Discovered Search Results

How To: Create a drowning trap for a creature spawner in Minecraft

So during your time creating mines and exploring various cave systems you probably have discovered a few hidden coves with strange flaming cages in them. Those are creature spawners, they create zombies, skeletons, creepers and more. If you destroy it they stop coming out, but, if you leave it alone, they continue to spawn, now wouldn't it be great if you could create a way of being able to harvest the loot drops from them with little to no effort? Check out this video, in it, you will learn ...

How To: Draw a large room with sectioned off spaces

When vanishing point perspective was first discovered in the early Renaissance, artists were astounded by how the draftsman tool was able to transform a flat, 2D space (that until then always looked like a flat, 2D space without perspective) into a believable 3D image. We've been using vanishing point perspective ever since, and architects would die without it.

How To: Get Perfectionist achievement in Dragon Age: Origins

Attention all achievement hunters! It's time for, yet, another achivement tutorial. This time the game is Dragon Age: Origins. For this tutorial, you'll be finding out how to get the Perfectionist achievement in the game. This can only be obtained after you've played across all the playthroughs and discovered all the possible endings.

How To: Make all Facebook emoticons

Facebook is a wonderful website where you can connect and keep up to date with your friends. Facebook has some useful features like chat. Facebook chat can be used to chat in live with your online friends. The chat also supports smileys. Using different character combination you can create different smileys. To create the happy smiley type :). To create sad smiley use :(. Use :P to show a funny smiley. These are the basic smileys. There are many more smileys present like the one showing teeth...

How To: Make killer loops in Reason with David Spoon

British record producer David Spoon explains how he uses the computer program Propellerhead Reason 4 to create rhythm and bass tracks in his home music studio. He explains that by just messing around with the controls within the program, you can create a lot of interesting sounds and effects. Sometimes the best sounds are discovered by accident. He uses Filter 2 to create interesting effects that he describes as "acid-y" or "nasty", having to do with the resonance of the bass sound. He also a...

How To: Make traffic lights change w/secret code (FAUX-TO?)

Nobody likes having to stand at the crosswalk waiting for the light to change so you can cross. This seems to happen more times then not these days. A way has been discovered to eliminate this problem with ease. The first thing you are going to want to do is go to the pole that has the button to push for the crosswalk. Once you get there you are going to want to enter a combination of long and short clicks to get the light to change so you can cross. The first combination is going to be three...

How To: Make mango chutney

Chutney is a term for a class of spicy preparations used as an accompaniment for a main dish such as chicken or fish. Serve this delicious mango chutney with your prepared fish or chicken dish tonight.

How To: Pick hard locks in Fallout 3

If you've been playing Fallout 3, you may have discovered that picking the locks in Fort Constantine is fairly difficult. Thankfully, this video clarifies how you can pick these locks without going through a bunch of bobby pins.

How To: Grow orchids

Although most of us can't grow Mangoes or Avocados or some of the other plants we're looked at, most everyone can grow or enjoy Orchids. Today they're readily available and there are thousands of species and it's believed there are thousands that have yet to be been discovered. Considering the way they're propagated today and the many places they're sold there is no reason we all shouldn't be growing Orchids. Karen had a fear of growing Orchids, thinking they were difficult to grow. She recei...

How To: Leverage a Directory Traversal Vulnerability into Code Execution

Directory traversal, or path traversal, is an HTTP attack which allows attackers to access restricted directories by using the ../ characters to backtrack into files or directories outside the root folder. If a web app is vulnerable to this, an attacker can potentially access restricted files that contain info about all registered users on the system, their permissions, and encrypted passwords.

How To: Protect Your Identity After the Equifax Cyberattack

Equifax reported on Sept. 7 that it discovered a breach on July 29 which affects roughly half of Americans, many of whom don't realize they have dealings with the company. Hackers got away with social security numbers, addresses, and driver's license numbers, foreshadowing a "nuclear explosion of identity theft." Let's explore what really happened and what you and those around you can do to protect yourselves.

News: Apple Fixes Group FaceTime Security Bug with Release of iOS 12.1.4, Available Now

Apple found itself in serious trouble last week when a teenager discovered a critical FaceTime bug that threatened the security of nearly every iPhone user. The bug enabled a user using Group FaceTime to access either the microphone or the camera of a recipient before they answered the call. According to Apple, the issues have been fixed in an iOS 12.1.4 update released Thursday, Feb. 7.

How To: Organize your closet yourself

Do it yourself closet organization can be quite a journey, even with the best advice. Meghan Carter discovered first-hand the trials and tribulations of closet organization as she put herself under the scrutiny of professional organizer Cynthia Ivie. But in the end, Meghan not only organized her closet, but found a great excuse to go shopping.

How To: The Beginner's Guide to Defending Against Wi-Fi Hacking

Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a few simple actions, the average user can go a long way toward defending against the five most common methods of Wi-Fi hacking, which include password cracking, social engineering, WPS attacks, remote access, and rogue access points.

How To: Use Maltego to Fingerprint an Entire Network Using Only a Domain Name

Hackers rely on good data to be able to pull off an attack, and reconnaissance is the stage of the hack in which they must learn as much as they can to devise a plan of action. Technical details are a critical component of this picture, and with OSINT tools like Maltego, a single domain name is everything you need to fingerprint the tech details of an organization from IP address to AS number.