Variable Sized Search Results

How To: Work with a Wacom tablet in Photoshop CS3

In this video, Justin Seeley shows how to use a Wacom tablet to create photo collages in Photoshop CS3 Extended. He shows how to blend photographs together using the Wacom pen to create a print ad type image. He shows how to increase the size of the brush, change the opacity, blend the image, and lightly paint into the image to control the amount of the fade.

How To: Use a bead roller

Corinne Bradd shows Kristy Clark how to use the bead roller, a nifty gadget that can create perfect beads of equal size from polymer clay, quickly and effectively. Once they have been shaped and baked, these little beauties can be used for all sorts of projects, from jewelery to decorating picture frames and much more.

How To: Set up a formal dinner place setting

Ever wonder which side of the plate to put a fork? This video will show you piece-by-piece how to create a formal place setting for two different meal sizes. This is useful if you are hosting a fancy dinner, or are just having friends over for a nice meal. Some people even enjoy having a formal setting on their dining room table all the time.

How To: Build a looping rolling marble machine with magnetic elevator

Wow! No longer do you have to buy those huge marble machine roller coaster toys — you can DIY one! This video covers the materials, tools and techniques used to make a homemade rolling ball marble machine. If you haven't seen this rolling ball marble machine toy in action yet, WATCH IT. It's a looping rolling marble machine made with wood, rebar tie wire and polyurethane tubing, featuring a magnetic elevator.

How To: Fold an origami crane with the DaVinci robot

Learn how to origami a crane with this demonstration by a Japanese surgeon. Watch as he makes origami with the DaVinci robot, a surgical tool powered by state-of-the-art robotic technology. The surgeon’s hand movements are scaled, filtered and seamlessly translated into precise movements of the EndoWrist Instruments. Making origami will never be more interesting. Check out the size of the origami paper crane!! Amazing!

How To: Secure crimp beads with crimping/chain-nose pliers

Attention jewelry makers! When making your own unique jewelry designs, one must learn how to secure the end crimp beads with crimping or chain-nose pliers. Crimp beads can be used for finishing off your strung jewelry or as "stoppers". In this tutorial, learn how to hone your jewelry-making skills!

How To: Add fake tattoos in Photoshop

Open another canvas. It doesn't matter what size you make it, as long as it is the same size or bigger than the area you want it to cover on the image. Open a new canvas by going to "File" and clicking "New." Select your dimensions and click "Okay."

How To: Perform Directory Traversal & Extract Sensitive Information

With all the web applications out on the internet today, and especially the ones built and configured by novices, it's easy to find vulnerabilities. Some are more perilous than others, but the consequences of even the slightest breach can be tremendous in the hands of a skilled hacker. Directory traversal is a relatively simple attack but can be used to expose sensitive information on a server.

How To: Write an XSS Cookie Stealer in JavaScript to Steal Passwords

JavaScript is one of the most common languages used on the web. It can automate and animate website components, manage website content, and carry out many other useful functions from within a webpage. The scripting language also has many functions which can be used for malicious purposes, including stealing a user's cookies containing passwords and other information.

How To: VBScript for DDosing Sites

Hello Guys, Today I have made a script for ddosing sites with VBScript! And I don't know how you guys do it, but I've made a script that refreshes the page in a chosen amout of milliseconds. And if you want it a number of times or if you want it to go on and on. And this is a script to run it on your botnet. But again I don't know if this works on your botnet too.

How To: Security-Oriented C Tutorial 0xF8 - PE File Infection

How is it goin', fellow 1337 haXX0rZ! dtm here with another article, this time, we'll be looking at infecting PE files, executables in particular for this write-up. Obviously some prerequisite knowledge will be needed since this isn't really newbie-friendly. If you are still a beginner, fear not, it might still be interesting to read! Hopefully!

How to Hack Databases: Running CMD Commands from an Online MS SQL Server

Welcome back, my hacker novitiates! There are many ways to hack databases, and most of these techniques require SQL injection (SQLi), which is a way of sending SQL commands back to the database from a web form or other input. In this tutorial, we will use SQL injection to get access to the underlying server. So instead of getting access to the database and its data, we will use the database as an intermediary to gain access to the underlying server.

How To: Build a Stealth Port Scanner with Scapy and Python

As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance. The issue with port scanning is that is makes a lot of noise. Every connection to every port will be logged. This is where stealth scanning comes in. Also known as SYN or half-open scanning, stealth port scanning is a bit quieter, and is l...

Hack Like a Pro: How to Build Your Own Exploits, Part 3 (Fuzzing with Spike to Find Overflows)

Welcome back, my hacker novitiates! In the previous two posts in this series, we looked at the basics of buffer overflows. In this post, we will look at one technique for finding buffer overflows. We will try to send random, oversized, and invalid data at a variable to see whether we can make it crash or overflow. This process is known as fuzzing. It is often the first step to developing an exploit, as we need to find some variable that is susceptible to overflowing.

How To: Writing 64-Bit Shellcode - Part 1 (Beginner Assembly)

In this simple tutorial you will be shown step-by-step how to write local shellcode for use on 64-Bit Linux systems. Shellcode is simple code, usually written in assembly that is used as payload in exploits such as buffer overflow attacks. Payloads are the arrow head of an exploit: though the rest of the arrow is important for the delivery of the attack, the arrow head deals the killing blow. In reality, payloads are slightly less exciting yet far more interesting and intelligent than medieva...

How To: Create an adorable floral formal teen bun

Little girls are always in a rush to look just like their mommies. Just think pint-sized fashionistas like Suri Cruz and Courtney Cox's daughter Coco, who was recently caught by the paps wearing the same ruby lipstick as her mommy on a stroll. While we don't think that wearing makeup is all that age appropriate for a five year old, beautiful, youthful hairstyles are.

How To: Place and crop images with Adobe Illustrator

If you're using Adobe Illustrator CS4, you know that cropping an image can be less than a simple task. This how-to walks you through the steps, not only showing how to place and move the image, but also how to crop it to the desired sized. Unlike Photoshop which allows you to work directly with pixels, Illustrator treats all images as whole objects. SO, watch this video and end the frustration that Adobe Illustrator can bring when you're cropping an image.