Turkish Code Search Results

How To: Learn to Code for Free with These Online Programming Lessons

While becoming the next Mark Zuckerberg may be out of reach for someone just getting introduced to code, the skill has never been more valuable. Just understanding basic programming language is a great thing to put on your resume, and if you know how to code, you’re golden. Software developers and programmers have been the most resistant to the recession, as jobs in the tech industry continue to grow.

How To: Use the Konami Code Easter egg on Google Docs

Google loves their little Konami Code Easter eggs. The Konami Code is famous among gamers for letting you cheat in video games. The latest one they come up with lets you try it out on Google Docs. All you have to do is open up Google Docs, and type in with the following keys: up, up, down, down, left, right, left, right, B, A, and then enter!

How To: Program state codes and route buttons in Adobe Flash Builder

In this clip, learn how to program state codes and route buttons in Adobe Flash Builder. Whether you're new to Adobe's popular Flash IDE (previously titled Adobe Flex Builder) or simply wish to become better acquainted with the program, you're sure to find benefit in this free video software tutorial. For more information, including specific, step-by-step instructions, take a look.

How To: Find the hidden error code behind your Xbox 360's RLoD

It goes by many names. The RLoD (Red Lights of Death), the RRoD (Red Ring of Death), absolute disaster. Whatever you call it, the XBox 360 error that causes many console's front LED's to turn red in rage and cessation of function has caused all sorts of headaches for consumers and Microsoft. It can be caused by a couple of different cooling-related issues, and determining the error code that has caused your console to malfunction can go a long way to helping you fix it. This video will show y...

How To: Find and use VBA code in Microsoft Excel

Whether you're interested in learning Microsoft Excel from the bottom up or just looking to pick up a few tips and tricks, you've come to the right place. In this tutorial from everyone's favorite digital spreadsheet guru, ExcelIsFun, the 54th installment in his "Highline Excel Class" series of free video Excel lessons, you'll learn how to find, download and use VBA code in your MS Excel projects.

How To: Install a web page comment box using Dreamweaver CS4

This Dreamweaver CS4 tutorial takes you on a step by step process for installing an automated comment box system for your website. The system is a great way for communicating and interacting with your website users. It has a great feature that automatically sends you an email everytime someone comments in your website. Also it will allow you to post a reply by email.

How To: Completely hide the Ribbon menu in Excel

The instructor of this video shows you how to completely hide the ribbon, or the menu, in Excel. If you only want to partially hide the ribbon, you can use the shortcut control + F1. To completely hide the ribbon, though, go to the Visual Basic screen, hit Alt + F11. Then, go to insert, then module, and type in the macro "sub (Your name for macro)" then hit enter, then type in the code "application.executeExcel4macro''show.toolbar(""Ribbon"", false)''". To set up the code to show the ribbon a...

How To: Alter text on MySpace using HTML codes

In this Computers & Programming video tutorial you will learn how to alter text on MySpace using HTML codes. Here are a few basic html codes used to change the look of text on your profile or in a bulletin. <b> for starting bold text and </b> for ending bold text. <i> this text will be italicized</i>. For underlining text use the code <u> </u>. <b><i><u> This text will be bold, italicized and underlined </b></i></u>. To change color of your text to ‘red’ use the code <font color=”red”> </font...

How To: Build a jet band in Second Life

Mike Lively of Northern Kentucky University demonstrates how to build a jet band using Jeff Heaton's jet pack code. What is a jet band? Well, it's like a jet pack but smaller and allows you to go higher than 200 meters when flying in Second Life. Part one shows you how to create the code for the jet band. In part 2, the code is modified to remove the altitude reading below 70 meters.

How To: Read trouble codes in your automobile

You may have seen a "check engine" sign on your car's dashboard when driving your vehicle. Maybe "service engine soon," or just "check". What does this mean if the alarm won't turn off, or comes on when you're driving? Find out in this automotive video tutorial how to read those trouble codes on your automobile.

How To: Get Started with MicroPython for ESP8266 Microcontrollers

For anyone interested in using cheap, Wi-Fi-connected microcontrollers like the ESP8266, the Arduino programming language can be a barrier to entry. Based on C++, Arduino requires knowledge of more computer science than languages like Python. Fortunately for beginners, setting up MicroPython on an ESP8266 allows anyone to write Python on affordable microcontrollers in a matter of minutes.

How To: Identify Missing Windows Patches for Easier Exploitation

No operating system is stricken with as many vulnerabilities as Windows, and it's often a race to release the latest patches to fix things. From an attacker's point of view, knowing which patches are present on a Windows machine can make or break successful exploitation. Today, we will be covering three methods of patch enumeration, using Metasploit, WMIC, and Windows Exploit Suggester.

How To: Use LinEnum to Identify Potential Privilege Escalation Vectors

The art of privilege escalation is a skill that any competent hacker should possess. It's an entire field unto itself, and while it's good to know how to perform the techniques involved manually, it's often more efficient to have a script automate the process. LinEnum is one such script that can be incredibly useful for privilege escalation on Linux systems.

How To: Use Metasploit's Timestomp to Modify File Attributes & Avoid Detection

It is said that the best way to avoid detection when hacking is to leave no trace, and often that means not touching the filesystem at all. But realistically, in most cases, it's impossible not to interact with the filesystem in one way or another. The next best thing to do to throw off any investigators is to change the file attributes to hide activity. We can do this with Metasploit's Timestomp.

How To: Advanced Techniques to Bypass & Defeat XSS Filters, Part 2

Cross-site scripting can be one of the easiest vulnerabilities to discover, but to be successful with this type of attack, it is essential to learn how to get past filters. In the previous guide, we explored some ways to do this, such as abusing attributes and event handlers and tricking the application into accepting unusual characters. Now, let's take a look at more techniques used to defeat filters.