Explicit Search Results

How To: Make a sine & cosine curve Rhino's Explicit history

In this Rhino video tutorial we cover how to make a sine and cosine curve with Explicit History (Grasshopper). The initial set up for this Rhino tutorial can be used to test any of the math functions. We set up a a simple interface to drive range parameters which can then connect to many of the scalar components. Get better at your math skills for modeling in Rhino with this 3D software tutorial. This Rhino video is best viewed full screen. Make a sine & cosine curve Rhino's Explicit history.

How To: Install Explicit History plugin (Grasshopper) in Rhino

Grasshopper is a new plug-in that David Rutten is working on for Rhino. It has similar functionality to GC but at this point if not so component based. It is more like GC in that it uses features and stores them as nodes you can rearrange and change hierarchy’s. In this video David covers where to find the plug-in, how to install it and then the very (let me emphasize the VERY) basics of the interface. Learn how to install and get started using the Explicit History plug-in (also known as Gras...

News: Publishers to Profit from Explicit Drawing Inside Used Wii Video Game?

The used video game market represents a huge portion of retail game sales. It's the only avenue in which most people can afford to buy AAA games. But game publishers aren't exactly big fans of used game sales, since they only benefit from gamers buying new ones. GameStop and Best Buy are huge corporate interests, so EA and the rest of the big publishers out there have not been able to push them around on the issue of used game sales... so far.

How To: Origami a Christmas star aka Spiked Dodecahedron (SPD)

The Origami Spiked Pentakis Dodecahedron is an excellent Paper Christmas Decoration Star made out of 15 paper squares. In spite of the large paper size I was defeated by the last module after nearly 2 hours (!) of trying to lock the last unit in place each time another one dislodged. Never mind, it is still a remarkable sound structure once (nearly) completed and you can not see which one is not locked anyway.

How To: Split an Apple in Half with Your Bare Hands

Have you ever looked at a piece of fruit and thought to yourself, "you suck, fruit, sitting there all smug and happy, I wish I could just destroy you here and now?" If so, read on—your favorite Fat-man is going to show you how you can get your revenge on that happy smug fruit sitting in your fridge by breaking an apple in half with your bare hands.

Best Music Streaming Services: Spotify vs. Apple vs. Pandora vs. Tidal vs. Deezer vs. Amazon

Trying to figure out which music streaming service to subscribe to can be a difficult task when the playing field is so crowded. Each has its benefits, as well as downsides, so finding the right one for your needs and wants can take a lot of overwhelming research. But we've done all the research for you to help you find the best music subscription your money can buy.

How To: Use Samsung Health to Diagnose Symptoms from the Privacy of Your Phone

You really can't go wrong with Samsung Health when it comes to staying on top of fitness-related data. Its features help you keep track of workouts, track calorie and nutrition intake, and monitor your heart rate, just to name a few. And if you start exhibiting symptoms you've never had before, you can even use the app to find out more about what's wrong with you.

How To: Hide DDE-Based Attacks in MS Word

In a previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when a Microsoft Word document is opened. The biggest challenge of this attack is that it requires getting the user to agree to a pop-up prompt. Fortunately, since I posted that article, many new obfuscation techniques have been discovered to make this easier. Today, we explore and combine some of them to make the ultimate hidden DDE attack.

How To: Exploit DDE in Microsoft Office & Defend Against DDE-Based Attacks

In our previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when an MS Word document is opened. Because Microsoft built DDE into all of its Office products as a way to transfer data one time or continuously between applications, we can do the same thing in Excel to create a spreadsheet that runs malicious code when opened. The best part is, it will do so without requiring macros to be enabled.

How To: The 15 Most Popular Talks from DEFCON's Hacking Conferences

Every summer for the last 26 years, hoards of hackers have descended on the Las Vegas Strip for DEFCON, the biggest hacker conference in the US. There's a wealth of talks every season (DEFCON 27 has at least 95 scheduled), and there have been some essential topics to learn from in past discussions. We've dug through the last ten years and found the 15 most popular talks you should watch.

How To: The White Hat's Guide to Choosing a Virtual Private Server

Conducting phishing campaigns and hosting Metasploit sessions from a trusted VPS is important to any professional security researcher, pentester, or white hat hacker. However, the options are quite limited since most providers have zero-tolerance policies for any kind of hacking, good or bad. After researching dozens of products, we came out with 5 potentials that are ideal for Null Byte readers.

How To: 6 Home Screen Hacks for Your iPhone Apple Won't Tell You About

Apple offers many ways to customize the Home Screen on your iPhone, from adding widgets and scheduling rotating wallpapers to hiding apps and entire pages. But some of the best ways to customize your Home Screen are options Apple won't even tell you about, either because they haven't become official features yet or because Apple is OK with the workarounds.

Prev Page