If you own a top load washing machine, you may have a problem with tangles. This can be an annoying thing that happens on a regular basis. But there is a way to help make sure that whatever you put in the washer will stay untangled. In this tutorial, you'll learn a handy step ...more
In this video tutorial, viewers learn the differences between a top and front loading washing machine. This video will describe the good and bad factors of each one. The front loading washing machine is energy efficient, uses only 15-18 gallons of water and cleans more efficie ...more
Most kids who play video games will never become professional gamers. Those that do are part of a very select group— it's like being a professional actor or athlete. It's nice work if you can get it. For everyone else, the sad realization usually arrives sooner or later that t ...more
Broken motor on your washing machine? Never fear: this video tutorial will show you what, precisely, it takes to fix it. For step-by-step instructions on the motor replacement process, take a look. Get your wachine machine working again with this how-to.
To use your washing machine you will need washing powder and fabric softener. Load the washing into the machine making sure you've separated whites from colors. Choose a low heat for delicates and a high heat for badly stained clothes. Use your washing machine. Click through t ...more
Purchase the necessary equipment for this project. Pumice stones can be purchased at any beauty supply store. Chlorine can be purchased from any household supply store. Sodium bisulfite can usually be found at hobby stores. Obtaining the industrial washing machines for persona ...more
Many ways to help the environment are costly, but using less electricity is one measure that will save you money. Learn how to lower your electric bill with this how to video. You Will Need * Awareness of how you’re wasting electricity * Self-discipline Step 1: Turn it off G ...more
Materials you need to make a nut cup: 1) A thick sheet of paper; 2) a mat; 3) a Cricut Machine. Procedure: Take a thick sheet of paper. Cut the paper to fit the mat of the Cricut machine. Smooth the paper on the mat and load it in the machine. Press the buttons on top of the m ...more
Watch closet expert Barbra Horowitz demonstrate how easy it is to dye your own clothes at home. All you need is salt, powdered dye, and some clothing. You can actually dye clothing in your own washing machine with little to no effort. To clean up, just run an empty wash load w ...more
If you're washing clothes and your front load washer stops mid-cycle, you may have a problem. A washer that stop mid-cycle can be a sign that something has happened to the electricity or your machine. In this tutorial, you'll be finding out some ways to help take care of your ...more
In order to prepare Cappuccino with your home espresso machine, you will need the following: milk, coffee, an espresso machine. Fill steamed milk container 2/3 full of milk. Submerge the milk underneath the spinner, before you turn it on. Allow it to steam the milk, until it i ...more
Doing the laundry uses a lot of water and energy. Here’s how to wash your clothes with a clean conscience. This video will show you how to conserve energy when doing laundry. You Will Need * 1 Eco-friendly laundry detergent * 1 A laundry line * 1 An energy-efficient washing ...more
It feels great to wrap up in a big, fluffy towel after a steamy shower, but it's frustrating when that towel isn't quite up to the job. Over time, towels lose their ability to hold water and dry as needed thanks to daily use and the biggest culprit—laundry detergent. Why Laun ...more
Hello, my fellow hackers. My name is cl0ck. I am a senior majoring in Computer Engineering with an emphasis is Security. I have been lurking the site for a while now reading and learning from the great minds that reside here. I, too, have some knowledge that I would like to s ...more
Did you know Kali 1.0.8? You probably did, and you probably know about the EFI boot option that has been added. That's a very interesting new feature because it allows Kali to be easily booted on Mac too, and every EFI-supported device. First three preview lines gone? As alw ...more
This article is a guide for making Chainmail Armor from start (simple wire) to finish (a finished chainmail shirt). We will be using the European 4 in 1 weave, as this is the most common weave. This is the weave that you usually see in movies. There are several sections to thi ...more
You will Need! 1 box of detergent (should be at least 3/4 full) 1 foot of string Cutting tool and sharp object, such as screwdriver Setting Up! Empty out the box into another container. On the bottom of the box, make 3 cuts to make a flap, bend that flap up and down to ma ...more
Learn how to do alternating T push ups. Presented by Real Jock Gay Fitness Health & Life. Benefits The T push-up variation offers all of the benefits of the standard push-up, plus the added benefit of training your balance and coordination. Focus on power, strong quick moveme ...more
Introduction I am currently starting to learn the Python programming language, programming languages make up all the programs that we use, that is enough for it to fascinate me if it isn't for you then maybe start reading this and you will quickly see how powerful it is. This ...more
I have an absolutely wonderful time making projects and writing articles for all of you mad scientists! Today, I will bring you behind the scenes for a look at the workbench, tools, and software that make the Mad Science World possible. Above is my beautiful workbench! My who ...more
The developer community has already made some incredibly quick progress on implementing assemblers, interpreters, and emulators for the proposed virtual computer in 0x10c, Notch's latest game. But the truth is that the majority of programmers out there couldn't be bothered wit ...more
Social engineering is described as the clever manipulation of the natural tendency of human trust. All of the passwords, locks, and encryption in the entire world are useless against a good social engineer who can charm or trick you into giving it up. But what once started as ...more
Hey everybody, here is my entry for the medieval building contest. I don't actually care if I win, it was just fun to think about. I have this great book series called The History of Private Life which goes into wonderful detail about how people did everyday things throughout ...more
Warnings i cant be held responsible for any illegal act done by anyone but myself and there are copyrights so notise that taken the trademarks or copyrights are strigtly prohibeted by law and will be punshied by law and i or my partners cant be held responsible for sudo camma ...more
If you ever wondered how to keep your car looking great and protect the paint for years to come, read on. 4-step car wash includes washing, clay baring, polishing and waxing your car. Items needed to perform 4-step wash This is a list of essential things you will need: Car ...more
In this tutorial, we learn how to make laundry soap. First, grate soap up into a large bowl. After this, pour the soap into a large pot. Add in 6 c water, then heat this up on medium heat for 40 minutes, not letting the soap boil. Next, add in washing soda and borax into the p ...more
If you've never owned a fron load washer, things may be different than what you may have experienced in the past. There are several qualities that a front load and top load washer share, but there are also a few differences as well. In this tutorial, you'll be finding out how ...more
If you have done hundreds of loads of laundry you might be in a habit of not measuring your detergent and just pouring it into your washing mashing. Although you may think you are taking a short cut, you might be causing more damage than you think. You could end up with too mu ...more
This is a demonstration of making a felt flower accessory for your head bands, waist band and even for your clothes. You will require wool fibers, bubble wrap, felt sponge rolling pin, washing bags and a container of hot water and a spray for soap water. First loose fibers are ...more
CreativeXpress shares a video regarding the usage of the Yudu personal screen printer. Put the plastic foil over the design you want on your t-shirt and turn on the light on the printer. This will cause the design from the page to be transfered onto the foil. Then you simply p ...more
Your sewing machine needs bobbin thread to create overlock stitches, so keep your machine going by learning to fill your bobbin. You Will Need * Thread * A sewing machine * A bobbin * Scissors * Your sewing machine manual * A bobbin winding machine Step 1: Place thread on spo ...more
There are many ways to jailbreak the iPhone, found all over the internet. This method explains how to jailbreak the iPhone or iPod touch using Quickfreedom 2.0 BETA on a machine running Windows Vista. Written Steps: Step 1. Go to your internet browser and type in "Quickfreedo ...more
A man-in-the-middle attack, or MitM attack, is when a hacker gets on a network and forces all nearby devices to connect to their machine directly. This lets them spy on traffic and even modify certain things. Bettercap is one tool that can be used for these types of MitM attac ...more
Kali Linux is the go-to Linux distribution for penetration testing and ethical hacking. Still, it's not recommended for day-to-day use, such as responding to emails, playing games, or checking Facebook. That's why it's better to run your Kali Linux system from a bootable USB d ...more
Adobe Audition, Audacity, and other audio editing software have tools to isolate vocals and instruments in regular songs so that you can get an instrumental track for karaoke, vocals for an a capella version, or solo drums, bass, keys, etc. that you can use to learn the song y ...more
3D printers allow hackers and makers alike to create something from nothing. They're an incredible technology that lets you build protective cases and covers for gear such as a wardriving phone and Raspberry Pi-Hole. 3D printers can even help you out in a bind when something b ...more
Smartphones are inherently bad for privacy. You've basically got a tracking device in your pocket, pinging off cell towers and locking onto GPS satellites. All the while, tracking cookies, advertising IDs, and usage stats follow you around the internet. So no, there's no such ...more
When you think about your Apple Watch, what comes to mind? Fitness tracking? Replying to texts? There are a lot of things Apple Watch is good for, but social media doesn't appear to be one of them based on the App Store. If that's your perception, however, it's time for a real ...more
Web applications are a prime target for hackers, but sometimes it's not just the web apps themselves that are vulnerable. Web management interfaces should be scrutinized just as hard as the apps they manage, especially when they contain some sort of upload functionality. By ex ...more
Individually addressable LEDs, also commonly called "NeoPixels" after the popular Adafruit product, are a bright and colorful way to get started with basic Python programming. With an inexpensive ESP8266 or ESP32 microcontroller, it's easy to get started programming your own h ...more
UnrealIRCd is an open-source IRC server that has been around since 1999 and is perhaps the most widely used one today. Version 3.2.8.1 was vulnerable to remote code execution due to a backdoor in the software. Today, we will be exploiting the vulnerability with Metasploit, exa ...more
Apple's iOS 13 has been available for beta testing since June, and the stable release pushed out to everyone on Thursday, Sept. 19. To help you make the most out of iOS 13 for iPhone, we've rounded up everything you'll want to know, whether a colossal feature, small settings c ...more
One of the most common web application vulnerabilities is LFI, which allows unauthorized access to sensitive files on the server. Such a common weakness is often safeguarded against, and low-hanging fruit can be defended quite easily. But there are always creative ways to get ...more
While modern browsers are robust and provide a lot of functionality, they can be unlocked to do some pretty spectacular things with browser extensions. For hackers and OSINT researchers, these tools can be used to defeat online tracking, log in to SSH devices, and search the i ...more
EternalBlue was a devastating exploit that targeted Microsoft's implementation of the SMB protocol. Metasploit contains a useful module that will automatically exploit a target, as long as it's vulnerable. But what if we wanted to exploit this vulnerability without Metasploit ...more
The Windows 10 desktop and microphone can be livestreamed without using Remote Desktop Protocol (RDP) software and without opening any ports on the target computer. A hacker with low user privileges can monitor and exfiltrate a target's every move and private conversation in r ...more
Silence spreads over these mountains like nothing I've ever felt. If I didn't have Moby blasting in my earphones, there'd probably be no other sounds around. Well, except for someone, Phil probably, murmuring in a nearby tent just low enough to make his words indiscernible. W ...more
Your social security number, credit card information, and medical history can fall into the wrong hands if you're not careful about how and where you share your data online. If you really care about your data, there are tools and techniques you can utilize to protect yourself ...more
Expressing yourself during chats is much easier these days thanks to the steady rise of emoji. Now, products like emoji Minis for Gboard are taking the craft to an interesting yet familiar new level. With emoji Minis, you can automatically create stickers based off your own fa ...more
Cross-site scripting is one of the most common vulnerabilities found on the web today, with repercussions of this type of flaw ranging from harmless defacement to sensitive data exposure. Probing for XSS can be tedious and time-consuming for an attacker, but luckily there are ...more
The next big iOS version for iPad, iPhone, and iPod touch was revealed by Apple at WWDC 2018 and dropped for everyone on Sept. 17, 2018, less than a week after Apple revealed the new iPhone lineup. We've rounded up all the big picture items and secret features and changes we c ...more
For anyone using open source information to conduct an investigation, a balance between powerful tools and privacy controls are a must. Buscador is a virtual machine packed full of useful OSINT tools and streamlined for online research. This program can easily be set up in Vir ...more
Web applications are becoming more and more popular, replacing traditional desktop programs at an accelerated rate. With all these new apps out on the web comes various security implications associated with being connected to the internet where anyone can poke and prod at them ...more
File inclusion can allow an attacker to view files on a remote host they shouldn't be able to see, and it can even allow the attacker to run code on a target. To demonstrate these vulnerabilities, we'll be practicing PHP file inclusion using the Damn Vulnerable Web App. We'll ...more
OpenBSD implements security in its development in a way that no other operating system on the planet does. Learning to use the Unix-like operating system can help a hacker understand secure development, create better servers, and improve their understanding of the BSD operatin ...more
French manufacturer Renault Trucks is looking to the HoloLens to improve quality control processes with its engine assembly operations. An internal incubation team of about 20 employees is collaborating with technology partner Immersion to design a prototype of the applicatio ...more
Airgeddon is a multi-Bash network auditor capable of Wi-Fi jamming. This capability lets you target and disconnect devices from a wireless network, all without joining it. It runs on Kali, and we'll cover installing, configuring, and using its jamming functionalities on a smal ...more
On April 7, 2017, residents in Dallas, Texas, woke to the sound of emergency sirens blaring all over the city. No one could shut them off, and after repeated efforts to contain the situation, the city had to shut down the entire system. While the media reported a sophisticated ...more
With tools such as Reaver becoming less viable options for pen-testers as ISPs replace vulnerable routers, there become fewer certainties about which tools will work against a particular target. If you don't have time to crack the WPA password or it's unusually strong, it can ...more
Now that we've got all of our software installed, we're going to proceed with the next step in our HoloLens Dev 101 series—starting a fresh project and building it into a Holographic application. Then we will output the application to the HoloLens Emulator so we can see it in ...more