Dedicate Search Results

How To: Unclutter your CD & DVD collection

With the CDs and DVDs you want to do less purging and more organizing. A good way to unclutter your DVDs is to dedicate a bookshelf to your collection. Put the adult movies on top and alphabetize them so that they are up away from the kids reach. Put the movies for the family and kids down lower so that they can get to their movies and watch them. For the CDs a binder will hold a lot of them and allow you to get rid of all the hard plastic cases. You can put hundreds in just one binder. A gre...

How To: Make a Scorpio fall in love with you

Playing hard to get doesn't work with a Scorpio; they only respond to slavish devotion. So drop everything and dedicate your time solely to the Scorpio in your life. Learn how to use astrology advice in dating, by watching this how-to video. Pick up tips on making a relationship with a Scorpio work.

How To: Pray the Rosary

Praying the rosary is one of the Catholic church’s most popular devotions and enduring images. You may want to dedicate the Rosary to a specific intention, like a sick friend or relative.

How To: Build a retaining wall to flatten a sloped lawn

In this video you will learn how to build a retaining wall to flatten a sloped lawn. He says that if someone wants to garden but their yard is sloped and they know they can't do it, they should know that this is a lot of work. So be prepared to dedicate a lot of time and effort. You start by getting a building permit. If you're looking to build a low retaining wall you start by digging a trench a little wider then the stones and a few inches deep (the higher the wall the deeper the trench). F...

CES 2016: LG Shows Off Its Newspaper-Like Flexible Screen

LG literally rolled out a prototype of its cutting-edge flexible display at CES 2016 in Las Vegas. The company showed off an 18-inch screen with 1,200 x 800 pixel resolution that you can roll up like a magazine or newspaper and take with you. And while an 18-inch HD screen that rolls up is already pretty impressive, LG plans to build them up to 55 inches and beyond, with 4K resolution.

How To: The Deliciously Lazy Way to Make Creamy Risotto at Home

Why are people so afraid of risotto? Contrary to what a lot of home cooks seem to believe, it's really not a difficult dish to make yourself. Sure, there's a lot of stirring involved, but it's not nearly the culinary beast it's made out to be. The real deterrent to making homemade risotto isn't that it's hard—it's that it requires a lot of attention. Risotto needs a lot of babying. Part of the process involves standing over it for 20 to 30 minutes at the stove, stirring almost constantly whil...

How To: Get Started with Python with This One-Hour Course for Just $14.99

If you have information technology or computer science aspirations — even white hat hacking — then Python is a programming language you absolutely have to be familiar with. According to a recent survey of industry experts, Python is the fastest-growing language in the developer field. It's also one of the most sought-after skill sets among employers and is responsible for some of the best hacking tools.

Hack Like a Pro: How to Spy on Anyone, Part 2 (Finding & Downloading Confidential Documents)

Welcome back, my tenderfoot hackers! A short while ago, I started a new series called "How to Spy on Anyone." The idea behind this series is that computer hacking is increasingly being used in espionage and cyber warfare, as well as by private detectives and law enforcement to solve cases. I am trying to demonstrate, in this series, ways that hacking is being used in these professions. For those of you who are training for those careers, I dedicate this series.

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 21 (GRUB Bootloader)

Welcome back, my aspiring hackers! Many of you have installed Kali Linux as a virtual machine (VM) using VMware or VirtualBox, while others have installed Kali (or BackTrack) in a dual-boot system. The drawback to installing these hacking systems as a VM is that it then requires an external wireless adapter (your wireless adapter is piped through the VM as a wired device, eth0), but it makes for a great place to test your hacks while honing your skills.

Hack Like a Pro: The Basics of the Hexadecimal System

Welcome back, my novice hackers! It has become clear from some of your questions that quite a few of you are unfamiliar with the hexadecimal system, or simply, hex. The hexadecimal system is used throughout computing and if you have never studied this Base16 numering system, it may appear relatively opaque.

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 1 (Getting Started)

Welcome back, my hacker trainees! A number of you have written me regarding which operating system is best for hacking. I'll start by saying that nearly every professional and expert hacker uses Linux or Unix. Although some hacks can be done with Windows and Mac OS, nearly all of the hacking tools are developed specifically for Linux. There are some exceptions, though, including software like Cain and Abel, Havij, Zenmap, and Metasploit that are developed or ported for Windows.

Hack Like a Pro: Snort IDS for the Aspiring Hacker, Part 3 (Sending Intrusion Alerts to MySQL)

Welcome back, my hacker novitiates! If you have been following this new Snort series, you know that Snort is the world's most widely used intrusion detection/protection system. Now a part of the world's largest network equipment company, Cisco, it is likely to be found everywhere in one form or another. This makes a compelling argument for learning how to use it, as it will likely be a necessity in any security-related position.

How To: Set Up SoftEther VPN on Windows to Keep Your Data Secure

Imagine for a moment that a VPN is like putting on a disguise for your computer. This disguise works to change your IP address, secure your traffic with encryption, and mask your location to bypass regional restrictions. This makes it a helpful tool for both whistleblowers and journalists. VPNs are also built into the well-known Tor Browser.

How To: Writing 64-Bit Shellcode - Part 1 (Beginner Assembly)

In this simple tutorial you will be shown step-by-step how to write local shellcode for use on 64-Bit Linux systems. Shellcode is simple code, usually written in assembly that is used as payload in exploits such as buffer overflow attacks. Payloads are the arrow head of an exploit: though the rest of the arrow is important for the delivery of the attack, the arrow head deals the killing blow. In reality, payloads are slightly less exciting yet far more interesting and intelligent than medieva...

News: A Brief History of Hacking

Welcome back, my fledgling hackers! Hacking has a long and storied history in the U.S. and around the world. It did not begin yesterday, or even at the advent of the 21st century, but rather dates back at least 40 years. Of course, once the internet migrated to commercial use in the 1990s, hacking went into hyperdrive.

How To: Make the Most of Your Google+ Page

Now that it's been a week since Google+ rolled out pages, we've gotten over our euphoria at finally getting the feature after a long wait, and reality is starting to sink it. It's not as flexible as a Facebook page, it seems to be time consuming, and you can't even get a unique URL. On the other hand, your Google+ page will show up in Google searches, and help bump you up a bit. Here's how the search stacks up when I search for "WonderHowTo" in Yahoo! vs. Google (Note: I've turned on private ...

Next Page
Prev Page