Ever Escalating Search Results

How To: Solo over Carlos Santana's "Samba Pa Ti" on ukulele

Ever wanted to solo over the chord progression from Carlos Santana's "Samba Pa Ti" on your ukulele? Who hasn't, right? This ukulele lesson presents a quick overview of a highly adaptable G scale pattern that works over the progression in Carlos' Santana's "Samba Pa Ti." For more information, or to get started soloing over Santana's "Samba Pa Ti" on your own ukulele, take a look.

How To: Fish for Trout

In this how-to video you will learn what trout eat and what lives on the river bottom. Have you ever wondered what you have to do in order to properly fish for trout? This clip explains what you will need in order to find these trout.

How To: Identify trees and their uses

Ever wonder what tree is which in the bush, or what each tree is useful for? This video tutorial will show you how to identify the various trees that are useful in Bushcraft. Andrew Price explains the difference between the trees, like Ash, Beech, Holly, and Elder trees, and their uses. If you need to survive in the wilderness, this is a great way to do it.

How To: Hack an elevator to go directly to your floor

Going up? This video will teach you how to hack an elevator, making it go directly to the desired floor without stopping. If you're ever in a hurry or, heaven forbid, a genuine emergency and need to get to the bottom or top floor quickly, you'll be very happy you watched this how-to video. Learn how to enable the "express mode" in most any modern elevator with this great pushbutton hack!

How To: Hack Software & Run a Trial Program Forever

With this video tutorial, you'll learn how to hack demo versions of applications such that they'll run indefinitely. You'll just need to modify the date and time on your computer. Learn how to use trials of programs without them ever expiring instead of buying the real thing with the hack outlined in this how-to video.

How To: Remove hair color/makeup stains with tea tree oil

If you've ever suffered from acne you've probably also suffered from choosing an acne product that actually works. Some cleansers and moisturizers are too drying, others are harsh and stinging, and some feel good on skin but just don't work. But if you've ever stumbled upon tea tree oil, then you know that this natural oil both moisturizes and helps relieve acne with no unpleasant side effects.

How To: Properly write business e-mails

Now, more than ever, many companies rely on using emails to send bits of information around faster than normal. Not only does it save paper, but allows work to get done faster than it ever has. But, if you don't know how to write a proper business email, it can be tricky. That's why this tutorial will show you how to write them so you don't have to worry about a lack of professionalism. Enjoy!

How To: Password protect your wireless network

Most of the home wireless networks are not set up by professionals and hence they might lack in security features. People just set up the wireless networks by connecting the devices and powering them up and never care to apply security settings to the network. This may result in your wireless network being compromised by unwanted external entities. How ever you can do a web based configuration settings and secure your wireless network by password protecting it. This settings differ from the m...

How To: Create soft, tossled curls using a flat iron

This video teaches you to use a flat iron to make gorgeous curls in your hair. The video shows the benefits of using a flat iron as opposed to using a curling iron. She takes you step by step through the process of using a flat iron to make some of the best curls in your hair you have ever experienced. Everything you need to know about curling your hair with a flat iron can be found in this video. This technique make it simple to make the best curls you have ever seen and felt, yes felt! This...

How To: Touch of the roots of your hair in a hurry

Watch Princess Pinkcat as she shows you how to touch of the roots of your hair in a hurry. Have you ever been heading out the door when you realized your roots were showing? Have you ever been asked out at the last minute and left without time to dye your hair or touch up your roots? Here's a quick tip to help you take care of those roots in less than 2 minutes flat.

How To: Perform the best math card trick ever

There are good magic tricks, and there are bad magic tricks. The host of this video tutorial might not be the most skilled magician around, but he's a pretty good judge of card tricks. Check out how to perform the best math card trick ever! With just a little math and a little magic, your spectators will be astonished. See the reveal and explanation. This card counting trick will always work and it will amaze your best friends.

News: Apple Fixes Group FaceTime Security Bug with Release of iOS 12.1.4, Available Now

Apple found itself in serious trouble last week when a teenager discovered a critical FaceTime bug that threatened the security of nearly every iPhone user. The bug enabled a user using Group FaceTime to access either the microphone or the camera of a recipient before they answered the call. According to Apple, the issues have been fixed in an iOS 12.1.4 update released Thursday, Feb. 7.

How To: Use SQL Injection to Run OS Commands & Get a Shell

One of the ultimate goals in hacking is the ability to obtain shells in order to run system commands and own a target or network. SQL injection is typically only associated with databases and their data, but it can actually be used as a vector to gain a command shell. As a lesson, we'll be exploiting a simple SQL injection flaw to execute commands and ultimately get a reverse shell on the server.

How To: Perform Local Privilege Escalation Using a Linux Kernel Exploit

Getting root is considered the Holy Grail in the world of Linux exploitation. Much like SYSTEM on Windows, the root account provides full administrative access to the operating system. Sometimes even a successful exploit will only give a low-level shell; In that case, a technique called privilege escalation can be used to gain access to more powerful accounts and completely own the system.

How To: Exploit Shellshock on a Web Server Using Metasploit

One of the most critical bugs to come out in the last five years was Shellshock, a vulnerability which allows attackers to execute arbitrary code via the Unix Bash shell remotely. This vulnerability has been around for a while now, but due to the ubiquity of Unix machines connected to the web, Shellshock is still a very real threat, especially for unpatched systems.

How To: Block apps and people from interacting with you on Facebook

Maybe you're tired of receiving annoying messages from apps or people on Facebook? Why not block them so you don't have to deal with them ever again? Take a look at this guide for information on how to block online games and apps on Facebook from sending you notifications, requests, or other information. You can even stop people on Facebook from sending you event notifications or posting on your page by blocking them too.

How To: Do Lady Gaga's "Born This Way" makeup look, horns and all

If you're a Little Monster, than surely you've seen the single cover art for Lady Gaga's new hit "Born This Way". On the cover, she looks as crazy as ever, and in this makeup tutorial, you'll learn how to mimic the look, right up to the protruding horns. Surely, this is a look for the stage and not one you're likely to wear outside on a normal day—but it's fun to play around with and perfect—Gaga-style!