Utilized Gently Search Results

How To: Dismantle an Xbox 360 console controller

In this how-to video, you will learn how to take apart your Xbox 360 controller. This will be useful for any repairs or modifications you want to perform on your controller. First, flip the controller over and take off the back. Unscrew the screws in the back. Carefully remove the bottom panel. This will prevent the buttons from falling out. Take off the shoulder buttons. If you want to continue to dismantle the controller, remove the thumb sticks. Next, remove the rumble sticks by pulling th...

How To: Visualize auras

This video shows how to visualize and see auras. Close your eyes and begin to relax your mind by gently breathing and thinking 'sooo' and 'hummm'. Once you're relaxed, dim the lights in your room and stand in front of a white background. Take a look at your hand against the white background and focus on the faint color while keeping yourself relaxed. Focus on it and the color will strengthen eventually. When the color has become more clear, you have now seen the aura. Practice on seeing the a...

How To: Get rid of nasty split ends

Stephanie teaches viewers how to get rid of nasty split ends in hair. First, grab a brush and brush your hair. You'll want to do this very slowly and gently. Avoid pulling your hair out. You should do this to your whole head. Next, wrap a strand of hair around your pinky and underneath the next finger, and over the next and under the next finger. Next, grab hair cutting scissors, drag you fingers down, and you'll see the split ends pop up. Simply split them off when you see them pop up. Repea...

How To: Use Metasploit's WMAP Module to Scan Web Applications for Common Vulnerabilities

Having an efficient workflow is an integral part of any craft, but it's especially important when it comes to probing apps for vulnerabilities. While Metasploit is considered the de facto standard when it comes to exploitation, it also contains modules for other activities, such as scanning. Case in point, WMAP, a web application scanner available for use from within the Metasploit framework.

How To: Exploit Remote File Inclusion to Get a Shell

A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website defacement to full-on code execution. For this reason, RFI can be a promising path to obtaining a shell.

How To: Perform Directory Traversal & Extract Sensitive Information

With all the web applications out on the internet today, and especially the ones built and configured by novices, it's easy to find vulnerabilities. Some are more perilous than others, but the consequences of even the slightest breach can be tremendous in the hands of a skilled hacker. Directory traversal is a relatively simple attack but can be used to expose sensitive information on a server.

How To: Record Your iPhone's Screen Without the Annoying Red Bar or Bubble

Native screen recording, one of the hottest features that Apple included in iOS 11 and later, is easily started from the optional Control Center toggle on your iPhone. From there, you can stop recording from the same place or from the red status bar or bubble. It's a very convenient addition to iOS, but there's one obvious downside — that red indicator, which can appear in your recordings.

News: BlackBerry Unveils the KeyOne—A New Security-Focused Phone with a Physical Keyboard

BlackBerry has formally announced the arrival of its flagship, the KeyOne, during Mobile World Congress 2017 in Barcelona. The all-Android KeyOne looks distinctly BlackBerry, with its 4.5" screen and physical QWERTY keyboard. Here's the lowdown on this elegant handset that hearkens back to BlackBerry's heyday, which had previously been known by its code name, the BlackBerry Mercury. Aluminum Unibody with Physical Keyboard

How To: Nurse in your sakura bloom ring sling

Nursing a baby in the bloom ring ring sling is very simple and comfortable. While the baby is sitting in the sling their bottom will be at stomach level for you with the fabric stopping around the baby's knees. Support the babies weight with your hand and gently slide the top ring to lower the sling so your baby will be sitting at your hip. with the baby in place you can lower your shirt so the baby can latch on and nurse. The sling is high enough for you to be able to nurse hands free and no...

How To: Apply glitter & pigments to nails

Learn how to use glitter and pigments on fingernails! In just four minutes learn how to create a unique style for your nails using just a base nail polish, 3D Silver Glitter and a clear top coat. First you apply a single layer of nail polish, using a color of your choosing. Then you dip the tip of your index finger in glitter and gently apply it on top of the nail polish. After shaking off the excessive glitter, you apply a final layer of clear nail polish. Wash your hands and you're done!

How To: Make YouTube Music Stop Playing the Music Video Version of Songs

YouTube Music has been around since late 2015, but it only started becoming a viable music service in 2019. It makes sense for Google to utilize YouTube's existing library of music videos, remixes, and cover songs to create one massive music platform. But one downside is you get a lot of the music video versions of songs instead of the album versions. Thankfully, you can change this.

How To: Automatically Delete Your Google History on a Schedule

Your Google history is mostly a binary choice — either you enable it fully, taking advantage of all its features while letting Google record your activity, or you disable it, staying incognito but also missing out on some fun stuff. But now, Google will let you auto-delete your history, allowing you to utilize all the perks that come with recording your history while maintaining some level of privacy.