Underlying Search Results

How To: Introduction to Modern Cryptography

Cryptography is the science of keeping secrets, or more specifically, the science of disguising them. As a point of fact, cryptography has progressed quite a bit farther and now encompasses file and message integrity, sender authentication, and pseudo-random number generators.

How To: Program a $6 NodeMCU to Detect Wi-Fi Jamming Attacks in the Arduino IDE

Hackers and makers are often grouped under the same label. While hackers draw on computer science skills to write programs and find bugs, makers use electrical engineering to create hardware prototypes from microprocessor boards like the Arduino. We'll exercise both sets of skills to program a $6 NodeMCU to display the status of a Wi-Fi link via an LED, allowing us to monitor for jamming attacks.

How To: Uninstall Bloatware Without Root or a PC Using Android's New 'Wireless Debugging' Feature

Bloatware is a problem on Android, and it's not just a Samsung thing. Removing apps that have the Uninstall or Disable button grayed out in Settings has always involved sending ADB commands to your phone from a computer, which itself was always such a pain to set up. Thankfully, that has finally changed.

How To: The 5 Best Phones for Streaming Videos from Netflix, Hulu, YouTube & Amazon Prime

For many, phones are starting to replace televisions as the primary device for watching videos. Thanks to their portability and easy to use apps, it's often simpler to watch Netflix, Hulu, YouTube, or Prime Instant Video on the smaller screen. But not every phone is suited to fit this need, so we did some testing to find the best of the best when it comes to streaming videos.

How To: Use GoScan to Quickly Enumerate Networks & Services

Network enumeration is one of the essential phases of an attack, but it can take a lot of time and effort depending on the size. We've all been spoiled by Nmap and similar tools, and while there is a learning curve involved, they are extremely useful. But there's also GoScan, a tool that builds upon Nmap, offering an automated way to enumerate networks and services quickly.

News: Apple Watch vs. Fitbit — What's the Best Bang for Your Buck?

In the case of Apple Watch v. Fitbit, the winner comes down to the judge at hand. Apple currently offers two smartwatches — the Series 5 and the Series 3 — while Fitbit offers three models — the Fitbit Versa 2, Fitbit Ionic, and Fitbit Versa Lite. Whatever your assumptions about these devices are, throw them out the window, as each has something unique to bring to the table.

How To: Replace the front crankshaft oil seal

In this video demonstration you will see the work done on a GM 3.1 Liter V6; your instructor is replacing the cam cover seal. First raise the car into the air, remove the tire wheel assembly and place a jack stand underneath the car or vehicle on the side where you have removed the tire wheel assembly. Now remove the serpentine belt from the engine by using a 3/8ths breaker bar. Place it on the tensioner and lift up while removing the belt from the alternator. Keep lifting the belt out from t...

How To: Get aloe from a plant

If you’ve got a minor cut or nasty sunburn you may reach for the aloe vera for the soothing and healing qualities. You don’t have to buy aloe, it is easy to extract the aloe from the inside of the leaf of a living aloe vera plant.

How To: Thread with soft flex wire for jewelry

Though jewelry making can be meticulous and dependent on dexterity, using the right wire makes the whole process easier and faster. Wire necklaces and bracelets are simple when using the soft flexible wire, or soft flex. This demonstration video will help walk you through the process of this threading with soft flex.

How To: Draw a basic horse

Watch this how-to draw a horse video for a walk through of this horse drawing. To begin with you want to start to define the major areas of the head like the nose, mouth ears and eyes of the horse along with the general shape of the head. At this stage keep your lines loose and light so that if you make any mistakes they will be easy to erase later.

How To: Make A Whistle From A Sycamore Twig

I will show you how to make a loud whistle from a twig from a sycamore tree. In fact they are so loud that they could be used in an emergency situation to attract attention from potential rescuers. The international distress signal is 6 whistle blasts in quick succession.

Camera Phone Photo Challenge: 33 Worcester Boulevard

Over the past 10 months the once peaceful city of Christchurch in the South Island of New Zealand has been haunted by a plethora of devastating earthquakes with hundreds of fatalities. To date there have been over 7000 earthquakes. This photo was taken on Worcester Boulevard, opposite the Christchurch Arts Centre. It was a dull, cold day, so I used a monochrome 'film' which captured the sombre mood of a mourning city; this was coupled with underlying parallelisms of an angled shot emulating t...

News: KitKat Rolling Out for the Samsung Galaxy Note 3

Rolling out right now are the latest KitKat updates to both the Exynos (SM-N900) and Snapdragon (SM-N9005) variants of the Galaxy Note 3. These over-the-air (OTA) updates will be staged out, beginning with networks in India, South Korea, and Switzerland. As reported by @lalithbhaskar, and confirmed by Sammobile, the latest update brings Android 4.4.2 to Samsung's current flagship device. If you reside in one of the mentioned regions, you can force a manual check by going to Settings -> About ...

News: Hammer and Chisel, Fo Shizzel! Engraving on Wood Like a Photoshop Pimp

Everyone's been in the following situation. You're sitting there at a nice bar, chatting up a smoking hot member of the opposite sex when all of a sudden they drop this bomb: "Can you engrave on wood in Photoshop?" The next thing you know, the night spirals into blackness and you wake up in a puddle of your own tears with some half-eaten beef jerky hanging out of your mouth.

IPsec Tools of the Trade: Don't Bring a Knife to a Gunfight

Pull up outside any construction site and you'll see tools scattered about—hammers, jigsaws, nail guns, hydraulic pipe benders—these are the tools of the trade. You would be hard-pressed to build a home or office building with just your hands! On that same page, security professionals also have their own go-to tools that they use on the job site, only their job site is your server.

News: Basic Math Operations

It was brought up a while back in a Community Call to Arms that *math* is handy for encryption (and let's face it, everything) so let us go over things you just have to know. "In its simplest meaning in mathematics and logic, an operation is an action or procedure which produces a new value from one or more input values."[source]

How To: MARK BURNETT on How to Become the Biggest Producer in Prime Time Television

Mark Burnett is, financially speaking, perhaps the most successful television producer today. While I had launched America's Most Wanted and COPS a decade earlier, Mark exploded onto network television with Survivor, the glossy and fantastical innovation to reality television. With Survivor now entering its 11th year, I recently interviewed Mark at the Los Angeles public radio station KCRW, where the podcast will be made available. Below, Mark's 10 steps from soldier-to-nanny-to-premiere-Holl...

Next Page