Exchanged Search Results

How To: Find the Left 4 Dead 2 easter egg in the Dead Rising 2: Case West DLC

Zombies have followed hot on the heels of vampires as the monster du jour in modern America, and this has been particularly pronounced in video games for some reason. Gamers dig zombies, we suppose. The zombie game folks are even developing some camaraderie amongst themselves, as evidenced by the easter eggs exchanged in Left 4 Dead 2 and Dead Rising 2: Case West. This video will show you where and how to find a Left 4 Dead 2 reference / easter egg in Dead Rising 2: Case West.

How To: Pack your wallet for an itnernational trip

With all the documents ready, we need to fill our wallet with money for the travel. This video discusses various ways of filling the pocket. That is how to prepare the money for international travel. Over the years credit cards have been widely used by many travelers, which is safer than carrying cash. In this case we need to contact the credit card provider well in advance and notify them about the travel. Also we need to learn about the various fees applicable to international purchases. Th...

How To: Stump people with a cork trick

In order to stump drunk people with a cork trick, you will need the following: 2 corks per person. Tuck the cork between the thumbs and forefingers. The rules are that you have to switch out the corks without using any other fingers, besides the thumbs and forefingers, and the exchange must be simultaneous.

How To: Make a circle friendship bracelet

A little girl from Live Love Embroidery explains, in this video, how to make a circle woven friendship bracelet. The process involves seven strands of embroidery thread tied at the end with a simple half-hitch knot. The knot is fed through a small hole in the center of a circle of cardboard. The strings are then individually latched through seven of eight notches located at the end of the cardboard. After that, rotating in a circle pattern around the cardboard, the strings are exchanged aroun...

How To: Solve linear inequalities

In this video you can learn how to solve linear inequalities. Understand the basics of inequalities and linear equations. In an inequality, we say that that one number is greater than (>) another number or less than (<) another. On occasion we say that something is greater than or equal to, or less than or equal to. In a basic linear equation, we solve for the variable of x by subtracting the value from the opposite side or the = sign. Start by writing your equation on a sheet of paper. It wi...

How To: Make Your Own Soda Pop at Home with a DIY Carbonation Kit

Even if you're not a hipster with your own self-sufficient garden, making your own edibles at home can be pretty cool. And while it's obviously easier to pick up a bottle of 7-Up at the store, there's something undoubtedly fun about making your own. For those addicted to their fizzy drinks, DIY soda is a great way to save some cash and make their drinks healthier with natural flavors and sweeteners, instead of something like corn syrup or aspartame.

How To: Spy on SSH Sessions with SSHPry2.0

SSH, or the secure shell, is a way of controlling a computer remotely from a command-line interface. While the information exchanged in the SSH session is encrypted, it's easy to spy on an SSH session if you have access to the computer that's being logged in to. Using a tool called SSHPry, we can spy on and inject commands into the SSH sessions of any other user logged in to on the same machine.

How To: Buy Used Phones Without Getting Screwed

I've seen my fair share of heartbreaks when it comes to used phones. As a repair tech, I often had to try and help out customers who bought used handsets which turned out to be useless, either because it was stolen or not working on their carrier's network. More often than not, there was very little I could do. To help you from being stuck in the same situation, here are some tips to prevent you from getting scammed out of your hard earned money when buying a used handset.

How to Hack Wi-Fi: Disabling Security Cameras on Any Wireless Network with Aireplay-Ng

Electronic warfare tactics work by jamming, disrupting, or disabling the technology a target uses to perform a critical function, and IoT devices are especially vulnerable to attacks. Wireless security cameras like the Nest Cam are frequently used to secure critical locations, but a hacker can surgically disable a webcam or other Wi-Fi connected device without disturbing the rest of the network.

Hack Like a Pro: Cryptography Basics for the Aspiring Hacker

Welcome back, my rookie hackers! As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be able to crack passwords and encrypted protocols such as SSL and wireless, you need to at least be familiar with the concepts and terminology of cryptography and encryption.

How To: Mine Twitter for Targeted Information with Twint

Open-source intelligence researchers and hackers alike love social media for reconnaissance. Websites like Twitter offer vast, searchable databases updated in real time by millions of users, but it can be incredibly time-consuming to sift through manually. Thankfully, tools like Twint can crawl through years of Twitter data to dig up any information with a single terminal command.

How To: Use Maltego to Target Company Email Addresses That May Be Vulnerable from Third-Party Breaches

The easiest way around a security policy is to find users who don't follow it. The Have I Been Pwned database identifies accounts with information breached by major third parties like Yahoo and LinkedIn. With Maltego, hackers can locate breached accounts created using company email addresses, potentially giving attackers access to a company account if the employee reuses a compromised password.

How To: Use Kismet to Watch Wi-Fi User Activity Through Walls

Your home has walls for privacy, but Wi-Fi signals passing through them and can be detected up to a mile away with a directional Wi-Fi antenna and a direct line of sight. An amazing amount of information can be learned from this data, including when residents come and go, the manufacturer of all nearby wireless devices, and what on the network is in use at any given time.

News: 10 Peculiar Game Rules for Competitive Scrabble Tournaments

The 2011 Toronto International Scrabble Open (TOSI) took place last weekend, with former World Champion Adam Logan beating out all of the human competition for the $3,000 grand prize. But when it came time to take on the Quackle program in the Human vs. Computer Showdown, he lost his first two games and won the last two, ultimately losing with a measly 28-point differential of the combined total scores. But he still came out three grand happier.

News: Brazil keeps getting away with more than two hands.

If you happened to be watching Brazil vs. Portugal, you might have noticed something weird in keeper Julio Cesar's back after he and Meirelles collided. It was some kind of steel rod support for his injured back. According to FIFA article 4, it's illegal for players to wear any kind of equipment that can be dangerous to the player wearing it or to others. This is the reason players can't wear chains around their necks, or rings in their fingers, since these things can get caught with other pl...

How To: Answer to Scrabble Challenge #20

It's sad to say, but I will no longer be writing up anymore Scrabble Challenges. Frankly, I just don't have the time to make them now. And though they are incredibly fun and "challenging" to conjure up, I'm not sure that people are finding them as useful as I had hoped. But really, it all comes down to time. So, unless I have a future craving for puzzle-making, last week's Scrabble Challenge #20 was the last one.

Next Page
Prev Page