Create a Scope

How To : Make a portable spy scope cellphone camera

See how to make a portable spy scope cell phone camera with KipKay and MAKE Magazine! Find out how to use a cellphone camera for espionage that captures long-distance secret activities! Kipkay loves his spy gadgets! This portable cell phone camera spy scope is the perfect way ...more

How To : Mod an ordinary webcam into a super spy scope

Now that most computers have internal webcams in them, what are you going to do with that external webcam eating up precious desktop space? Kipkay shows you the perfect hack— the "Super SpyScope". The first thing you'll need to do is disassemble the webcam. Remove the main bo ...more

How To : Make a paper scope with crosshairs for paper guns

If you're into paper guns, then you can't just stop at the paper gun, you have to accessorize! This video will show you how to create a paper scope, which can be used for any of your paper gun creations. It's a cross-hair scope that works with shotguns, sniper rifles, pistols, ...more

Quick scope in Call of Duty 7 : Black Ops

Want to learn how to do quick scoping in BO? It's easy: use the variable scope and zoom in to the second or third level of magnification. Voilà. No more two-second delay when shooting. For a complete walkthrough of how to quick scope, watch this gamer's guide. Call of Duty 7 ...more

How To : Check your engine health with a PICO scope

In this video, we learn how to check your engine health with a PICO scope. First, you will want to attach your computer to the PICO scope that is connected to your vehicle's "brain". After this, you will run through the different sections of the car to see how each of the diff ...more

How To : Security-Oriented C Tutorial 0x12 - Scope

What's up readers? We have ever so slightly touched upon this concept of scope with variables but still don't really know what it means. In this tutorial we will learn the behaviors of variables existing in our programs and within functions. What Is a Variable Scope? A scope ...more

How To : Install the DHCP role on Windows Server 2008 R2

In this clip, you'll see how to install the DHCP role on Windows Server 2008 R2 and how to create a scope. It's easy! So easy, that this video tutorial can present a complete, step-by-step overview of the process in about five and a half minutes. For more information, includin ...more

Apple AR : Scope AR Updates Remote AR for ARKit

Ahead of the highly-anticipated iPhone unveiling and iOS 11 launch, augmented reality developer Scope AR has confirmed that the iOS version of Remote AR, their live support video calling app, will support iOS 11 and ARKit immediately. Remote AR enables users and remote suppor ...more

News : Solar Scope Dialed in for the Eclipse

It's taken me several weeks to figure out the Meade Coronado SolarMax II 60 Double Stack telescope that I bought to produce a timelapse video of the solar eclipse but I'm pretty happy with the images I can produce now. Here's hoping for clear skies tomorrow! Here's a full unc ...more

How To : Everything You Need to Disable in Windows 10

Windows 10 is the most cloud-oriented version of Windows to date—yet, while this means you get some nifty new features, it also means some of your personal data is being shared with Microsoft's servers. Don't Miss: 45+ Tips & Tricks You Need to Know for Windows 10 In general ...more

Know Your Android Tools : What Is ADB & How Do You Use It?

Anyone who has rooted their Android device has likely used a tool called Android Debug Bridge, better known as ADB, at some point during the process. For most, that is their only interaction with the ADB, but to be a true Android power user, you need to really know the tools a ...more

How To : Create an Epic Build in Minecraft

Minecraft is not just a game. It is a creative tool. Over the past year and a half countless epic builds, servers, and community projects have been undertaken. I'm sure some of you have seen the one-to-one scale recreation of the Starship Enterprise from Star Trek or the epic ...more

How To : Write a Basic Encryption Program Using Java!

Today, we are going to combine what we learned from the Introduction to Cryptography article with our Java programming skills. If you are new to Java, check out Matthew's Learn Java: Part One for a quick beginner's lesson, or check out some of the Java tutorials directly on Or ...more

Tor vs. I2P : The Great Onion Debate

In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and m ...more

Hack Like a Pro : Using Sparta for Reconnaissance

Welcome back, my novice hackers! As all of you know, reconnaissance is critical to being successful in a pentest or hack. Recon is where we gather all the information we need to determine the best strategy for hacking. Without good recon, we are likely to waste many hours and ...more

How to Get Better at Halo : Reach

Introduction Halo: Reach is Bungie's latest and final addition to the franchise. Microsoft has claimed the title and from now on 343 Industries will be working on the Halo franchise. In my opinion, Bungie's last game is the best out of all of them. These are some tactics and ...more

News : The Free Online Russian Novel That Became Metro 2033

Video games and books seldom have much impact on one another. Games based on movies based on books are fairly common, but games made directly from books are all but nonexistent. This is too bad, given that they're the two most interactive medias out there. 2010's Metro 2033 ( ...more

How To : Pick up a girl at a stoplight

Watch this video tutorial to learn how to pick up a girl at a stoplight. Tired of the dating scene? Try meeting someone at a stoplight. If you don’t get arrested for stalking, you just might get a date. You Will Need * A cool car, preferably a convertible * A road with sever ...more

Hack Like a Pro : The Basics of XORing

Welcome back, my novice hackers! In a recent tutorial, I showed you how to use shikata_ga_nai to change the signature of a payload to evade detection by security devices (firewalls, IDS, etc.) and AV software. Shikata_ga_nai is an encoding module in Metasploit that XORs the ...more

How To : Code Your Own Twitter Client in Python Using OAuth

This is my attempt to show people some cool things we can do with programming, and to give a small incentive for people to join the weekly Community Bytes. I wanted to make a tutorial on how to use Twitter from the command line with Python. This would have been an easy project ...more

How To : Use SecGen to Generate a Random Vulnerable Machine

Recently, I ran across SecGen, a project which allows a user to create random vulnerable machines. I absolutely love vulnerable machines, since a vulnerable VM is a safe and legal way to practice hacking tactics, test out new tools, and exercise your puzzle-solving skills. Wh ...more

News : Friday Indie Game Review Roundup: Old-New School

This week's FIGRR is all about games that are old-new (or new-old, if you like) school. Each celebrates a different vital, yet largely taken for granted, aspect of video game history in the decidedly new-school world of indie games. Their titles betray them. Blocks That Matter ...more

News : Medieval peasant house

Hey everybody, here is my entry for the medieval building contest. I don't actually care if I win, it was just fun to think about. I have this great book series called The History of Private Life which goes into wonderful detail about how people did everyday things throughout ...more

How To : View the universe with the Meade ETX-AT Telescope

All you science and astronomy nuts out there, pay attention, this detailed video tutorial series will tell you everything you need to know about using the Meade ETX-AT Series Telescope to ogle the universe. You don’t need to know star charts and celestial coordinates to find ...more

How To : Install OpenVAS for Broad Vulnerability Assessment

OpenVAS is a powerful vulnerability assessment tool. Forked from Nessus after Nessus became a proprietary product, OpenVAS stepped in to fill the niche. OpenVAS really shines for information gathering in large networks where manual scanning to establish a foothold can be time- ...more

Gravity in Minecraft : Players, Items, and TNT

Introduction So, today and yesterday I was playing with TNT (as we all do at one point or another) and was curious about a few things. From this curiosity, I went onto discover some of the science behind some things you may or may not have known. While I was conducting this ...more

Prev Page
  • Hot
  • Latest