Facilitates Search Results

How To: Make a Sequel to a Game

If your company has already released some popular and addictive game and you're thinking about creation a sequel, this article is just what you need. We gathered the main tips and advices that will be useful for the building a strategy and a sequel itself. Check out the following instructions and recommendations that can lend you a hand in making a sequel for your game.

How To: Use Android Device Manager to Find, Wipe, & Lock Your Android Phone or Tablet

If you haven't heard yet, Google made it possible a couple months ago for every Android user running 2.2 or higher to track his or her smartphone or tablet using their Android Device Manager service. It's a super easy way to track, lock, and secure erase your Android device from the web without ever having to download a third-party application, like Droid Finder, since it occurs in the background via Google Services.

How To: Use the Koadic Command & Control Remote Access Toolkit for Windows Post-Exploitation

Koadic allows hackers to monitor and control exploited Windows systems remotely. The tool facilitates remote access to Windows devices via the Windows Script Host, working with practically every version of Windows. Koadic is capable of sitting entirely in memory to evade detection and is able to cryptographically secure its own web command-and-control communications.

How To: Drill a live rock for a saltwater reef tank

This is a video showing the drilling of live rock from a saltwater reef tank. The 1/2" holes are used for mounting pegs made from acrylic rods or other types of pegs or frag plugs. The live coral are attached to the end of the peg and can easily be positioned in the tank. This process also facilitates moving the coral to another location at a later time, they can be removed from the holes somewhat easily. It also prevents coral from falling as once its pegged well, its pretty much going to st...

Next Page