Protocol Television Search Results

How To: Use transitions in film

Brandon Pinard discusses the most commonly used transitions in television and film: the Cut, the Fade and the Dissolve. He covers the basic definition of each of the three transitions, how they are most commonly used in the film and television industries, and how anyone can improve their own videos with the proper understanding of these transitions.

How To: Make a cheap DIY camera slider for your film

Film and television cinematographers love sliding camera shots, especially since ER made them a standard device for television dramas. A professional sliding camera setup is expensive though. Why not make one yourself? This video will show you how to turn $20 into a high-quality filmmaking tool that you can use to give your films some very professional-looking shots. Now get out there and follow that gurney with the camera!

News: Why the iPhone X Needs a $25 USB Type-C Cable to Fast Charge

After learning that you'll need to spend at least $74 on a special charger and a USB Type-C Lightning cable to enable fast charging on the new iPhone X and iPhone 8 models, you may be wondering why you can't just use the standard Lightning cable. While we can't answer why Apple didn't include the USB-C cable in the box with their new phones, we can explain why you need USB-C to enable fast charging.

How To: Start using Sony's new Internet TV Blu-ray Disc player with Google TV

Google TV is a revolutionary new way to enjoy your two favorite things in life— Internet and TV. And Sony just happens to be the first company to design television products powered by Google, like their Internet TV Blu-ray Disc Player (Model NSZ-GT1). If you're thinking of getting one, this video provides a hands on, showing you how to use the new Sony Internet TV, paired with practically any television.

How To: Fix error code 86420 and change your NAT type to open

In this tutorial, we learn how to fix error code 86420 and change your NAT type to open. First, go to the website to change the settings for your Linksys router. Next, go to the applications tab that says "applications and gaming". After this, go to port range forwarding, then write in a name next to where it says "application name". Under "start" write the number 1 and under "end" write 6553, then keep "both" marked under protocol. Next, enter in the last 3 digits of your console's IP addres...

How To: Enumerate NetBIOS Shares with NBTScan & Nmap Scripting Engine

NetBIOS is a service that allows for communication over a network and is often used to join a domain and legacy applications. It is an older technology but still used in some environments today. Since it is an unsecured protocol, it can often be a good starting point when attacking a network. Scanning for NetBIOS shares with NBTScan and the Nmap Scripting Engine is a good way to begin.

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 22 (Samba)

Welcome back, my aspiring hackers! Those of you who use Windows in a LAN environment understand that Windows machines can share directories, files, printers, etc. using "shares." This protocol dates back to the 1980s when the then dominant computer firm, IBM, developed a way for computers to communicate over the LAN by just using computer names rather than MAC or IP addresses.

How To: End shutter lag, improve WiFi performance and more

Find which airlines Google is providing free Wi-Fi on this holiday season, fix shutter lag on digital cameras, wipe your hard drive for free, improve your Wi-Fi router performance, adjust your television and monitor for accuracy, choose the best 1080p projector, use a single server that can handle OS X, Windows & Linux simultaneously, and use the best audio encoding system for Windows Media Center and Zune.

How To: Be Snooki from Jersey Shore for Halloween (hair, makeup & rhinestone glasses)

Snooki and her Jersey Shore castmates have taken over reality television, and for better or worse, their New Jersey-ness is spreading like wildfire. If you're thinking about dressing up as Snooki for Halloween, you've found the right video! It will show you how to get the right skin tone, makeup, hairstyle, and the iconic rhinestone sunglasses to make your Nicole Polizzi costume as awesome as possible.

How To: Make a CCTV monitor effect in After Effects

CCTV's (closed-circuit televisions) are more common than ever before, and have become more and more popular to depict in films and in video games like Manhunt. This video will teach you how to create a CCTV monitor effect akin to what a security guard would see on their camera monitor using After Effects. This will work great for any horror movie that you might be shooting, the effect is very creepy.

How To: Draw a strip for a comic book

Ever daydream about making your own comic strip? Well, what's stopping you? With this lesson from television cartoonist Bruce Blitz, you'll learn everything you need to know to produce your very own comic strip suitable for publication in a newspaper or on the web. For more information, and to get started making your very own funny strips, watch this free video guide.

How To: Beat a polygraph or lie detector test

AntiPolygraph.org's George Maschke speaks with Nick Frost about how to fool a polygraph (lie detector) test in episode 5 of the tongue-in-cheek 2003 television series Danger: Incoming Attack. Note that the anal sphincter contraction, discussed as a polygraph countermeasure, while effective, is no longer recommended by AntiPolygraph.org, and alternative techniques such as mental countermeasures or tongue-biting are to be preferred.

How To: Connect a computer to an HDTV using an HDMI cable

In this video, we learn how to connect a computer to an HDTV using an HDMI cable. Start out by plugging your HDMI blue port in the back of your computer monitor. Also, plug in a yellow DVI to HDMI converted with a cable connected to this. You can buy these on Amazon or New Egg for only a few dollars, get the generic version. After you have these plugged in, it's as simple as that. Plug these into the back of your television, then use your computer. You will now see the screen of your computer...

How To: Watch movies and tv online for free

In this tutorial, we learn how to watch movies and TV online for free. You can do this through the website Hulu. This is a completely legal website, and you can either sign up for an account or just browse the site. You can watch movies and television shows through here, they have a large selection. They also have a great variety of different short clips for different shows. The player on the website has dimmer switches and full screen mode as well. This is a great website if you want a legal...

How To: Integrate a Windows PC into your home theater

Want to watch Internet television on your television? It can be done! And this home theatre how-to from the folks at CNET TV will show you how to do just that, integrating by integrating a Windows PC into your home entertainment center. For more information, including detailed instructions, and to get started using the Internet on your own TV, watch this free video tutorial.

How To: Connect the Xbox 360 to the iPod

This is an interesting video where the presenter demonstrates how to actually play your iPod on your television by utilizing connectivity with XBox360. The great thing about this video is you actually see how the cables connect between the devices. Once connected, a brief tutorial of how to configure the dashboard follows. It's amazing how, with the right cables, one can quickly have use of their iPod on the television. The video itself is less than 90 seconds long, so you get a great tip for...

How To: Make your own Masked Magician mask

Make a Magician's Mask Have you ever heard of the Masked Magician? With the television series Magic's Biggest Secrets Finally Revealed, the so-called Masked Magician (Val Valentino) revealed secret after secret of the magicians repertoire. Valentino creates “the magic” then proceeds to reveal the reality of the illusions before a captivated television audience.

How To: Detect BlueBorne Vulnerable Devices & What It Means

Armis Labs has revealed eight vulnerabilities, called "BlueBorne", which put 5.3 billion Android, iOS, Windows, and Linux devices that use Bluetooth at risk. With it, hackers can control devices, access data, and spread malware to other vulnerable devices through networks. In this post, we will learn about the vulnerabilities, then look at how to find devices that have them.

How To: Learn How Elliot from Mr. Robot Hacked into His Therapist's New Boyfriend's Email & Bank Accounts (Using Metasploit)

Social engineering is a pretty important item in a hacker's toolkit. In Mr robot there was a time, we saw Elliot using social engineering to gain access to his therapist's boyfriend's email and bank accounts by calling him and pretending to be someone from his bank, then Elliot asked him for some info that were really useful to gain access to his account, the target believed to be someone from the bank and gave him the info Elliot was looking for. But How Is It in the Real World?

How To: Bypass T-Mobile's Tethering Limit for Free

T-Mobile's "Uncarrier" initiative has done wonders for my wallet and my data usage. Before I had to deal with being throttled down to 2G speeds after passing my data limit, but thanks to their unlimited data plans, I'm free to use as much LTE data as I possibly can. The only downside is, when sharing data through a mobile hotspot (tethering), T-Mobile imposes a 5 GB limit (which was recently upped to 7 GB for some).

How To: Get Android Alerts for When Your Favorite Websites Update Content

The problem with striving to be on the bleeding edge of what's new for your smartphone, or really anything else in life, is having to constantly check websites and forums for new content. And with lots of that browsing happening on our phones, the aimless page loading and refreshing is not just annoying when there isn't new content, but can lead to wasted data usage, not to mention time.