there that cater to particular needs. For auditing web applications and servers, Tishna comes in handy.

How To: Check Your MacOS Computer for Malware & Keyloggers

While you might suspect your MacOS computer has been infected with malware, it can be difficult to know for sure. One way to spot malicious programs is to look for suspicious behavior — like programs listening in on our keyboard input or launching themselves every time we boot. Thanks to free MacOS tools called ReiKey and KnockKnock, we can detect suspicious programs to discover keyloggers and other persistent malware lurking on our system.

Coming Soon: Share Instagram Comments in Direct Messages, Stories, or Other Apps

Sometimes, you'll see a comment on Instagram that you really need to share. Maybe it's something funny, possibly offensive. Whatever the case, the only thing to do is screenshot it and share that, right? Hopefully, not for long. Instagram is currently testing a feature that would allow you to share comments with others via a direct message and maybe even to stories and other apps.

News: Officials Shocked to Find West Nile in Las Vegas Mosquitoes

Las Vegas is known as the city of sin, a place for gambling, fine dining, and decadence. Now, you can add another notable characteristic to that list: West Nile. You may want to hold off on scheduling your trip to the Sin City — or at least stock up on bug spray — because health officials have reported that mosquitoes in Southern Nevada have tested positive for the virus.

News: The Latest in HIV Prevention — Syringe Vending Machines in Vegas & On-Site Testing at Walgreens

It's about time people acknowledged that judging drug users would do nothing productive to help them. In the US this week, two new programs are launching that should help addicts be a little safer: Walgreens Healthcare Clinic will begin offering to test for HIV and hepatitis C next week, and Las Vegas is set to introduce clean syringe vending machines to stop infections from dirty needles.

How To: Build a Directory Brute Forcing Tool in Python

While attempting to hack a web app, there may come a point where the attacker may have to escape the default directory in order to access unauthorized files. This is known as a directory traversal attack. Much as the name implies, this attack involved traversing the servers directories. But in order to move to an unauthorized directory, we need to know where those directories are. Today we'll be building a tool to brute force these directory locations based on HTTP response codes. Before we g...