Proxy Machine Search Results

How To: Create a proxy object when working in RealFlow

Need some help figuring out how to generate proxy objects in RealFlow? Never fear. This guide will show you how it's done. Whether you're new to RealFlow's popular fluids and body modeling software or are just looking to get better acquainted with the application its various features and functions, you're sure to enjoy this free video software tutorial. For more information, and to get started using this trick in your own RealFlow projects, watch this 3D modeler's guide.

How To: Get around your school's Websense filter with Hopster

In this video tutorial, viewers learn how to bypass web-sense filter using the software, Hopster. This program allows users to bypass firewall, bypass proxy and HTTP tunnel. To download this program, go to Google and search for the program. Click on the first result and select download. Once the file is downloaded, double-click on it and follow the instructions to install the program. This program runs silently and invisibly so that the administrator won't be able to detect it. This video wil...

How To: Use a proxy to to view MySpace at school

In this tutorial the author shows how to use a proxy at your school and get on the blocked site like MySpace etc. Now he points to the Dot.tk website and how to access it from Google.com. Now if you want to access any website you just need to copy the link and paste it into the pointed field in the Dot.tk website and now you can choose a new domain name for the website. Now you can choose the free domain option in the next page where the new website is setup. Now he shows how to go through th...

How To: Generate a Clickjacking Attack with Burp Suite to Steal User Clicks

Users are often the weakest link when probing for vulnerabilities, and it's no surprise they can be easily fooled. One way to do this is called clickjacking. This type of attack tricks the victim into clicking something they didn't mean to click, something under the attacker's control. Burp Suite contains a useful tool called Clickbandit to generate a clickjacking attack automatically.

How To: Build a looping rolling marble machine with magnetic elevator

Wow! No longer do you have to buy those huge marble machine roller coaster toys — you can DIY one! This video covers the materials, tools and techniques used to make a homemade rolling ball marble machine. If you haven't seen this rolling ball marble machine toy in action yet, WATCH IT. It's a looping rolling marble machine made with wood, rebar tie wire and polyurethane tubing, featuring a magnetic elevator.

How To: Bypass a blocked site on a school computer

In this tutorial, we learn how to bypass a blocked site on a school computer. You will need a proxy to do this safely. First, go to a proxy site like Proxify. Going through here will prevent the school blocking system from coming up and ruining your fun. If you are blocked, you can use a text file document and run CMD on your computer. This would be the more technological way to do it. Try doing the website first to see if it works, if not, then you can try to change the firewall on the compu...

How To: Unblock MySpace at school without a proxy

Can't wait until you get home to get onto MySpace? This video gives step by step instructions on how to try and unblock MySpace while you are at school or on a server that does not allow access to the site. This video does not have narration, but has written instructions on how to get around blocked sites with out using a proxy server. However, you have to have access to the system 32 files for this tutorial to work, and accessing these files does go against a lot of network policies.

How To: Make herbal capsules with a capsule machine

Mountain Rose Herbs John Gallagher shows us how to make our own quality powdered herb capsules using a machine in this video. You will need three things to do this, your powdered herbs, zero size capsules and a zero size capsule machine. He shows us the parts of the capsule machine so we can follow his instructions. Find a container to put the base of the machine in, pull apart the capsules, putting the bottom part in the bottom of the machine and the top in the top part of the machine, filli...

How To: Tether iPhone 3G to use as a wireless modem

This is a video demonstration on how to tether your iPhone 3G to a Mac laptop to use the 3G network for surfing the web on the laptop. This is against AT&T's policy so try at your own risk. This is in place of the NetShare app that keeps getting removed by Apple or ATT. This let's you connect your computer to the 3G wireless network by using a proxy on your jailbroken iPhone.

How To: Bypass File Upload Restrictions Using Burp Suite

When attempting to gain access to a server, there may come a point when you need to get around file upload restrictions to upload something. If we can find a way to get around the restrictions, then we can upload anything we want to the server, effectively compromising it. That is what we'll be doing here today, so let's get started!

How To: Wind a sewing machine bobbin right every time

Ruth demonstrates how to wind a bobbin successfully every time you attempt. Place the spool of thread on the machine and wind the thread between the two disks on the spindle (found in all machines). It is better to wind the thread twice to avoid the thread come off the spindle. This does not damage the machine in any way. Pull the thread towards the bobbin and pull it through the hole in thy bobbin inside-out. Place the threaded bobbin into the winder making sure the extra thread is on top an...

How To: Abuse Session Management with OWASP ZAP

It's always a good idea to know how an attack works at the very basic level. Manual techniques for exploitation often find holes that even the most sophisticated tool cannot. Sometimes, though, using one of these tools can make things so much easier, especially if one has a solid foundation of how it works. One such tool can help us perform a cross-site request forgery with minimal difficulty.

How To: Eliminate the ads on Spotify

Spotify can be a really great music streaming program, but there's nothing like a loud, annoying ad to ruin your aural zen. With this video, you'll learn how to remove ads from Spotify in just a couple easy steps. When it comes to setting the Proxy, copy and paste the following:

How To: Use an ISA server

So what exactly is ISA Server? ISA Server, which stands for Internet Security and Acceleration Server, is Microsoft's software-based firewall, proxy, and web caching service/product. Now what does all of that mean? This video helps explain it!

How To: Hack TOR Hidden Services

A lot of people think that TOR services are unhackable because they are on a "secure environment", but the truth is that those services are exactly the same that run on any normal server, and can be hacked with the same tools (metasploit,hydra,sqlmap...), the only thing you have to do is launch a transparent proxy that pass all your packets through the TOR network to the hidden service.

How To: Replace the controls to a Hotpoint washing machine

One of the most damaged parts of a washing machine can be the controls. This is an important part of the machine as it helps determine how much water is needed in the machine and how the clothes should be washed. This tutorial is going to show you how easy it can be to replace the controls on a Hotpoint machine. So check it out, be safe, and enjoy!