Women Connected Search Results

How To: Convert cassette tapes to CDs with Audacity

Dave Andrews gives a simple overview of how to take a cassette tape and convert it to a CD using Audacity. First you will need a cassette tape player, like a boom box, with a microphone jack. Then you'll want to download the free program called Audacity. To begin recording music from the cassette tape simply press the record button on the audacity application while you press the play button on the boom box. You'll want to make sure the audio cable is connected from the boom box to the PC. Fin...

How To: Connect a Wiimote to a PC

Most people own a Wii system, or at least have seen the infamous Wiimote that serves as the controller for the console. What most people have overlooked is that this handy piece of technology can be set to work on PC. Surf the web or scroll through photo albums without the need for a mouse as the narrator takes you through an easy to follow, visual guide how to install these programs on your computer. You can even use the remote just like a classic NES controller for emulators on your compute...

Use Pro Tools & Reason Rewire: Aux & instrument tracks

After finally completing a rhythm section using Reason software, you may want to rewire using Protools. First decide how to feed Reason into Protools. The best, would be to re-patch individually into Protools, however the demo here shows a simpler approach that will be easier for anyone to use. First and foremost, Shut down Reason and boot a new session in Protools. Then add an AUX input and instantiate the rewire plug-in to connect to Reason. Make sure the main Reason stereo is feeding track...

How To: Convert VHS tapes to DVD

This video covers the steps needed to convert a VHS video tape to DVD. You will need to purchase a video capture card in order to do this project. Connect your VCR to your computer using a coaxial cable. This is a great way to preserve and restore old VHS tapes by digitizing them.

How To: Origami an icosahedron

This video explains how to make an Origami Icosahedron (designed by Heinz Strobl) using 50 strips of paper. You need 20 strips of a single color for the triangles and 30 of a contrasting color to connect the triangles.

How To: Stitch pantographs with a longarm sewing machine

Watch this instructional quilting video to quilt a pantograph pattern with a longarm sewing machine. A pantograph is a mechanical linkage connected in a special manner so that the movement of one specified point is an amplified version of the movement of another point. If a a line drawing is traced by the first point, an enlarged copy will be drawn by a pen fixed to the other. Take note of the proper way to stand and move one's body when stitching out pantographs. It's best not to move one's ...

How To: A Hitchhiker's Guide to the Internet: Today and Now, How It All Connects

In the first part of this series, we took a factual and technical look at the history of the Internet. I explained how all of these wires and servers got here in the first place. Obviously, a firm did not just create and build the Internet around 1995! Now that we know how the Internet came to be, we can get into the really fun stuff—what the Internet looks like now! Well, that's not quite the network design I was talking about, but it does show what the Internet looked like back in 2007 befo...

How To: Snag a trophy wife

Everyone wants to have a pretty young thing on their arm, but not everyone can get it. To secure perfect trophy wife of your dreams, you need to meet a few criteria. Check out this tutorial and learn the do's and don'ts of dating younger ladies.

How To: Use Health Connect to Sync Your Health and Fitness Data Between Google Fit, MyFitnessPal, and Other Android Apps

Taking a cue from Apple and its Health app for iOS, Google has created a central hub to collect health and fitness data on your Android device. With it, you can share and sync health and fitness data, such as steps, heart rate, water intake, sleep quality, and calories burned, between different apps and devices and use your favorite app to view all the information.

How To: Enumerate SMB with Enum4linux & Smbclient

SMB (Server Message Block) is a protocol that allows resources on the same network to share files, browse the network, and print over the network. It was initially used on Windows, but Unix systems can use SMB through Samba. Today, we will be using a tool called Enum4linux to extract information from a target, as well as smbclient to connect to an SMB share and transfer files.

How To: A Hacker's Guide to Programming Microcontrollers

While hackers know and love the Raspberry Pi, many don't know of its cheaper cousin, the microcontroller. Unlike a Pi, which can be used more or less like a regular computer, microcontrollers like the Wi-Fi connected ESP8266 require some necessary programming skill to master. In this guide, we'll build an Arduino program from scratch and explain the code structure in a way anyone can understand.

How To: Use the Chrome Browser Secure Shell App to SSH into Remote Devices

Many guides on Null Byte require using the Secure Shell (SSH) to connect to a remote server. Unfortunately for beginners, learning to use SSH can become a confusing mix of third-party programs and native OS support. For Chrome OS users, using SSH is even more difficult. We'll fix this by using the Chrome Secure Shell to establish an SSH connection from any device that can run a Chrome browser.

How To: Use SSH Local Port Forwarding to Pivot into Restricted Networks

SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port forwarding, secure file transfer, and more. Using SSH port forwarding on a compromised host with access to a restricted network can allow an attacker to access hosts within the restricted network or pivot into the network.

How To: Build Wonder Woman's Armor for Halloween

Wonder Woman has always been a Halloween and cosplay staple. It's a costume that's both dependable and stylish — just like the Amazon who wears it. This year's reprise with Gal Gadot offers a fresh take on the old standby, with more muted colors, a tougher demeanor, and a decided lack of stars or stripes. Tahnee Harrison from CineFix's DIY Costume Squad has come up with a compromise between the old and new costumes. It's got the cut, styling, and details of Gal Gadot's 2017 costume, but the b...

Netflix 101: How to Cast Shows & Movies from Your Phone to Your TV

Chromecast comes to mind when "casting" video from a smartphone to a big screen television, but it's not the only way to "cast" streaming content. This is especially true for Netflix, where you can cast movies and TV shows to not only a Chromecast-enabled TV, but to smart TVs, video game consoles, and other streaming media players so that you have complete control right from your smartphone.

News: Stop Netflix from Eating Your Data While Streaming

If you don't have any home Wi-Fi, like to watch videos on public transportation, or just always find yourself streaming Netflix when there are no hotspots available, your cellular data is probably gobbled up fairly fast. For limited data plans, watching the next episode of your favorite TV show could mean overage charges on your cellular bill, but it doesn't have to.

HoloLens Dev 101: How to Use Holographic Remoting to Improve Development Productivity

Way back, life on the range was tough and unforgiving for a HoloLens developer. Air-tap training was cutting edge and actions to move holograms not called "TapToPlace" were exotic and greeted with skepticism. The year was 2016, and developers had to deploy to their devices to test things as simple as gauging a cube's size in real space. Minutes to hours a week were lost to staring at Visual Studio's blue progress bar.

How To: Set Up a Headless Raspberry Pi Hacking Platform Running Kali Linux

The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, broadcast an FM radio signal, and apparently even fly a goddamn missile into a helicopter.

News: Why You Should Care About the Nevada Woman Killed by the Totally Resistant Nightmare Superbug

Humanity is standing on an infection precipice. As antibacterial resistant grows, we're running out of options, and a recent scary case of total antibiotic resistance is a frighting view of our potential future. In the end, it was septic shock that took the life of a 70-year old woman with an incurable infection. One of few such cases in the US, her death could nonetheless be the shape of things to come.

How To: Make Companies Call You Back Instead of Waiting on Hold

Getting on the phone for customer service can be extremely frustrating. First you've got to find the correct phone number for your region (good luck trying to get customer service from a sales department), then you have to listen to the annoying automated system to navigate your way to the department you want. More often than not, you'll be stuck with some elevator music while you wait to speak to an actual human.

How To: Acorns App Makes You a Better Saver Without You Even Noticing

Investing is like exercise—we all know we should be doing more of it, but we often just can't find the time. I mean, really, who's got the hours, inclination, and skill to pour through volumes of data and put together a balanced yet sophisticated portfolio of investment vehicles tailored specifically to optimize their returns while mitigating potential risks. Not me, that's for sure.

How to Hack Wi-Fi: Creating an Evil Twin Wireless Access Point to Eavesdrop on Data

Welcome back, my greenhorn hackers! Now that we're familiar with the technologies, terminology, and the aircrack-ng suite, we can finally start hacking Wi-Fi. Our first task will be to creating an evil twin access point. Many new hackers are anxious to crack Wi-Fi passwords to gain some free bandwidth (don't worry, we'll get to that), but there are so many other Wi-Fi hacks that are far more powerful and put so much more at risk than a bit of bandwidth.