Printers Search Results

News: Amazing Solar-Powered Printer Uses Sunlight to Sculpt 3D Objects Out of Sand

No matter if you've used one or not, you've got to admit that 3D printers are pretty darn awesome, especially the self-replicating ones that extrude molten plastic and the shoebox-sized versions that use mesmerizing stereolithography to build tiny objects layer by layer. But what's even cooler? A solar-powered printer that uses the sun's energy to melt sand and make 3D objects out of glass.

How To: Use the XPS Document Writer function in Windows Vista

While printers are not normally considered to be at the leading edge of computer technology, these devices have evolved at a lightning pace over the years. Before today's low cost, high-quality inkjet and color laser printers, we used low-quality dot matrix printers and slow laser printers where quality and performance of printing was often questionable. Additionally, documents that looked correct on screen often came out looking differently on paper, due to differences between what the scree...

How To: Change margins & show/hide the ruler in MS Word 2007

This video demonstrates how to show and hide the ruler in Microsoft Word 2007, along with working with page margins. The presenter indicates that if you click the small button above the vertical scroll bar, Microsoft Word will then display Rulers. To work with margins you'll need to click on the Page Layout tab to display the Page Layout ribbon. The video shows the different options located on the Margins menu. There are several built in settings for wide, narrow, normal, moderate, and mirror...

How To: Create a fax through email using 2003 server & Outlook

The first step to create a fax using Outlook 2003 and 2003 server. Using add/remove windows component make sure your fax equipment is properly installed. Under the start menu select the printers and fax option and select the share option. Then under administrator tools/users/new/users/fax to enter your password to turn our fax information transfer on. You must now select fax user and select advanced settings and double check to make sure the fax is able to see the object it needs to send the ...

How To: Scan a document in Word 2007

With technology nowaday, it has become so much easier to scan documents. In the past, people would always take their work to places like Kinkos and pay others to do something that would be simple and easy to do at home. But since the release of multi-functional printers that not only print, they scan, fax, and can even download pictures directly to your computer. This tutorial will show you how to scan a document and send it to your Word program. Enjoy!

How To: Quickly set up Homegroups in Windows 7

This video tutorial from pctechbytes presents how to quickly set up Homegroups in Microsoft Windows 7.This feature allows to easily share files between computers with Windows 7 operating system.Press Start button, select My Computer option. In the newly opened window select Homegroup from the list to the left. Select View Homegroup Settings link.In this window you can choose what types of documents you want to share with other Windows 7 operating system users.You can share pictures, documents...

How To: Set up a Windows 7 HomeGroup network

Want to access files from multiple computers at work or home? An expert from PC Remedies explains how to set up a Home Group network on Windows 7 systems. Includes a how-to of setting up your location, and managing the set-up wizard. Finally maximize your current resources by networking your work and entertainment files, as well as hardware such as printers. The excellent video gives you an exact snapshot of what you can expect to see on your own Windows 7 system. Includes advice on setting u...

Analyzing the Hacks: The Girl in the Spider's Web Explained

The latest film addition in the American-produced Millennium series, The Girl in the Spider's Web, was just released on Blu-ray a few days ago. As you could expect, the movie has many hacking scenes throughout, just like the previous English and Swedish language movies centered around hacker Lisbeth Salander. Of course, with the quick pace of some scenes, the hacks can be hard to follow.

How To: Hold a Building in Your Hand

Aaron Betsky, director of the Cincinnati Art Museum and previous director of the Netherlands Institute of Architecture, reports on the world's first postage stamp to employ augmented reality. Dutch advertising agency Gummo, the NIA and the Dutch postal service teamed up to present five unbuilt models by different Dutch architecture studios in 3D form. When held in front of a webcam, the illusion of a 3D building is projected in your hand. By slowly moving the stamp, you can experience the vir...

How To: Enumerate SMB with Enum4linux & Smbclient

SMB (Server Message Block) is a protocol that allows resources on the same network to share files, browse the network, and print over the network. It was initially used on Windows, but Unix systems can use SMB through Samba. Today, we will be using a tool called Enum4linux to extract information from a target, as well as smbclient to connect to an SMB share and transfer files.

How To: Map Wardriving Data with Jupyter Notebook

With the Wigle WiFi app running on an Android phone, a hacker can discover and map any nearby network, including those created by printers and other insecure devices. The default tools to analyze the resulting data can fall short of what a hacker needs, but by importing wardriving data into Jupyter Notebook, we can map all Wi-Fi devices we encounter and slice through the data with ease.

How To: See Who's Clogging Up Your Wi-Fi Network with These Free Mobile Apps

Android has released a new application called ezNetScan, which is a free app that scans the wireless network you're connected to and gives you a full log of all of the devices connected to that network. This isn't new for smartphone users, let alone Android users. Fing has been around for a while and does practically the same thing that exNetScan does. It gathers information such as the IP and MAC addresses, device vendors, and ISP location. But while Fing is a great program, it does lack a f...

Locking Down Linux: Using Ubuntu as Your Primary OS, Part 2 (Network Attack Defense)

After installing Ubuntu as your primary OS, you should have protected against USB Rubber Ducky payloads, defended against hard drive forensics, and reduced the overall attack surface against physical strikes. When defending against network-based attacks, you'll want to minimize hardware disclosures, prevent packet sniffers, harden firewall rules, and much more.

News: After 5 Years, Touch ID Is About to Get Read Its Last Rites

RIP Touch ID. Apple's fingerprint sensor on iPhone and iPad models with Home buttons is about to become phased out on Wednesday, Sept. 12. While Touch ID will remain an integral part of models from the iPhone 5S to the iPhone 8 Plus, as well as the iPad Air 2 through the sixth generation iPad, Face ID will completely take over as the default security method for unlocking future iOS devices.

How To: Linux Basics for the Aspiring Hacker: Managing Hard Drives

Managing hard drives in Linux is crucial to understanding your system and its operation as well as understanding the system you are exploiting or conducting a forensic analysis on. Linux has numerous commands that can provide us with information, control, and management of hard drives, and in this tutorial, we will examine a number of the most important ones.

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 22 (Samba)

Welcome back, my aspiring hackers! Those of you who use Windows in a LAN environment understand that Windows machines can share directories, files, printers, etc. using "shares." This protocol dates back to the 1980s when the then dominant computer firm, IBM, developed a way for computers to communicate over the LAN by just using computer names rather than MAC or IP addresses.

Hack Like a Pro: How to Use Metasploit's Psexec to Hack Without Leaving Evidence

Welcome back, my fledgling hackers! It's been awhile since we did a Metasploit tutorial, and several of you have pleaded with me for more. I couldn't be happier to oblige, as it's my favorite tool. For the next several weeks, I'll intersperse some new guides that'll help expand your Metasploit skills and keep you abreast of new developments in Metasploit, so look for them in the near future.

How To: Make Room for Your New Gadgets (And Get Some Cash in the Process)

There's nothing like buying an awesome new gadget, but it leaves you with one problem (besides an empty wallet)—what do you do with the ones you already have? There are plenty of ways to put your old gadgets to use, but if you'd rather get rid of them, you may as well get something out of it, right? Here are five places where you can recycle your electronics and replenish your cash stash.

How To: Exploit EternalBlue on Windows Server with Metasploit

Particular vulnerabilities and exploits come along and make headlines with their catchy names and impressive potential for damage. EternalBlue is one of those exploits. Originally tied to the NSA, this zero-day exploited a flaw in the SMB protocol, affecting many Windows machines and wreaking havoc everywhere. Here, we will use EternalBlue to exploit SMB via Metasploit.