Type Daftar Search Results

How To: Use automatic lens correction in Adobe Photoshop CS5

Whether you're new to Adobe Photoshop or a seasoned graphic design professional after a general overview of CS5's most vital new features, you're sure to be well served by this official video tutorial from the folks at Adobe TV. In it, you'll learn how to automatically correct lens distortions and fix chromatic aberration and vignetting with Photoshop CS5 and Photoshop CS5 Extended, which use an image file’s EXIF data to make precise adjustments based on the type of camera and lens you used.

How To: Free up hard drive space using WinDirStat

Stan shows an easy way to see and clean the files that are hogging hard drive space in the computer using a free software called "windirtstat". Now enter the following address in the web browser "windirtstat.info" and scroll down the page until you get the downloading and installing section. Click on the link "windirtstat1.1.2Setup(Ansi&Unicode)" which will be right after the "for all flavors of windows" this will direct you to "SOURCEFORGE.NET" download creations. This will ask you to save t...

How To: Create a big to small text animation in Flash

A great free video training from tasktutorial on how to create a cool movie text effect in Flash. Start by creating the text; type in "cool", rename the layer and lock it. Now type "movie" and rename the layer. Type in "effect" and rename this layer as well. Now focus on the first layer. Convert it to movie clip. Now convert the other two layers to movie clips as well. Stack the three layers on top of each other. Next add a key frame starting from frame 10. Select the "cool" layer. Re-size it...

How To: Transform a photo into a flashy poster in Photoshop

Pixel Perfect is the "perfect" show to help you with your Photoshop skills. Be amazed and learn as master digital artist Bert Monroy takes a stylus and a digital pad and treats it as Monet and Picasso do with oil and canvas. Learn the tips and tricks you need to whip those digital pictures into shape with Adobe Photoshop and Illustrator. In this episode, Ben shows you how to transform a photo into a flashy poster in Photoshop.

How To: Shuck an oyster

The pros at the raw bar make it look easy, but it’s all about technique—specifically, the precision placement and leverage of your oyster knife. You will need: fresh oysters, any type, lots of ice, a small brush, an oyster knife, a cutting board, a towel, a wide shallow bowl or platter, lemon wedges, oyster glove and cocktail sauce. Tip: When you are rinsing the oysters, throw out any that are slightly open and don't spring closed at your touch.

How To: Use iTunes, Audacity and Podomatic to create podcasts

This tutorial on the companion Tech Ease for Mac site explains what podcasting is and shows you how to subscribe to podcasts using iTunes, a free program from Apple. Since iTunes is cross-platform, the steps shown in the movie will work on Windows as well. This movie defines podcasting, shows you the different types of podcasts you can create, and how to subscribe to podcasts using iTunes.

How To: Set up butterfly lighting for photography

Mark Wallace explains how to set up butterfly lighting (AKA Glamour Lighting; AKA Paramount Lighting)with three light sources. This video shows a nice soft lighting underneath the nose. Used if you want to create a strong powerful look, or if your subject has strong cheekbones or jawline. This type of lighting was used in the filming of "Sin City".

How To: Free your iPod with Rockbox

This how-to video will help you expand your iPod library. Rockbox turns your iPod into a FLAC- and OGG-playing, open-source monster. Learn how to install this custom firmware on your iPod to enable it to play all sorts of audio file types and even games. Watch this video tutorial and learn how to free your iPod with Rockbox.

How To: Do 3-2-1 interval training

Selene Yeager takes you through an interval cycling workout called 3-2-1 for hill surges. The format of the workout is to do repeated hard short bursts with increasing intensity. This type of workout will help when you're biking up hills or trying to overcome your limits.

How To: Do charcoal drawing

In this series of videos you'll learn how to draw with charcoal from a professional artist. Expert William Cotterell shows you what types of art supplies you'll need to get started, including various types of charcoal, compressed and pencil varieties, types of erasers that work best with charcoal, and the best types of paper for making charcoal drawings. He also shares tips for choosing a subject, understanding light, blending techniques, adding highlights, and using Fixatif to protect your w...

How To: There's a New Simple Swipe to Undo Typing on Your iPhone

Remember when typing without physical keys seemed ridiculous? Now, touch typing is the smartphone norm. That said, mistakes are inevitable on small screens. So before you start hammering on that delete key or shaking your iPhone like a madman, know that there's a better way to undo text you didn't mean to type — no shaking involved.

How To: Exploit Java Remote Method Invocation to Get Root

In the world of technology, there's often a trade-off between convenience and security. The Java Remote Method Invocation is a system where that trade-off is all too real. The ability for a program written in Java to communicate with another program remotely can greatly extend the usability of an app, but it can also open up critical vulnerabilities that allow it to be compromised by an attacker.

Instagram 101: How to Add #Hashtags & @Account Tags to Your Bio

Your Instagram bio could always be used to link to other websites or profiles or just to show off your witty personality. Now, you also have the ability to use this section to tag other Instagram accounts as well as add tappable hashtags. Whether you want to link out to your best friend, company, or the latest trend in your city — if it has a profile name or tag, it can be in your bio.

How To: Linux Basics for the Aspiring Hacker: Using Ship for Quick & Handy IP Address Information

Whether you're white hat, black hat, or some shade in-between, navigating through a network is a core part of hacking. To do that, we need to be able to explore a network to discover the addresses of gateways, interfaces, and other attached devices. When ifconfig just isn't enough, you can steer your way around a network with a convenient tool called Ship, the script for everything IP.

News: Why the iPhone X Needs a $25 USB Type-C Cable to Fast Charge

After learning that you'll need to spend at least $74 on a special charger and a USB Type-C Lightning cable to enable fast charging on the new iPhone X and iPhone 8 models, you may be wondering why you can't just use the standard Lightning cable. While we can't answer why Apple didn't include the USB-C cable in the box with their new phones, we can explain why you need USB-C to enable fast charging.

Instagram 101: Take Your Hashtag Game to the Next Level with Focalmark

Typing out thirty hashtags on Instagram is always such an annoying process. Figuring out the best hashtags to use to get more likes is also tricky. You can't just keep copying and pasting the same hashtags on every post — that's like attacking the same tribe every time. You got to diversify, which takes a lot of conscious effort to be on top of the current best hashtags to use.

How To: Disable Read Receipts & Send Fake Camera Pictures on Kik Messenger

Kik is an extremely popular messaging app, but it has a few annoying features that we all just sort of put up with. You can't turn off read receipts, nor can you hide when you're typing, and the photos you take with Kik's camera show up differently than ones you send from your gallery app. At least a couple of these features should be subject to change, but they aren't — well, not without some tinkering.

How To: Hide a Virus Inside of a Fake Picture

In my last tutorial, I talked about creating a virus inside of a Word Document in the scenario of a mass-mailer attack. In this post, however, I'm going to be covering creating a fake image or screenshot with a meterpreter backdoor hidden inside to be used in a similar scenario. Step 1: Creating the Virus