Understand Search Results

How To: Prune hydrangea plants

Hydrangea is a garden favorite. It has lovely blooms and can become a good sized plant. Many ask when should it be pruned or cut back. A good rule of thumb is to understand that Hydrangeas bloom on old wood. As soon as the flowers are spent, as soon as they start to turn brown it is a good idea to prune. This allows a maximum time for the branch to grow, set new wood which will then turn into old wood and produce more flowers.

How To: Make a candy corn with tissue paper

For preschoolers a great art and science activity! Lot's of small motor skills are involved with brushing and placing tissue paper. The reaction from the tissue paper and vinegar is the exciting science element of the activity. Art gives your child a chance to express themselves through their imagination. Art allows children to explore and understand their world through creative experiences that emphasize the process of art, not the product. When your child is creating there is no right or wr...

How To: A Hacker's Guide to Programming Microcontrollers

While hackers know and love the Raspberry Pi, many don't know of its cheaper cousin, the microcontroller. Unlike a Pi, which can be used more or less like a regular computer, microcontrollers like the Wi-Fi connected ESP8266 require some necessary programming skill to master. In this guide, we'll build an Arduino program from scratch and explain the code structure in a way anyone can understand.

Video: Automate a Camera's Path with the HoloLens and VroomCam

Every day the young world of mixed reality is creating new ways for people to work with with computers. We are looking for, and finding, new ways for these head-worn computers to understand what we tell them. Sometimes it is with our hands, sometimes it is where we turn our head, sometimes it is what we say. In the case highlighted below, it's where we walk.

Zanti: Nmap

In my last tutorial I very briefly introduced Zanti , but in this tutorial I will start to show its many features. The first step on hacking is recon . You could use Nmap , but the problem with Nmap on Android is that by itself, in order to gain full functionality your phone must be rooted. Thank goodness for a few geniuses in Zanti's dev team whom managed to implant full fuctionality of Nmap in Zanti without rooting your phone. With that being said, boot up your Android phone and lets start ...

How To: Security-Oriented C Tutorial 0x08 - A Trip Down Memory Lane

Before I continue with a topic on strings, we first require some fundamental understanding of how memory works, i.e. what it is, how data looks in memory, etc. as this is crucial when we are analyzing vulnerabilities and exploitation. I highly suggest that your mind is clear and focused when reading the following article because it may prove to be confusing. Also, if you do not understand something, please verify all of your doubts, otherwise you may not completely understand when we touch on...

News: Jobs & Salaries in Cyber Security Are Exploding!

In an article published in early-2015 by Peninsula Press, it was reported that the demand and the salaries for cyber security professionals are exploding! They cite that 209,000 cyber security jobs were unfilled last year, and that job postings have increased over 74% in the last 5 years. Job opening are expected to grow by another 53% over the next 3 years. You are definitely in the right field, my tenderfoot hackers! Some researchers are expecting information security jobs to continue to gr...

How To: PowerPoint Ribbon & Interface Introduction

Learn the and understand the mechanics of the PowerPoint interface. This tutorial will explain the Ribbon, Slides Pane and Slides Tab. Throughout this tutorial it is assumed that you are a complete beginner however as new tutorials are added the complexity will slowly increase from basics to advance. This tutorial is brought to you by Cozy HowTo your place for a snugly warm learning experience.

How To: Fold a Simple Origami Mouse

This tutorial teaches you how to fold an origami mouse with an ordinary sheet of paper. This model is suitable for beginners and children. Origami is great for small kids as the only material needed is paper, no scissors or glue that could do harm!

Hacker Fundamentals: A Tale of Two Standards

If you read my article on the OSI model, you got a good overview on communications from that model's perspective, but how does that relate to TCP/IP? We're going to take it a step further, getting into the idea behind the two address concept. How does an IP address and a MAC address work together? If you want to hijack sessions and all sorts of lulz like that, you need to understand these concepts. Let's get into it, mates!

How To: Create a lucid dreaming experience

In this detailed, creepy, video series you learn and understand the fundamentals of having an Out of Body Experience (OBE) or Lucid Dreaming. Everything from a clear explanation fo "The Phase", getting started, deepening of the experience, and much more.

How To: Get your sister to stop stealing your clothes

She thinks just because you're related that your closet is her closet; and if she ever gives your things back, they're never washed. If it's time to stop your sister from being a closet bandit, check out this video. This tutorial is full of tips for gettinf rid of that pesky sibling and keeping your clothes all to yourself.

How To: Find a manual for a used car

Need to know what kind of oil your car needs? How about your vehicle load capacity? What about the standard maintenance procedures for you specific make and model? All of this and more can be located inside your owner's manual. If you don’t have an owner’s manual for your used car, you may still be able to find one even if your car is an antique.

How To: Write a successful college essay in nine steps

Motivational speaker and leadership coach Tim Warneka teaches how to write a successful college essay in nine simple steps. Read and understand the directions and expectations the professor has for the assignment. Sit down and write whatever comes to mind on the topic. Edit your paper, making sure to use academic English. Allow yourself time to "sleep on it" and come back to re-read your essay with a fresh mind. When you come back to it, read the paper out loud to find any mistakes. Allow one...

How To: Deal cards in Texas Hold'Em

This video shows you the basics of dealing a hand of Texas Hold 'em. When dealing you always start off dealing the cards to your left; deal two cards to each player to start the initial round of betting. After the round of betting is over you "burn" one card by placing it face down, then turn over three cards called the "flop". This is followed by a round of betting. Then you burn one card and flip over one card called the "turn". This followed by another round of betting leaves you to burn o...

How To: Use Studio One

Studio one single window interface now eliminates multiple windows and complex menus enabling to focus on music in an easy way. The important music creation and production tools are instantly accessible. Studio one directly opens into the start page by default. Here we can find the recent files that enable to easily choose the ongoing productions. The default page also helps to open tutorials and demo songs. We can create songs on the song page using hot keys to access various panels. For exa...

How To: Spy on Network Relationships with Airgraph-Ng

What if you could easily visualize which access point every Wi-Fi device nearby is connected to in a matter of seconds? While programs like Airodump-ng can intercept this wireless information, making it easy for hackers to use and understand is another challenge. Fortunately, a tool called Airgraph-ng can visualize the relationships between Wi-Fi devices from only a few seconds of wireless observation.

How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack

Cracking the password for WPA2 networks has been roughly the same for many years, but a newer attack requires less interaction and info than previous techniques and has the added advantage of being able to target access points with no one connected. The latest attack against the PMKID uses Hashcat to crack WPA passwords and allows hackers to find networks with weak passwords more easily.

News: The Magic of Magic Leap's Hardware — Here's What We Know

It finally happened! In a world of "go big or go home," Magic Leap has finally done something other than tease us with vague promises and rendered video concepts. Although, other than actually showing us what the developer's kit will look like, it seems little more than a slightly different kind of a tease. To demystify this new product, we here at Next Reality decided to put together what we know about the hardware.