Valuable Tool Search Results

How To: Make a wooden pencil holder

This video covers the construction and assembly of a decorative pencil holder. These make great gifts and are excellent for utilizing scrap. This video is for the more experienced woodworker, knowledge of tools is required. To apply a beautiful finish on the pencil holder, see the Wood Whisperer's finishing video on popping the grain.

How To: Cut a quill pen

Discussing the technique of cutting a turkey quill pen, with reference to the bamboo pen. These quills can be used to write calligraphy. Part of the Tools and Techniques of Calligraphy series.

How To: Do quilling

Corinne Bradd helps Kristy Clarke get to grips with the tricky art of quilling. Using thin strips of brightly coloured paper and a quilling tool, she shows how simple it is to coil gorgeous, dimensional floral motifs.

How To: Cut citrus segments

Citrus segments make refreshing additions to salads and desserts, but the bitter white pith and chewy membranes sometimes detract from the deliciousness. To make citrus segments -- sometimes called "supremes" -- the only tool needed is a sharp paring knife. Cut the top and bottom off the fruit, then carefully cut away the peel and pith, leaving as much of the fruit as possible.

How To: Learn the high lob shot

The golf lob shot is a handy tool to have in your bag. It's a real showman's shot and one which will really impress your mates, if you can pull it off. You need confidence and commitment to execute the lob shot with flair. Scott Cranfield gives you some simple tips to make it easier.

How To: Clone using Vanishing Point in Photoshop

The Clone Stamp Tool has been a long time favorite for most Photoshop users. However, trying to remove something that is on an angle or a different perspective is often challenging. In this video, Terry White will show you that by using the Vanishing Point feature you can remove images and add images with ease.

How To: Wipe & Obfuscate Identifying Information in Your Protest Photos for More Anonymous Sharing

Every single photo you take carries with it a considerable amount of seemingly "invisible" yet important information known as metadata. Although metadata is usually helpful to sort your photographs by location and date, that same information could potentially be used against you, especially if the pictures are taken during a precarious situation.

How To: Here's Why You Need to Add Python to Your Hacking & Programming Arsenal

Choosing which programming language to learn next can be a truly daunting task. That's the case regardless of whether you're a Null Byter just beginning a career in development and cybersecurity or you're a seasoned ethical hacking and penetration tester with years of extensive coding experience under your belt. On that note, we recommend Python for anyone who hasn't mastered it yet.

How To: Force Android 10's Gestures to Work with Any Custom Launcher

One vital part of Android 10's new navigation system is the "QuickStep" gesture. Swipe up from the bottom of your screen, then pause. You'll see your recent apps along with a dock containing a handful of icons for quick access. This dock is provided by the phone's launcher, which means your home screen is now integrated into the multitasking UI. So what happens if you change your home screen app?

How To: Use Color Adjustments in Photoshop Express for More Vibrant Images

Imagine an Instagram feed filled with a wild array of vivid color. Beautiful right? But when you look at the photos in your iPhone or Android phone's albums, they're all just too dull to pull off that dynamic look. There's no doubt that colorful images are more eye-catching than dull ones, so how do you get your photos to overflow with vibrant color? The answer: Add it in post.

Hacking macOS: How to Perform Situational Awareness Attacks, Part 1 (Using System Profiler & ARP)

The first few minutes after gaining access to a MacBook are critical — but where do we begin? Using tools built into macOS, we can develop an in-depth understanding of running background processes, detect antivirus software, locate sensitive files, and fingerprint other devices on the network. All of this can be done without installing additional software or modifying any files.

How To: Crack Shadow Hashes After Getting Root on a Linux System

After gaining access to a root account, the next order of business is using that power to do something more significant. If the user passwords on the system can be obtained and cracked, an attacker can use them to pivot to other machines if the login is the same across systems. There are two tried-and-true password cracking tools that can accomplish this: John the Ripper and Hashcat.

How To: Run Kali Linux as a Windows Subsystem

Kali Linux is known as being the de facto penetration-testing Linux distribution but can be a pain to use as an everyday OS — even more of a pain if that means carrying around a second laptop or the constant frustration of using the finicky Wi-Fi on virtual machines. But there's another option: installing a Kali subsystem on your Windows computer as a convenient compromise.

How To: 3 Tips to Get to Inbox Zero Faster in Gmail

On average, an office worker receives 121 emails a day. Many of these emails are trivial and don't require immediate attention. While Gmail's automatic spam filters catch plenty of irrelevant emails, some still make their way into your inbox. Fortunately, Gmail's tools aren't limited to just spam filters.

How To: Reply to Texts with a Selfie GIF on Your iPhone

Most of us have probably used a GIF at least once or twice to respond to a message, and that's why a lot of messaging services and keyboards have GIF search tools readily available to use. Now, Google wants to take GIF responses to a more personal level, by allowing you to create your own selfies GIFs to instantly sent to family and friends.