Variety Server Search Results

How To: Make a DIY vehicle immobilizer to stop car thieves

We all know the G-spot as that sensitive area that drives women crazy, but for auto enthusiasts, it has a whole new meaning. The G-Spot, designed by Daniel Davies, is a vehicle immobilizer, which keeps your vehicles safe from car thieves. And you don't need to pay a huge amount of money to get one, either! You can make on yourself, right at home, provided you have all the right materials.

How To: Create a custom class for your game's hero using Flash

Creating a modern video game is a mammoth undertaking, especially if you are working alone. Hopefully, this video will make it a little bit easier. It will teach you how to create a custom class for your game's hero character using Flash CS4 and Actionscript 3. Doing so will make your main character react in predetermined ways to a variety of actions, which is very useful if you want the character to react consistently throughout the game.

How To: Do magic with a Rubik's cube & make a card boomerang

In this tutorial, learn how to do a variety of very cool tricks. In the first, you will appear to solve a jumbled Rubik's cube in less than two seconds by jumping up and magically moving the pieces into place. In the second, learn how to stack dice like in a video game. The third will show you how to turn an ordinary playing card (no gimmicks!) into a boomerang and finally you will train a disc to return to you when you throw it, as well.

How To: Make (non-Newtonian) Oobleck from corn starch & water

Mr. O shows his audience in this video how to make oobleck, a slime-like substance which has a variety of unique properties. For this project, you will need a mixing bowl, food coloring, corn starch, a measuring cup, and water. First, color the water with food coloring to a color which is much darker than the color you would like. You will need the correct ratio of water to cornstarch, in a 1 to 2 ratio. Add some water to the bowl and add the cornstarch, then add the rest of the water. Finall...

How To: Make a variety boiled wheat healthy dishes

This how-to video shows you how to make boiled wheat. To do this, take some wheat and put it in a pot. Pour some water into the pot and put it on a stove in order to boil it. After about 45 minutes to an hour, you will now have lovely boiled wheat grains. You can use this dish as a side dish. You can also use it with natural yogurt, fruit, and cinnamon for breakfast. Another alternative is using milk, peanut butter, and honey. You can also use it with a salad. Just add lintels, parsley, salt,...

How To: Read a micrometer in mechanical engineering

In this video tutorial, viewers learn how to read a micrometer. This tool allows the user to accurately measure components. They have the ability to measure dimensions accurately to within one hundredth of a millimeter. Micrometers are designed with a wide variety of styles and sizes for normal or specialized applications. Micrometers are able to measure the internal or external dimensions of a component. They are the most important basic measuring instrument used in the metal industry. There...

How To: Make a Jägermeister Jagermonster cocktail

Are you interested in parties and cocktails? Let's make a Jagermonster cocktail. Start with a rock splash and ice it up a little bit. Next, get another glass for an ice mixture, one ounce of Jagermeister, and a little bit of grenadine. Then, add 4 ounces of orange juice. Shake it up well for a good mixture, get rid of the previous ice in the glass, and pour it in. This will provide a variety in your list of cocktails.

How To: Make sangria

There is no better addition to a barbecue than a classic sangria. Rebecca shows an easy way of making this Spanish punch. There are various types of sangria which can be prepared easily by just changing the flavor through the use of a variety of fruits.

How To: Unblock Facebook at school with Google

This video will show you an interesting trick which you can use to access Facebook or other web pages on a school server or other place where Facebook is normally blocked with the help of Google. You will need to first go to the Google homepage and find the button at the top of the toolbar which says "more" and go to the pull-down option of "even more" options. This will open up a new web page. You should then go down to the "translate a webpage" option on the right hand column of results and...

How To: Exploit EternalBlue on Windows Server with Metasploit

Particular vulnerabilities and exploits come along and make headlines with their catchy names and impressive potential for damage. EternalBlue is one of those exploits. Originally tied to the NSA, this zero-day exploited a flaw in the SMB protocol, affecting many Windows machines and wreaking havoc everywhere. Here, we will use EternalBlue to exploit SMB via Metasploit.

How To: Scan for Vulnerabilities on Any Website Using Nikto

Before attacking any website, a hacker or penetration tester will first compile a list of target surfaces. After they've used some good recon and found the right places to point their scope at, they'll use a web server scanning tool such as Nikto for hunting down vulnerabilities that could be potential attack vectors.

How To: Perform Local Privilege Escalation Using a Linux Kernel Exploit

Getting root is considered the Holy Grail in the world of Linux exploitation. Much like SYSTEM on Windows, the root account provides full administrative access to the operating system. Sometimes even a successful exploit will only give a low-level shell; In that case, a technique called privilege escalation can be used to gain access to more powerful accounts and completely own the system.

Hacking macOS: How to Remotely Eavesdrop in Real Time Using Anyone's MacBook Microphone

Google, Amazon, and Facebook are always listening. But what's worse? Hackers are listening, too. Windows PCs are particularly vulnerable, but with a few simple commands, a remote attacker can even take over the microphone on someone's Mac computer, streaming audio and listening to private conversations in real time without the victim's knowledge, abusing an overlooked security consideration.

How To: Hack Forum Accounts with Password-Stealing Pictures

The pictures we upload online are something we tend to think of as self-expression, but these very images can carry code to steal our passwords and data. Profile pictures, avatars, and image galleries are used all over the internet. While all images carry digital picture data — and many also carry metadata regarding camera or photo edits — it's far less expected that an image might actually be hiding malicious code.

Networking Foundations: Exploring UDP via Wireshark(Part 1)

Hello ladies and gentlemen, I'm back with another informative(hopefully) article for you all. Once again I would like to apologize for my absence for about a week or so. I have some stuff going on with my life and university and I haven't found enough time to make a fully in-depth article. In this article I'm going to walk you through one of the main networking protocols when it comes to communication across the Internet between programs, aka UDP(User Datagram Protocol).

How To: Bypass School Internet Filters to Unblock Websites

School internet filters serve a valid purpose—they keep students from wandering off into the deep corners of the web while still allowing at least some internet access. But a lot of these restrictions are completely ridiculous, to the point where some school districts block access to the educational material in National Geographic or forbid searching terms like "China," "Iran," or "Russia"—because, you know, breasts and commies.

How To: Build a Stealth Port Scanner with Scapy and Python

As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance. The issue with port scanning is that is makes a lot of noise. Every connection to every port will be logged. This is where stealth scanning comes in. Also known as SYN or half-open scanning, stealth port scanning is a bit quieter, and is l...

How To: Purchased Apps Not Showing Up in the App Store? Here's How You Fix It in iOS 7

With the release of iOS 7, the entire Internet was abuzz with what's the exact opposite of excitement as Apple's servers were overloaded, causing many download fails of the new operating system. Since then, many other bugs and issues have arisen that are fairly common with new Apple software updates, like iMessage fails and wallpaper complaints (to only name a few).