Targets Accomplished Search Results

How To: Transfer data between 2 MySQL databases in DreamCoder

If you're new to DreamCoder for MySQL, one of the things you may want to know how to accomplish is how to exchange information between two remote MySQL databases. Happily, this tutorial will walk you, step by step, through the process. To learn how to transfer data between two MySQL databases simultaneously within DreamCoder for MySQL, take a look!

How To: Connect to a MySQL database using DreamCoder

If you're new to DreamCoder for MySQL, one of the first things you may want to know how to accomplish is to connect to a remote MySQL database. Happily, this tutorial will walk you, step by step, through the process. To learn how to establish a connection between a given MySQL database and the DreamCoder for MySQL, take a look!

How To: Crochet a bullion stitch flower

Watch this instructional crochet video to crochet a bullion or roll stitch flower. This is a difficult crochet stitch to accomplish. You should master the bullion stitch before beginning to crochet this flower design. Use any type of thread and crochet needle to complete this project. The bullion or roll stitch creates a complex crochet weave for hyper-designed crochet projects such as this intricate flower.

How To: Crochet a bullion or roll stitch

Watch this instructional crochet video to crochet a bullion or roll stitch. This is a difficult crochet stitch to accomplish. This video provides an alternative method of completing the crochet stitch using a homemade tool. Use any type of thread and crochet needle to complete this project. The bullion or roll stitch creates a complex crochet weave for hyper-designed crochet projects.

How To: Use the focusing tool on a Canon HV20 video camera

The HV20 comes with a manual focus roller, which is a good thing. However, it is a bit awkward to operate. Here is a minimalist friction tool that can be used to accomplish the same task (well, perhaps with enough practice). It is small, portable, cheap, and light-weight. Watch this video tutorial and learn how to build a manual focusing stick for a Canon HV20 video camera.

How To: Dumpster dive with freegans

What is a freegan? It's an anti-consumer movement, and a way of getting free food by dumpster diving. Get a crash course in dumpster diving with an accomplished Biology professor who demonstrates the lifestyle of a freegan. Watch this video ecology tutorial and learn how to dumpster dive.

How To: Make a paper flower pop-up card

Watch this video to see how to make a paper flower pop-up card. To make things even better, you only need one piece of paper to accomplish this pop up paper card flower. Just grab your one piece of paper, some scissors and some glue and you're ready to make awesome flower cards.

How To: Make 5x7, 8x10 or DV sized image in Photoshop

Sometimes you need to print a perfect 5x7" or 8x10" photo that will go into a frame with correct aspect ratios. Or maybe you need to make an image for a video that will be just the right size for DV. Photoshop has a variety of ways to accomplish this task, and in this video Terry White will show you some of the easiest ways.

How To: Target your triceps when doing push-ups or press-ups

In this free video exercise lesson, you'll learn a popular variant on the push-up, one designed to target your triceps. With pushups, as with any body-sculpting exercise, a basic mastery of proper technique is essential for both maximizing the effectiveness of your workouts and avoiding accidental injury. For more information, and to get started using this exercise yourself, watch this handy home-fitness how-to.

How To: Perform Local Privilege Escalation Using a Linux Kernel Exploit

Getting root is considered the Holy Grail in the world of Linux exploitation. Much like SYSTEM on Windows, the root account provides full administrative access to the operating system. Sometimes even a successful exploit will only give a low-level shell; In that case, a technique called privilege escalation can be used to gain access to more powerful accounts and completely own the system.

How To: Unlock the Tank Dropper achievement in Halo 3

In this tutorial, we learn how to unlock the Tank Dropper achievement in Halo 3. This is an easy achievement that you will do when you first start out in the level. This is where you have to drop a tank onto someone and kill them. To do this, you need to stand up on a higher area and find your target. Once you do this, you will be able to grab the tank and then drop it onto the target you have found. After this, you will get the achievement and you will be able to continue on. If you miss, ju...

How To: Bypass UAC & Escalate Privileges on Windows Using Metasploit

UAC is something we've all dealt with on Windows, either as a user, administrator, or attacker. It's a core feature of the Windows security model, and for the most part, it does what it's supposed to. But it can be frustrating as a hacker when attempting privilege escalation, but it's easy enough to bypass UAC and obtain System access with Metasploit.

How To: Use Maltego to Fingerprint an Entire Network Using Only a Domain Name

Hackers rely on good data to be able to pull off an attack, and reconnaissance is the stage of the hack in which they must learn as much as they can to devise a plan of action. Technical details are a critical component of this picture, and with OSINT tools like Maltego, a single domain name is everything you need to fingerprint the tech details of an organization from IP address to AS number.

Advanced Phishing: How to Inject Meetings into Anyone's Google Calendar

Google Calendar is a cornerstone of the Google Suite, perhaps second only to Gmail itself. Whereas email is constantly plagued by phishing attacks, as of yet, the calendar is a relatively untapped social engineering attack vector. But it's relatively easy for an attacker to inject a meeting or event into a target's Google Calendar and use it to exploit them.

Hack Like a Pro: How to Use Maltego to Do Network Reconnaissance

Welcome back, my greenhorn hackers! Before we attempt to exploit any target, it is wise to do proper reconnaissance. Without doing reconnaissance, you will likely be wasting your time and energy as well as risking your freedom. In previous guides, I have demonstrated multiple ways to perform reconnaissance including passive recon with Netcraft, active recon with Nmap or hping3, recon by exploiting DNS or SNMP, and many others.

How To: Use the Toolbox in Microsoft Office: Mac 2008

The Toolbox in Office 2008 for Mac is more than just a simple formatting palette. There's so much you can do, so much you accomplish, but you need to know how to take advantage of everything offered in the Office Toolbox, whether in PowerPoint, Entourage, Word, or Excel. The Microsoft Office for Mac team shows you just how to format, insert, research, and clip with the Toolbox in this how-to video. Check out all of the things it can do!