Ini Yang Search Results

How To: Boot into safe mode in Windows XP operating system

This video will show you how to boot in safe mode on Windows XP. Just follow these instructions from the video. Now go to Start -> Run and type in msconfig. and click OK. Now select the BOOT.INI tab and select /SAFEBOOT, click apply and close and then it will prompt you to restart. After you restart a message will appear. Click Yes and you will notice that your screen resolution is small and you will have the classic theme. To return to normal mode just repeat the steps and uncheck the BOOT.I...

How To: Clear Your Internet Cache

In this tutorial, we learn how to clear an internet cache with Don Schechter. First, you need to click on the start menu, then find the "run" link. Type in "Msconfig", then click "ok". Now, click on the "general" tab, then click on the button next to "selective startup". Now, unclick the check marks next to "process systyem.ini, process win.ini, and load startup items". Click "ok", then restart your computer. Now, go to the "system tools" program in your Control Panel and select the file you ...

How To: Install Joomla CMS 1.0.13 on Windows 2003 with IIS

If you have been looking for a way to get the popular Joomla Content Management system running on Windows with IIS, you may have run into many problems. In fact, many people spend days trying to get Joomla running on IIS and run into roadblock after roadblock. The problem is getting PHP, MySQL, Joomla and IIS to all play nicely together. As you search for solutions, it is easy to find part of the answer, but rarely do you find it all in one place... until now. In this video tutorial we start ...

How To: Hack Microsoft Windows 7 upgrade limitations

There are a couple of limitations that Microsoft put in to Windows 7 upgrades that can prevent users from upgrading and ultimately force them to do a clean install. First limitation is that they won't let you to upgrade Windows 7 if you run Windows 7 release candidate that was released earlier this year, which they won't let you to upgrade to a download Windows edition. If you are running Windows vista ultimate you cannot upgrade windows 7 professional. We have to buy an ultimate edition then...

How To: Make a Gemini fall in love with you

The trick to winning a Gemini’s heart is to be the yin to their yang. Learn how to use astrology advice in dating, by watching this how-to dating video. Pick up tips on making a relationship with a Gemini work. Be coy when you meet a Gemini, they love a little mystery in their relationships.

How To: Do overhead dumbbell triceps extensions

The bicep and the tricep are like the yin and yang — if you overdevelop one and not the other, it looks weird at the beach. You will need a dumbbell and a padded weight bench. Warning: In case you drop the weights, make sure no one is standing behind you, other than a spotter. Always consult a physician when attempting any exercise program.

How To: Design and carve a Chinese name chop seal stamp

Any artist who excels enough in his profession will create some sort of signature on his painting to notify other it's his work. Some painters, like Jan van Eyck, are cryptic with their inscriptions, putting it in almost impossible to see areas in the painting, while others, like Chinese painters, put their literal stamp on paintings with a carved seal stamp.

How To: Perform Directory Traversal & Extract Sensitive Information

With all the web applications out on the internet today, and especially the ones built and configured by novices, it's easy to find vulnerabilities. Some are more perilous than others, but the consequences of even the slightest breach can be tremendous in the hands of a skilled hacker. Directory traversal is a relatively simple attack but can be used to expose sensitive information on a server.

How To: Exploit Remote File Inclusion to Get a Shell

A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website defacement to full-on code execution. For this reason, RFI can be a promising path to obtaining a shell.

Prev Page