Virtual Environments Search Results

How To: Ingress, Google's Awesome New Mind-Hacking AR Game for Android Phones Now in Beta!

Google has just launched a new revolutionary augmented reality game for Android called Ingress. Their new mobile game centers around the fight for control of the minds of everyone here on Earth. It's a freaking worldwide fight—from your smartphone! While augmented reality in is nothing new in the smartphone gaming world, it has never seen the likes of this. With an almost Halo-like storytelling, Ingress seeks to bring out gamers all across the globe to perform physical activities by transform...

How To: Shut Down Your PC and Send Other Commands Remotely Through Twitter Using TweetMyPC

Ever been halfway to work or school and suddenly remembered you forgot to log off your computer? A lot of people are constantly logged in to email and social media accounts, so if you have a mischievous roommate or sibling, this situation could be disastrous. That's where TweetMyPC comes in—it's a free Windows application that lets you send commands to your computer just by tweeting. Image by Twittermania

How To: Use Drums Overkill virtual instrument in Kontakt 2

Drums Overkill is a new virtual instrument from Best Service that features 1,200 drum kits and a total of 27,000 samples. Never before has such a huge collection of samples been formatted into "ready-to-play drum kits" that can be loaded into the included Kontakt 2 interface which you can then play on your keyboard. Learn the basics of using the Best Service Drums Overkill kit in this Kontakt 2 tutorial.

How To: Cure your hook

Here's another video from the Tees2Greens Virtual Golf Pro, Stuart Smith; this time on how to stop hooking the ball. He offers a few checkpoints to follow that should get you hitting the ball straight again.

How To: Use Command Injection to Pop a Reverse Shell on a Web Server

Command injection is a technique used by hackers to execute system commands on a server, usually via a web application or some kind of GUI. This can happen when an application provides some sort of functionality to the user involving the use of system commands. When the input is not properly sanitized, commands not originally intended to be run are allowed to be executed.