Valid Solution Search Results

How To: Solve a medium difficulty sudoku puzzle

This is a sudoku tutorial for a medium difficulty puzzle. It has less "given" easy solutions, so we have to use harder logic questions to figure out some of them. I'm sure I overlooked some easier ways to prove certain numbers, but it's good that you learn how the logic works for future difficulties. You should aim for about 10 minutes per game once you fully understand how to play. Have fun!

How To: Create lightning effects in GIMP

If Photoshop is too complex for your tastes - or just takes a little too long - then GIMP may be the solution. GIMP is a photo manipulation software with super easy controls and tools. Generally it's used for photo retouching, but like Photoshop, the program allows you to add in special effects.

How To: Install a XAMPP testing server on a PC

If you have a website or do any type of web development you have probably needed a server at some point. Not everybody has a full blown commercial web server at their disposal for development, experimenting, and testing their site, so try this solution: an XAMPP open source bundled server.

How To: Install wxPython

wxPython is fast becomming one of the most popular cross-platform GUI programming solutions. Here Kyran Dale takes you through the simple steps required to have wxPython up and running on your Windows machine.

How To: Drain yogurt

Yogurt makes a healthy and delicious addition to dips, sauces and soups, but sometimes it can make a recipe taste watery. The solution is to drain the yogurt in a sieve lined with cheesecloth or a clean, lint-free dish towel in the refrigerator overnight until the yogurt becomes thick and creamy-looking.

How To: Make rock candy in your spare time

This is a video tutorial in the Food category where you are going to learn how to make rock candy in your spare time. For this you will need 4 cups sugar, 2 cups water, small saucepan, wooden spoon, candy thermometer, glass jar, measuring cup, cotton string, a weight to hang on the string, waxed paper and a pencil. Boil water in the saucepan and dissolve the sugar in it. Pour the solution in to the jar. Tie the weight to one end of the string and tie the other end to the middle of the pencil....

How To: Enumerate MySQL Databases with Metasploit

It's been said time and time again: reconnaissance is perhaps the most critical phase of an attack. It's especially important when preparing an attack against a database since one wrong move can destroy every last bit of data, which usually isn't the desired outcome. Metasploit contains a variety of modules that can be used to enumerate MySQL databases, making it easy to gather valuable information.

How To: Hack Apache Tomcat via Malicious WAR File Upload

Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web management interfaces should be scrutinized just as hard as the apps they manage, especially when they contain some sort of upload functionality. By exploiting a vulnerability in Apache Tomcat, a hacker can upload a backdoor and get a shell.