Completes Search Results

How To: Write Your Own Bash Script to Automate Recon

Automation has been a buzz word for quite some time now, but the principles behind it are as strong as ever. For a hacker or pentester, Bash scripting is one form of automation that cannot be ignored. Virtually any command that can be run from the terminal can be scripted — and should be, in many cases — to save valuable time and effort. And a Bash script just happens to be great for recon.

News: Apple Just Released iOS 13 Public Beta 2, Includes FaceTime Attention Correction, Cursor Sizing Options & More

The third developer beta for iOS 13 has been out since July 3, and while devs have had fun exploring all the new features, those of us on the public beta have sat on the sidelines running the public version of dev beta 2. But we don't need to wait any longer, as Apple just released iOS 13 public beta 2 and all the goodies that come with it.

News: Apple Releases iOS 13 Developer Beta 2 with Config Profile OTAs, Plus Controls & New Effect for Portrait Lighting

There's no doubt iOS 13 has dominated the talk around the Apple community this month. Since the announcement and release of the first developer beta, we iPhone users have had a treasure trove of new features and changes to explore and discuss. Now the fun continues with iOS 13 dev beta 2. Who's ready to start up the conversation all over again?

How To: Use Linux Smart Enumeration to Discover Paths to Privesc

Privilege escalation is the technique used to exploit certain flaws to obtain elevated permissions relative to the current user. There are a vast number of methods out there to go from user to root on Linux, and keeping track of them all can be difficult. This is where automation comes into play, and a privilege escalation script called Linux Smart Enumeration is one to take advantage of.

How To: 23 Things Your iPhone's Volume Buttons Can Do Besides Volume Adjustments

The volume buttons on the side of your iPhone can do more than just adjust the volume levels for media, ringers, alerts, Siri, and other sounds and voices. You can use them to perform different actions in certain apps and even create custom actions using the Shortcuts app. It's not exactly button mapping, but it's as close as you'll get without jailbreaking iOS.

How To: Brute-Force FTP Credentials & Get Server Access

Hackers often find fascinating files in the most ordinary of places, one of those being FTP servers. Sometimes, luck will prevail, and anonymous logins will be enabled, meaning anyone can just log in. But more often than not, a valid username and password will be required. But there are several methods to brute-force FTP credentials and gain server access.

How To: Program MicroPython NeoPixel Holiday Lights to Animate However You Want

Individually addressable LEDs, also commonly called "NeoPixels" after the popular Adafruit product, are a bright and colorful way to get started with basic Python programming. With an inexpensive ESP8266 or ESP32 microcontroller, it's easy to get started programming your own holiday lighting animations on a string of NeoPixels with beginner-friendly MicroPython!

How To: Make a Napkin Swan (Or Napkin Peacock)

Need a lavish way to present your napkins at your next big dinner feast? May we suggest napkin swans? Folding a dinner napkin into a beautiful swan (or peacock) can take you just minutes and completes a dinner table. The idea behind the fold is to shape it so that one end looks like the long, languorous tail feathers of a peacock, but it could look like a swan, too.

How To: Create a cute curl on short hair

The young female presenter starts by recommending the Chi Turbo Digital Ceramic Spring Curling Iron for the project. She starts the hairstyle by sectioning the top half of hair and clipping it to the top of her head. Then she takes a 1 to 1 1/2 inch strand of hair from the bottom layer and curls it outwards (away from her face). When she releases the hair from the curling iron, she lets the hair hang to cool before styling it. She switches to the other side of her face and takes another stran...

How To: Make a berry yogurt tart

Chef Leslie Mackie demonstrates how to make berry yogurt tart - a delectable yogurt and mixed berry filling completes this basic tart. They start with eggs and sugar and then add vanilla, almonds, and berries to make this tart. Make a berry yogurt tart.

How To: Make a Thai-style green papaya salad

This authentic green papaya salad is made in a North Thailand way that is sure to keep you coming back for more! No only will you learn this magnificent recipe, but you'll learn how to make sure you have the perfect papaya from the grocery shop, which can be a bit tricky.

How To: Make a Simple Touch-Triggered Transistor Relay

In this article, I'll show you how to make a simple touch-triggered switch. This is very useful for various electronic projects, from a simple bedside light to a flat panel touch keyboard. The circuit can vary in switching power depending on the transistors you use. For example, if you're looking into creating a 120V light that turns on when touched, you'd need two powerful transistors and an isolation relay. However, a simple flashlight that turns on when touched would only take a couple of ...

News: Make Insulating Glass Conductive with a Blowtorch!

Have a few light bulbs and a blowtorch? Then join the folks over at Harvard in a cool science experiment on the conductivity of glass. As you well know, glass is an insulator with low conductivity and high resistivity. In the video below, they flip the switch, demonstrating how heating the glass fuse enclosure from an incandescent light bulb can create a conductive material that completes the series circuit and lights the second light bulb. In the video, the two light sockets are wired in ser...

Cocktail Couture: Robotic Booze Generating Dress

Meet DareDroid: sexy nurse, geek couture and mobile bartender, engineered into an all-in-one technologically advanced garment. Created by fashion designer Anouk Wipprecht, hacker Marius Kintel, and sculptor Jane Tingley, the team calls themselves the Modern Nomads (MoNo), and their series of garments fall into Wipprecht's invented family of "Pseudomorphs". Pseudomorphs are tech-couture pieces that transform into fluid displays—which is exactly what DareDroid does.

News: Codewars

I've been frequenting this website I recently found out about called Codewars.com. It's pretty neat! In order to sign up, you need to pass a few simple coding tests and then you can start taking on the challenges, which they call kata. Basically, you are given a task and have to write a function that completes the given task and have to test it out on a bunch of test cases they give you. Once you pass the test cases, you can submit it and gain reputation points. It seems like a really good wa...

How To: A Beginner's Guide to Appreciating Bourbon Whiskey

Bourbon is the ultimate American spirit, considering the barrel-aged distilled spirit was originally produced in an area known as Bourbon County, Kentucky. To meet the legal definition of bourbon, it must be produced in the United States, must be created with at least 51% corn, and aged in new oak barrels. There are two types of bourbon whiskeys—straight and blended. Straight bourbon means that the bourbon has been aged for a minimum of 2 years, and has no other coloring or flavoring added. B...

Dungeon Defenders: Heaven for Hardcore Gamers

Dungeon Defenders is the most exciting craft game on the Fall 2011 release schedule. I got a chance to play it at PAX in August and interviewed developers Trendy Entertainment last month. After more than a year of publishing difficulty and delay, the game finally came out on PSN, XBLA and Steam. I put about 20 hours into the XBLA version over the past weekend, beating all the campaign maps and racking up a huge pile of in-game money. It is not a perfect game. But it is a huge, challenging, an...

News: Foreign Countries

International Pet Travel: Taking Your Pet Animal to a Foreign Country If you are taking a pet to another country (permanently or for a visit), contact that country's consulate or embassy for information about any requirements that you must meet. A list of consulates can be found at Foreign Consular Offices in the United States

How To: Play The Card Game "Seven Eight"

This is a game played by 2 players. It cannot be played by more than 2 players and is played using 30 cards. Regular jokers have no role here. However there are 2 additional jokers, the seven of hearts which is the big joker and the seven of spades which is the small joker.

Next Page