Ultimately Spread Search Results

How To: Get Along with Coworkers Without Saying a Word

Sooner or later, you're going to come across a person at work that you don't like—or someone that doesn't like you. This can result in uncomfortable tension, insulting gossip, and a disrespectful attitude, to name just a few of the negatives. But it doesn't have to be that way. The next time you're having a workplace conflict with a particularly challenging coworker, the best thing you can do is keep your mouth shut, and here's how to do it.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 3 (Recovering Deleted Files)

Welcome back, my tenderfoot hackers! I recently began a new series on digital forensics to help tenderfoot hackers from being detected and ultimately, incarcerated. In this installment of that series, we will look at recovering deleted files. This is important to hackers because you need to know that even when you delete files on your computer or on the victim's computer, a forensic investigator can usually recover them.

Hack Like a Pro: Scripting for the Aspiring Hacker, Part 2 (Conditional Statements)

Welcome back, my greenhorn hackers! I recently began a series on scripting and have received such positive feedback that I'm going to keep this series going. As I've said before, to graduate from the script kiddie to the pro hacker, you'll need to have some scripting skills. The better you are at scripting, the more advanced your hacking. Ultimately, we are leading up to developing the skills to build your own zero day exploits.

How To: Use Traffic Analysis to Defeat TOR

As was mentioned by the great OTW last week, TOR, aka The Onion Router, has had its integrity attacked by the NSA. In an attempt to reduce the anonymity granted by the service, the NSA has opened a great many nodes of their own. The purpose is presumably to trace the origin of a communication by compromising some entrance and exit nodes. Once both are compromised, it is much easier to correlate traffic with a particular individual.

How To: Clean a penny with hot sauce

In this video, 305 Nicky shows the viewers how to clean up a penny by using Tabasco sauce. You will need a piece of sturdy paper towel, Tabasco sauce, and an old penny. Next, fold the paper towel into fourths and put the penny on top of the paper towel. Open the Tabasco sauce and put 4 or 5 drops onto the dirty penny. Make sure the penny is evenly coated by spreading it with your index finger. Wait for about 10 to 20 minutes after applying the sauce and using the paper towel, beginning to rub...

How To: Fold a traditional fitted sheet

This video demonstrates how to fold a fitted bed sheet neatly. For this, first spread the bed sheet on a flat surface like a bed. The outside of the bed sheet should be facing down and the inside should be facing up. Make sure all the corners are visible. First take the right corner over your hand like a puppet with the inside facing out. Then take the left corner over your hand in the same manner with the inside facing down. Repeat the same with the other two corners of the bed sheet. Once y...

How To: Clean antique porcelain and pottery

Show your antique porcelain and pottery a little TLC. Spruce up your favorite antiques with these safe cleaning techniques. Remove the dirt and let the beauty of porcelain and history shine through. Just because your pottery is old, doesn’t mean in needs to look like it came out of a tomb.

NR30: Next Reality's 30 People to Watch in Augmented Reality in 2018

Welcome to the first annual Next Reality 30, our list of people who've made the biggest impact on the augmented reality space in the last 12 months — and what a 12-month roller-coaster ride it's been. Apple introduced ARKit-powered apps last fall, Google launched ARCore for Android soon after, Snapchat began monetizing AR, and the Magic Leap One headset finally came out. These are historic times.

How To: Exploit DDE in Microsoft Office & Defend Against DDE-Based Attacks

In our previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when an MS Word document is opened. Because Microsoft built DDE into all of its Office products as a way to transfer data one time or continuously between applications, we can do the same thing in Excel to create a spreadsheet that runs malicious code when opened. The best part is, it will do so without requiring macros to be enabled.

How To: Do the probability card trick

First of all you need two different types of playing cards. You can take the blue and the red color cards. Spread these cards on the table facing downwards. Now mix them together randomly. Again mix them as thoroughly as you can on the table. Now pick out a red color card of your choice from anywhere on the table. Now again mix the cards thoroughly on the table. Now pick up any blue card of your choice anywhere from the table. Now ask the audience “what probability is that of picking the sa...

How To: Grow your own grass with Roger L Davis

If you want to grow your own grass you should first get some hard winter wheat berry or grass seeds to begin to grow. You should sprout your seeds by measuring out 1 pound of seed that will be grown in a 17 x 17 inch tray. Fill a jar with a mixture of water and a solution for ocean minerals and 1 lbs of grass seeds and let them sprout. This will expand in the jar. This should take about 12 hours. Now, drain the water from the seeds, let this dry for 6 -8 hours, rinse the seed. Now, put half a...

How To: Make a Mother's Day hat cake

You have your gift and a card and now all you need that special cake for mom on Mother’s Day. You’ve tried other cakes now try a hat cake. This festive and spring inspired hat cake is sure to make this year’s Mother’s Day a memorable one.