How To : Produce a good tone on the cello
Justin Cantor discusses how to develop a good tone on the cello. Several techniques to get a range of sounds are discussed along with the variables, bow speed, pressure and contact point.
Justin Cantor discusses how to develop a good tone on the cello. Several techniques to get a range of sounds are discussed along with the variables, bow speed, pressure and contact point.
This video shows you how to use the new variables feature in InDesign to create running headers and footers. The exercise files in this tutorial use special fonts, including Memphis LT Std Bold and Bell Gothic Std Light. If you do not have these fonts installed on your compute ...more
For some odd reason, the Netflix app likes to disable the Nexus Player's built-in screensaver. It doesn't use its own, it simply keeps your screen on indefinitely, which of course can lead to screen burn-in. This is not just an Android TV issue, as the Netflix app does the sam ...more
Welcome back, my hacker apprentices! To enter the upper echelons of hackerdom, you MUST develop scripting skills. It's all great and well to use other hacker's tools, but to get and maintain the upper hand, you must develop your own unique tools, and you can only do that by d ...more
A router is the core of anyone's internet experience, but most people don't spend much time setting up this critical piece of hardware. Old firmware, default passwords, and other configuration issues continue to haunt many organizations. Exploiting the poor, neglected computer ...more
Welcome finally, to a tutorial on buffer overflows! At last we have reached an exciting part of this series where I will dedicate the entire article on explaining and exploiting the notorious vulnerability. Grab some popcorn, sit back and enjoy the show. What Is a Buffer Over ...more
Hello again! In this tutorial, we are going to go over something called "operators" which will help us build upon conditions of control structures and also some variable manipulation. Without further ado, let's dive in! What Is an Operator? Operators are special symbols whic ...more
In this article, we will explore the basics of radare2, a powerful package that comes with Kali. We are going to write a simple program, and then disassemble it, to see what is really doing in the processor. I will use Kali version 1 and x86 (64 bits) instructions. Not all ar ...more
First, I want to give credit to the author where I first found how to do this: Astr0baby's Blog. This article was dated, so I took the script on his page and reworked it to make it work today. (I also included the way to make it hide the cmd line popup.) Requirements Kali (or ...more
In our last ARKit tutorial, we learned how to measure the sizes of horizontal planes. It was a helpful entryway into the arena of determining spatial relationships with real world spaces versus virtual objects and experiences. This time around, we'll dive into a slightly diff ...more
The public leaks of NSA tools and information have led to the release of previously secret zero-day exploits such as EternalBlue, which was used in the notorious WannaCry ransomware attack. Despite multiple patches being released, many users have failed to update their systems ...more
An attacker with shell access to a Linux server can manipulate, or perhaps even ruin, anything they have access to. While many more subtle attacks could provide significant value to a hacker, most attacks also leave traces. These traces, of course, can also be manipulated and ...more
Want to program your own Java games and applications but don't know beans about object-oriented programming? Never you fear. This free video tutorial from TheNewBostonian will have you coding your own Java apps in no time flat. Specifically, this lesson discusses how to store ...more
The Wedge ROP is a render output driver, which can be used to change variables on the fly while rendering. This can be very useful when simulating, in that you can test out different parameters to see the different results. It's a relatively new feature in Houdini 9.5. Wedgin ...more
Ever wanted to become a programmer? This Delphi Training Series: Programming 101 is a sequence of training videos designed to teach the complete beginner how to become a programmer using Delphi. Episode 1 and 2: the viewer is shown where they can download the free Integrated D ...more
How to install Java JDK (Java Development Kit) Go to the Oracle Java SE Download Page and click "Download". Next, click on "Accept" and select your operating system. Go through the install wizard. Go to start and right click on "My Computer" and click on "Properties". Cli ...more
In this free video math lesson YAY MATH, we learn how to simultaneous equations — sets of equations with multiple variables — in basic algebra. With mathematics, as with anything else, not everyone progresses at the same rate. Algebra is no exception. Happily, in the age of In ...more
In this tutorial, we learn how to find the standard deviation with the Z-Score formula. First, take your problem and write it out one by one underneath each other. Then, you will need to substitute the numbers in for the variables that are in the problem. Once you do this, you ...more
This video teaches the basics of Ohm's law, which is an important equation in electrical engineering. The three variables which are used in this equation are V, which stands for voltage, I for current, and R for resistance. The equation for the law itself is I=V/R. This law de ...more
Need help wrapping your head around algebraic equations? Watch this free video lesson. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Internet, it's easier than ...more
Looking for instructions on how to solve linear equations with multiple variables and constant terms? Look no further. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks t ...more
Whether you're interested in learning Microsoft Excel from the bottom up or just looking to pick up a few tips and tricks, you've come to the right place. In this tutorial from everyone's favorite digital spreadsheet guru, ExcelIsFun, the 45th installment in his "Highline Exce ...more
Whether you're interested in learning Microsoft Excel from the bottom up or just looking to pick up a few tips and tricks, you're in the right place. In this tutorial from everyone's favorite digital spreadsheet guru, ExcelIsFun, the 22nd installment in his "Highline Excel Cla ...more
This video gives you brief tutorial on simplifying expressions, or canceling out common factors. He starts out by answering the question "What is canceling?" and demonstrates a basic example. You find the greatest common factor between the numerator and denominator, which you ...more
A straight line can be represented in the form of a liner equation containing two variables x and y. When the equation is graphed on a pair of coordinate axes, the line passes cut through the axes in two points. The point where the line cuts the x-axes is called as its x coord ...more
In this video the instructor shows how to solve a 3 x 3 linear system using the Cramer's rule. In this kind of problem you are given three equations in three variables x, y, z and you need to solve for the values of these equations. You can solve this using the Cramer rule whi ...more
In this video the instructor shows how to factor a polynomial. A polynomial having three terms is called as trinomial. Now if you factor it you will obtain two binomials whose product will be the original polynomial. Before factoring a polynomial you need to find out if the po ...more
In this tutorial the instructor shows how to solve equations with fractions and decimals. When you have a fraction first try to simplify it by canceling out the common factors in the numerator and the denominator. If there are any decimals convert them into fractions. Now if y ...more
An educational video by http://JustMathTutoring.com that shows how to use implicit differentiation to find a 2nd derivative of an equation. This video uses a second degree equation with variables x and y as the starting point of the example. Subsequently, the presenter finds ...more
In this video, the instructor shows how to collect like terms and factorize. When you are given a linear equation, the first thing you do is to try to organize it. Pair up the like terms. Add the numerical coefficients of terms with the same variables. This is called collectin ...more
In this video the instructor shows how to do temperature conversions using y = m*x + b. Now if Celsius is represented by the variable C and Fahrenheit is represented by the symbol F, you can replace then in the previous equation in place of the variables x and y giving you the ...more
There is a wide rage of variables to consider when considering getting breast implants. This includes everything from if you are a good candidate, the type of implants, the size of the implants, the type of surgery, the size and the possible side-effects. Before you schedule ...more
In this video, you will learn how to factor a simple trinomial. You will learn how to recognize a simple trinomial, and how to completely factor the trinomial. Also, it shows you how to factor square variables. The last example in the video explains how to factor out a negativ ...more
This video is a detailed step by step explanation as how to solve a two step equation. The video provides an example of how to go about a two step equation problem and the steps necessary in order to solve for the value of one of the variables. This video uses very simple math ...more
Learn how to calculate simple interest with step-by-step instructions using the formula I=prt. Simply defined, interest equals principle times rate times time. The video shows various examples of calculating this formula by plugging different variables into the equation. Altho ...more
MySQL is a database for serving data on the web. This video teaches viewers how to connect to a database and add data in PHP & MySQL. PHPMyAdmin is an interface that allows you to interact with MySQL more easily. Use the form in the program to create a database; choose the nam ...more
In this tutorial the instructor shows how to derive a straight line equation. He shows us a process that consists of two steps. In step one he uses the slope formula to obtain the slope of the line which is the ratio of difference of y-coordinates and difference of x-coordinat ...more
In this tutorial the instructor shows how to identify similar terms in a polynomial equation. He states that in similar terms the variables and their exponents are exactly the same but they may differ in the co-efficient. He shows how to identify similar terms by using some ex ...more
In this video the instructor shows how to find the slope of an equation which is in the form Ax + By + C = 0. He says that the formula to find the slope of a line in the above form is slope m = -A/B, where A and B are the numeric constants of the variables x and y in the given ...more
Central limit theorum is easily one of the most fundamental and profound concepts in statistics and perhaps in mathematics as a whole. In probability theory, the central limit theorum (CLT) states conditions under which the mean of a suffiently large number of independent rand ...more
Expressions are new in SSIS (meaning that they were not in DTS) but they allow you to create extremely flexible packages. Expressions can be used to assign values to variables, help you determine whether to execute a task, and to assign properties. If you ever found yourself w ...more
In order to work a quadratic equation, you should, first, try to simplify it. Try to move your variable to one side of the equation and the numerical values to the other. For example, in the equation 3n + 5n 2 = 0, you should try to move the 2 to the other side, by adding a po ...more
The road to becoming a skilled white hat is paved with many milestones, one of those being learning how to perform a simple Nmap scan. A little further down that road lies more advanced scanning, along with utilizing a powerful feature of Nmap called the Nmap Scripting Engine. ...more
Hackers and makers are often grouped under the same label. While hackers draw on computer science skills to write programs and find bugs, makers use electrical engineering to create hardware prototypes from microprocessor boards like the Arduino. We'll exercise both sets of sk ...more
With all the web applications out on the internet today, and especially the ones built and configured by novices, it's easy to find vulnerabilities. Some are more perilous than others, but the consequences of even the slightest breach can be tremendous in the hands of a skille ...more
Developers creating login systems know better than to store passwords in plain text, usually storing hashes of a password to prevent storing the credentials in a way a hacker could steal. Due to the way hashes work, not all are created equal. Some are more vulnerable than othe ...more
During our last adventure into the realm of format string exploitation, we learned how we can manipulate format specifiers to rewrite a program's memory with an arbitrary value. While that's all well and good, arbitrary values are boring. We want to gain full control over the ...more
Welcome, everyone! While Linux distributions are almost always used for exploits, security, pentesting and other stuff covered in Null Byte, knowing the Windows Command Line (or Command Prompt) is a useful skill that can help you in various ways, such as using exploit program ...more
Welcome to another C tutorial. We will be looking at arrays, discussing what they are, when they are used and their special relationship with the char variable. Let's begin. What Is an Array? Think of an array as a sort of container or like... a buffer. They allow us to be a ...more
Hey there, reader! In this tutorial we are going to explain how values are stored in variables as either signed or unsigned. Try to not get lost! Everything is made up of bits in the computing world, like the atom makes up the basic building blocks of everyday materials such ...more
As many of you know, processor's clock frequency improvement got stuck in about 2003, causing the origin of multicore CPU (and other technologies). In this article I'll introduce you on how to run code simultaneously in various processors (I suppose that all of you have a mult ...more
Welcome back, my hacker novitiates! There are many ways to hack databases, and most of these techniques require SQL injection (SQLi), which is a way of sending SQL commands back to the database from a web form or other input. In this tutorial, we will use SQL injection to get ...more
Last time in how to train you python, we covered the basics of variables and output. While we were covering variables, we talked briefly about strings. "String" is just a fancier way of saying "Word". A string is simply a set of characters encased in quotations, this lets pyth ...more
Video: . Project Overview Have any old school floppy drives lying around? Get hacking... and transform them into an electronic orchestra! This project uses a myRIO embedded controller and four floppy disk drives. The myRIO effectively plays the disk drives like musical instru ...more
Welcome back, my aspiring hackers! Those of you who use Windows in a LAN environment understand that Windows machines can share directories, files, printers, etc. using "shares." This protocol dates back to the 1980s when the then dominant computer firm, IBM, developed a way ...more
Welcome back, my fledgling hackers! Nearly every commercial enterprise worth hacking has an intrusion detection system (IDS). These network intrusion detection systems are designed to detect any malicious activity on the network. That means you! As the name implies, a networ ...more
As discussed in a previous tidbit, people are over-confident in their abilities for many reasons. Here's an example... The price of wine varies enormously by vintage. There is a HUGE industry in predicting which young wines will become expensive when they've aged. There are h ...more
If you're getting into automation, Bash scripting is usually the way to go. However, there are a couple of limitations, and one of them is logging into another device like a Raspberry Pi and running a script automatically. To help in those situations, we're going to automate d ...more
Python is commonly touted as one of the best programming languages for beginners to learn, and its straightforward syntax and functionality makes that hard to argue with. But a lot of tutorials still use Python 2, which is outdated now. Python 3 introduces many new features, a ...more
UnrealIRCd is an open-source IRC server that has been around since 1999 and is perhaps the most widely used one today. Version 3.2.8.1 was vulnerable to remote code execution due to a backdoor in the software. Today, we will be exploiting the vulnerability with Metasploit, exa ...more