Cast on Beginning and End

How To : French braid hair perfectly

It seems the French invent all the cool things! If you want to braid your hair in a new and stylish way, check out this video. Besides their kisses and their fries, the French have also got a braid that's perfect for many occasions. Step 1: Brush hair Brush your hair until ...more

How To : Curl synthetic hair extensions

Janet Collection brings you this instructional video clip that demonstrates how to apply their products. These videos are the live taping of their products being prepared and attached. It will show you step-by-step, from beginning to end. See how to curl synthetic hair extens ...more

How To : Install a ceiling fan

In this video series you will learn how to install your own ceiling fan from beginning to end. Our expert home inspector will walk you through the parts and tools needed as well as the wiring and even how to fix a wobble in the fan. There are multiple steps and parts but each ...more

How To : Use advanced functions in Logic Pro 8

In this music recording software video tutorial, learn how to use one of the latest programs for bands and musicians: Apple Logic Pro. This software allows the user to record a song from beginning to end, bounce tracks, master, and do a final mix down to CD, mp3, and other des ...more

How To : Make beats using Logic Pro 8

In this music recording software video tutorial, learn how to use one of the latest programs for bands and musicians: Apple Logic Pro. This software allows the user to record a song from beginning to end, bounce tracks, master, and do a final mix down to CD, mp3, and other des ...more

How To : Use Apple Logic Pro

In this music recording software video tutorial, learn how to use one of the latest programs for bands and musicians: Apple Logic Pro. This software allows the user to record a song from beginning to end, bounce tracks, master, and do a final mix down to CD, mp3, and other des ...more

News : Squeaks when I

So you get Spike Jonze or anyone really from the cast to dress up as a woman (maybe Ehren McGhehey cause sometimes he acts like a little girl) Get them to go to a store, walk slowly to the return desk while having squeaking noises following them . have them place a box of open ...more

News : Pitfall foot race!!!

We dig pitfalls in the ground of a large field and then cover them. We blindfold the the cast and have them race across the field. Whoever is able to get to the end without falling in a hole wins. The holes are filled with different things. One is filled with sewage, another w ...more

How To : Turn a 5" crochet headband into a beanie hat

This video shows you how to turn a 5" crochet headband into a beanie hat. #1 Gather your supplies-embroidery floss, 5 1/2" crochet headband, needle and scissors. #2 Start by turning the headband inside out. #3 Tie a knot with the embroidery thread on the top loop next to the s ...more

How To : Knit Straight on a Circular Needle

I love circular needles! I use a circular most of the time, even when I am knitting straight. One of the reasons I love knitting on a circular is because with a circular needle, you don't have to worry about dropping a needle. You just have one. It's particularly good to knit ...more

How To : windmill

Hip hop windmill. Not Dutch windmill. This 6-step tutorial is elegant. Hi resolution. Tasteful chyron. Appropriate b-roll. Most intriguing is the host's continuous, non verbal breakdown of the athletic motions. Mime like instructions. The basic concept is to lever your entir ...more

How To : The Best Video Recording Apps for Your iPhone

If you have a modern iPhone, you have an excellent video recorder at your disposal. Every iPhone since the 6S has the ability to shoot in 4K resolution, and each new iteration has brought new capabilities to the table. But even the best mobile shooter can use a little extra he ...more

How To : Lead Your Business to Success with Microsoft Azure

For a decade, Microsoft Azure has been transforming businesses across the globe. The cloud-computing service is leading the way in software as a service (SaaS), platform as a service (Paas), and infrastructure as a service (IaaS) protocols. In total, Microsoft offers over 600 ...more

How To : Rename Multiple Files at Once in Mac OS X Yosemite

With the sheer amount of photos, videos, and miscellaneous files we place on our computers, proper organization becomes necessary. Not only so that we can quickly get to a file when it's needed, but also to declutter folders and keep them from looking like random file dumps. ...more

How To : Cheat Your Apple Watch Rings

Apple Watch owners know the struggle — it's the end of the day, and those rings aren't met. Whether you forgot your watch before hitting the gym, let the battery run out, or just didn't move enough, you could feel the sting of fitness failure. But it doesn't have to be this wa ...more

How To : Crack WPA/WPA2 with Wifite

Hi there again, aspiring hackers (and veterans as well)! I'm going to explain how to perform a dictionary attack on a WPA/WPA2 protected network with Wifite. Please note that this doesn't work with WPA Enterprise For that end, you'd have to use an Evil Twin to get the "Enterpr ...more

How To : 14 Food Hacks You Need to Know for Grilling Season

It's that time of year where you need to break out the grill and cook food over red-hot coals, whether it's the beginning, middle, or end of summer. Even if you're not a grill master extraordinaire, you can use these hacks to fool your friends and family into thinking that you ...more

How To : Write Your Own Bash Script to Automate Recon

Automation has been a buzz word for quite some time now, but the principles behind it are as strong as ever. For a hacker or pentester, Bash scripting is one form of automation that cannot be ignored. Virtually any command that can be run from the terminal can be scripted — an ...more

How To : Exploit Development-Everything You Need to Know

Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more

How To : Knit the Garter Rib Stitch

Step 1: Cast on an Even Number of Stitches. Step 2: K2*P2, K2, End K2 Step 3: P2, *K2, P2, End P2 Step 4: Repeat These 2 Rows. The Garter Rib Stitch is a wonderful stitch to use for a scarf. It's the same on both sides and has nice texture. Be sure you follow the directions ...more

News : Everything Google Didn't Tell Us About Android "L"

It was the star of the show, but now that Android L has been released for preview to Nexus 5 and Nexus 7 owners, there's a lot that Google didn't tell us about their latest mobile operating system, rumored to be called Lollipop. First off, if you haven't already installed the ...more

Hulu 101 : How to Cast Shows & Movies to Your TV

Your smartphone is the perfect place to watch Hulu on the go. Whether you're looking to catch up on your shows in a hotel, or your phone is the only screen available, mobile streaming can be a lifesaver. But what about when you have access to a TV? Wouldn't you rather watch yo ...more

How To : Security-Oriented C Tutorial 0x01 - Hello, World!

Welcome back, reader! In this tutorial, we will be covering our first program! So let's get to it. We all know the unspoken tradition of the first program when learning a language and of course, here we will respect and complete it. Fire up your favorite text editor (be it vi ...more

  • Hot
  • Latest