Packages Search Results

How To: Make strawberry pie

This instructional video demonstrates how to make a strawberry pie. She starts with a frozen pie shell. Let the pie crust thaw for about 10 minutes. To make it look homemade, pinch the fluted edges so they are not perfectly even. Next, poke holes all over the bottom and sides of the crust with a fork. Bake the plain pie crust in a 350 degree oven for about 15 minutes. To prepare the filling, put 1 cup of sugar and 1 cup of water into a pan on the stove, mix 2 tablespoons of cornstarch with a ...

How To: Make a shrimp boil

Things You'll Need: Measuring spoons, 5 zipper plastic sandwich bags, 1 oz. lagniappe water, 4 large cloves of garlic (cut in half), Zatarain's Garlic and Onion Liquid Shrimp and Crab Boil, 3 bay leaves, measuring cup, 2 lemons, 5 oz. salt, ice, large pot, 5 lbs. large shrimp (2 to 3 oz.), cayenne pepper to taste, 1/2 stick butter (4 tbsp.). Step 1: Fill the pot 2/3 of the way full with water and place it on the stove. Step 2: Turn the heat on the stove up to the highest level. Step 3: Rinse ...

How To: Make a no-bake lime blueberry tiramisu with Paula Deen

Paula creates a no-bake tiramisu dessert, perfect as a summer treat. Follow along and get this delectable recipe for a lime blueberry tiramisu that doesn't require you to turn on the oven. This cooking how-to video is part of Paula's Home Cooking show hosted by Jamie Deen, Paula Deen. Paula Deen, owner of Lady and Sons, a famous Savannah restaurant, is Food Network's resident southern chef. Step inside her kitchen and discover delicious food that's both uncomplicated and comforting. You'll lo...

How To: Install OpenVAS for Broad Vulnerability Assessment

OpenVAS is a powerful vulnerability assessment tool. Forked from Nessus after Nessus became a proprietary product, OpenVAS stepped in to fill the niche. OpenVAS really shines for information gathering in large networks where manual scanning to establish a foothold can be time-consuming. OpenVAS is also helpful for administrators who need to identify potential security issues on a network.

How To: Turn Your Nexus 7 into a Personal Mixologist to Class Up Your Home Bar

You have an abundance (or scarcity) of alcohol, liqueurs, and chasers, but don't know how to combine or mix them together to produce some kind of enjoyable concoction for friends. What do you do? Mix things you think will taste good together? They probably won't. There's rules about clear alcohol vs. dark alcohol and how they pair with juices and sodas, so what's the best way to know what goes well with what?

How To: Securely Sync Files Between Two Machines Using Syncthing

Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mitigate these risks, we'll use a secure, open source, and decentralized alternative.

How To: Exploring Kali Linux Alternatives: Set Up the Ultimate Beginner Arch Linux Hacking Distro with Manjaro & BlackArch

There's no doubt Kali has established itself as the most popular penetration distribution available. However, just because it's the fan favorite of beginners and security researchers doesn't make it right for everyone. Manjaro Linux is a beginner-friendly Arch-based distribution which can be easily weaponized with the Black Arch expansion, creating a friendlier first-time Arch experience.

How To: Install & Use the Ultra-Secure Operating System OpenBSD in VirtualBox

OpenBSD implements security in its development in a way that no other operating system on the planet does. Learning to use the Unix-like operating system can help a hacker understand secure development, create better servers, and improve their understanding of the BSD operating system. Using VirtualBox, the OS can be installed within a host to create a full-featured test environment.

How To: Beginner's Guide to OWASP Juice Shop, Your Practice Hacking Grounds for the 10 Most Common Web App Vulnerabilities

Web application vulnerabilities are one of the most crucial points of consideration in any penetration test or security evaluation. While some security areas require a home network or computer for testing, creating a test website to learn web app security requires a slightly different approach. For a safe environment to learn about web app hacking, the OWASP Juice Shop can help.

How To: Exploring Kali Linux Alternatives: How to Get Started with BlackArch, a More Up-to-Date Pentesting Distro

In 2013, Offensive Security released Kali Linux, a rebuild of BackTrack Linux derived from Debian. Since then, Kali has gone on to become somewhat of a standard for penetration testing. It comes preconfigured with a collection of tools accessible by a menu system, tied together with the Gnome desktop environment. However, Kali Linux isn't the only penetration-testing distribution available.

TWRP 101: How to Install a Custom ROM

Since Android is an open source operating system, that means anyone with a little know-how can download, view, and even alter its underlying code base. Manufacturers do it all the time, which is how we end up with skins like TouchWiz and Sense. But when Android's awesome third-party development community gets their hands on this code, we end up with custom ROMs like LineageOS and MIUI.

How To: Set Your Wi-Fi Card's TX Power Higher Than 30 dBm

Do you have an Alfa AWUS036NH Wi-Fi adapter that claims it can go to 2000 mWs, or some card that can supposedly transmit power over 1000 mW? If so, you may have run into problems setting your card's TXPOWER higher than 30 dBm, which is about 1000 mW. Well, I will show you how to break that barrier and go as high as you want!

How To: Yes, You Can Make Frosting with Jello—And It's Amazing

Frosting, for many, is the best part of the cake. There's not much to dislike about it, after all—there's a type of frosting for every person. Whipped frostings for those who like it light, dense buttercream for indulgent sugar fans, cream cheese frosting for the tangy crowd... and so on. But I'll bet you've never made or tried frosting made with Jell-O packages before! Infusing your frosting with the sweetness and bright color of Jell-O changes both its taste and appearance, and using Jell-O...

How To: Add a Battery Meter & System Stats to the Information Stream on Your Galaxy S6 Edge

Exclusive to the Samsung Galaxy S6 Edge, "Information stream" is a screen feature that lets you see quick, at-a-glance information with a simple swipe while the screen is off. It also supports plug-ins, or additional streams of information that can come from third-party sources. So developers are starting to come up with nifty little add-ons for Information stream, and the team at 3C has some cool new system feeds that might come in handy.

How To: Get Started with Kali Linux in 2020

Kali Linux has come a long way since its BackTrack days, and it's still widely considered the ultimate Linux distribution for penetration testing. The system has undergone quite the transformation since its old days and includes an updated look, improved performance, and some significant changes to how it's used.