Utilizing Alternate Search Results

How To: Use Propellerhead ReCycle with sound loops

Traditionally, incorporating loops and grooves can translate into hours of hard work just to get the loop to fit your song's tempo and timing. Help is on the way from the Propellerhead's ReCycle which gives you full creative control over utilizing your looped material. Join electronic recording artist David Alexander as he shows you how ReCycle has revolutionized using sampled loops. In this episode, David shows us how to Chop Up A Complex Loop.

How To: Set-up your Gmail account with Outlook

lakercoolman shows us how to set up our gmail account with this quick tutorial. Basically outlook express is a program that helps us to organize our email with added features such as contacts, to do lists and calender entries. Its an offline email client that allows us to work offline and also lets us set up exchange servers aswell. Ohter email servers such as hotmail and yahoo charge for thios service but the advantage of gmail is that IMAP or POP access is free. in ofer to set up, navigate ...

How To: Play an advanced "down, down, up" jig on a bodhrán

In this how to video, you will learn how to perform an advanced jig rhythm Bodhran. The way it is performed is going down down up. The down and up accent create an alternating back and forth feeling. If the accent is the same sound every beat, such as on the down, it has only a forward drive to it. First, do a down stroke but do not follow through. Drop the stick to hit a few inches below. From here, go up and hit the drum. The instant way to get this is to do the opposite. Basically, go up, ...

How To: Do pushups on your coffee table

Rick Pitts takes us through how to do a push up using a coffee table. First, he starts by doing a push up for shoulders and triceps. You do this by placing your hands slightly wider than shoulders with fingers pointing forward. Keep your elbows near body as you lower yourself towards the table.

How To: Use Amaco bead rollers

Our instructor will choose set 2, 6 and 8 to show you what the company offers. On the wrappers are pictures of the types of beads possible with each set. She will create from set 2 today, which makes oval beads. Inside of the packages, such as this package which holds set 2 are several items. First is the thin metal pins or rods that can go into the baking oven with the polymer clay molded around them. Next, two pieces for the mold, a bottom and top that fit together with grooves. There are a...

How To: Do the magic loop knitting technique

Knitting blogger Sapphires'n'Purls provides step-by-step basic instructions of the magic loop knitting technique. To begin Magic Loop knitting, you will need the following supplies: One circular needle with flexible cable, skein of yarn of your choosing. To begin, you will cast on 12 stitches onto the circular needle. Next you will slide all your stitches onto the flexible cable. Once all your initial 12 stitches have been cast, divide the stitches in half, putting six stitches on the left si...

How To: Wrap a sprained ankle

Assemble the necessary equipment: a roll of 1- to 2-inch-wide athletic tape and a pair of scissors. Wrap one piece of athletic tape under the heel of the foot and bring both ends up the ankle to either side of the leg. The tape should form a "U," like the stirrup on a horse's saddle.

How To: Make lemon zest with or without a zesting tool

Making lemon zest isn't hard and doesn't take a long time, especially if you have a lemon zester. A zesting tool is the number one preferred way to get that lemon zest with no mess and no fuss. So, in the first video tutorial, see how to make lemon zest with a zester. Use a zesting tool for the peeling, and make sure to wash the outside of the lemon thoroughly to remove dirt and residue. Then zest away!

How To: Protect your online reputation

With social networking systems, YouTube comments chains, chat rooms, bulletins boards, Twitter updates... It seems as if almost everyone has at one time publicly stated an opinion on the Internet. Nearly half of all prospective employers research job applicants online. Make sure that what you’re posting today doesn’t cost you a dream job tomorrow!

How To: Make anti-flea biscuits for your dog

Watch this how-to video from the Dog Channel and learn how to make healthy and tasty anti-flea biscuits for your dog. These anti-flea biscuits are sure to be a hit with your dog. Not only are they healthy but they have the added benefit of flea control.

How To: Use Face ID with Sunglasses On

The iPhone X introduced the world to Face ID in 2017, and now, every new iPhone uses Apple's biometric security system instead of the old Touch ID. It's more secure than fingerprint scanners and it's even more user-friendly. True, it's not without its faults, but at least one of the biggest problems can be fixed.

How To: Use Metasploit's WMAP Module to Scan Web Applications for Common Vulnerabilities

Having an efficient workflow is an integral part of any craft, but it's especially important when it comes to probing apps for vulnerabilities. While Metasploit is considered the de facto standard when it comes to exploitation, it also contains modules for other activities, such as scanning. Case in point, WMAP, a web application scanner available for use from within the Metasploit framework.

How To: Exploit Remote File Inclusion to Get a Shell

A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website defacement to full-on code execution. For this reason, RFI can be a promising path to obtaining a shell.

How To: Perform Directory Traversal & Extract Sensitive Information

With all the web applications out on the internet today, and especially the ones built and configured by novices, it's easy to find vulnerabilities. Some are more perilous than others, but the consequences of even the slightest breach can be tremendous in the hands of a skilled hacker. Directory traversal is a relatively simple attack but can be used to expose sensitive information on a server.

How To: Record Your iPhone's Screen Without the Annoying Red Bar or Bubble

Native screen recording, one of the hottest features that Apple included in iOS 11 and later, is easily started from the optional Control Center toggle on your iPhone. From there, you can stop recording from the same place or from the red status bar or bubble. It's a very convenient addition to iOS, but there's one obvious downside — that red indicator, which can appear in your recordings.