Website Functions Search Results

How To: Use the replace color command in Photoshop

The replace color command is a nifty tool in Photoshop that enables you to change a color in an imagine very quickly and effectively. The tool requires that you make a copy of the original layer, as the replace color command is a destructive function. It requires parts that you want replacing to be selected first, to change the color of the desired areas. The result is a very realistically edited image, that is extremely fast and easy to accomplish.

How to Use Logic Pro: Arrange Window

Get to know how to use Logic Pro's arrange page in this short tutorial. Use the arrange area to work with the audio of your song. Change the timeline by choosing a time and beat. Use the toolbar area to do some functions. Use the icons to easily open up media and list areas. Use the bin to store your audio. Use the browser to look for your audio songs. Use the event list editor to edit your MIDI information. Use the inspector to view the channel strips of your track. Use the editors in the bo...

How To: Create an animation using a motion guide in Flash

This tutorial video, from tasktutorial demonstrates how to create animation using the motion guide function in Flash. You will learn how to create an object, in this case, a ball, and create an animation that makes it appear to bounce. The guide shows you, how to add a motion guide by selecting a key frame and drawing it in. Then you will learn how to snap the object to your guide line, and add motion to it by selecting another key frame between the first and last frames, and snapping the obj...

How To: Do basic lighting corrections in Photoshop

In this video tutorial the instructor shows how to perform basic lighting corrections in Adobe Photoshop. The levels tool is the Photoshop's most used command which has many features to it. Its most basic function is as a lighting correction tool. In this video open an image and work on its adjustment layer so that you do not damage the original picture. Now choose the levels option by right clicking and it shows a pop up window which contains a histogram which shows the population of the col...

How To: Convert an image to mosaic in Illustrator

Illustrator is a great tool for creating individual artwork. Creative and clever, it has many functions, one of which is mosaic. If you want to make your illustration or design appear to have a myriad of tiny 'squares' like a Roman mosaic, this guy can help you do it. The short clip explains clearly how to bring the chosen effect to your design. You can see on screen exactly how to do it, so you're not left in the dark, searching every menu for the right tool.

How To: Use Excel keyboard shortcuts

This video is all about the keyboard shortcuts that are used in Microsoft Excel of the latest version. If you really need speed and efficiency then watch this video for its shortcut keyboard buttons. After typing all the data, if you need to see the page setup with the help of the mouse than it will take a pretty long time. By opting for keyboard shortcuts you can save much of your time and can invest it in another work. If you press 'alt' button then it will show keyboard shortcuts on the sc...

How To: Use the area type tool in Illustrator

If you want to be serious about using Adobe Illustrator, then learning how to use type is an essential part of your skill set. Type can help you with a wide range of assignments, from designing logos to image building and much more. There are a number of settings and functions when using Type, so it's important to know all of the options that are available to you. This video tutorial will teach you how to use the area type tool in Illustrator.

How To: Use the Hacker Defender rootkit or HackDef

Hacker Defender is one of the most widely deployed rootkits in the world. It is a user-mode rootkit that modifies several Windows and Native API functions, which allows it to hide information (files, processes, etc.) from other applications. In addition, Hacker Defender implements a backdoor and port redirector that operates through TCP ports opened by existing services. This means it is not possible to find the hidden backdoor through traditional means, like launching a remote port scan agai...

How To: Use the XPS Document Writer function in Windows Vista

While printers are not normally considered to be at the leading edge of computer technology, these devices have evolved at a lightning pace over the years. Before today's low cost, high-quality inkjet and color laser printers, we used low-quality dot matrix printers and slow laser printers where quality and performance of printing was often questionable. Additionally, documents that looked correct on screen often came out looking differently on paper, due to differences between what the scree...

How To: Use a Sony video camera

Cosmo Crow and Mark Hannah take you on a tour of the Sony DSR cameras in these how-to videos. The first video segment deals more with setting up the camera tripod. Then, Mark and Cosmo continue their tour of the Sony Camera with an in depth explanation of the Lens and all its functions. Finish up with the final installment, which will teach you how to operate the switches on the main body of the Sony Camera. Watch this video tutorial and learn how to set up and use the Sony Camera.

How To: View Calendar Events & Invites in Edison Mail While Checking Your Email

Edison Mail's big Assistant update means more features and functions for you in a convenient, efficient package. One of the most significant changes to come with the 1.17.0 (iOS) and 1.12.0 (Android) updates is calendar functionality for all connected email accounts. Other apps, like Spark, have had this for some time, but we're excited that Edison has finally jumped aboard the bandwagon, too.

How To: Find Vulnerable Webcams Across the Globe Using Shodan

Search engines index websites on the web so you can find them more efficiently, and the same is true for internet-connected devices. Shodan indexes devices like webcams, printers, and even industrial controls into one easy-to-search database, giving hackers access to vulnerable devices online across the globe. And you can search its database via its website or command-line library.

How To: Scan for Vulnerabilities on Any Website Using Nikto

Before attacking any website, a hacker or penetration tester will first compile a list of target surfaces. After they've used some good recon and found the right places to point their scope at, they'll use a web server scanning tool such as Nikto for hunting down vulnerabilities that could be potential attack vectors.

How To: Brute-Force Nearly Any Website Login with Hatch

The tactic of brute-forcing a login, i.e., trying many passwords very quickly until the correct one is discovered, can be easy for services like SSH or Telnet. For something like a website login page, we must identify different elements of the page first. Thanks to a Python tool for brute-forcing websites called Hatch, this process has been simplified to the point that even a beginner can try it.

How To: iOS 12 Makes 2FA for Third-Party Apps & Websites Easy with Security Code AutoFill from SMS Texts

Two-factor authentication (2FA) is a great way to add another layer of security to sensitive third-party apps and websites like Venmo. However, before iOS 12, to log into a particular 2FA-secured app or site on your iPhone, you'd have to memorize or copy the SMS code from Messages, then jump back in a timely manner to log in. Apple's latest iOS version streamlines this process.

How To: Generate Private Encryption Keys with the Diffie-Hellman Key Exchange

When we are building programs that communicate over a network, how can we keep our data private? The last thing we want is some other lousy hacker sniffing our packets, so how do we stop them? The easy answer: encryption. However, this is a very wide-ranging answer. Today we're going to look specifically at how to encrypt data in Python with dynamically generated encryption keys using what is known as the Diffie-Hellman key exchange.

News: MIT's Temporary Tattoos Turn Your Skin into a Touchpad

We're inching closer towards the singularity—that point where technology advances to the steepest slope of the logistic function S-curve and simply skyrockets at a rate we've never seen before. Somewhere along the way, the line between humans and the tech we rely on will become blurred, and MIT's latest project might very well be a step in that direction.

How To: Security-Oriented C Tutorial 0x21 - Linked Lists

Welcome to the final tutorial of the series on standard C. This article will cover the linked list abstract data type (ADT). There will be a lot of abstraction to try to deliver the understanding in the most basic way for easiest interpretation of what they are and how they work, then we will get into the guts of it and learn the technical code underneath. For those who have yet to grasp the concept of pointers, it's advisable that you do that first before approaching this. Having learned thi...