In this tutorial the instructor shows how to find the Y-Intercept given the equation of the line in Point-Slope form. He shows how to do this with an example. He tells to substitute the value of x to zero to find out Y-Intercept as Y-Intercept is nothing but the point where th ...more
The steps for finding the y intercept of a line are explained in the above two math videos. Part 1 of 2 - How to Find the Y intercept of a line in algebra. Part 2 of 2 - How to Find the Y intercept of a line in algebra.
In this tutorial, we learn how to find abc, curve direction & y-intercept (quadratic eq). First, you need to find the a,b, and c of the equation. A will equal what the coefficient is in the equation, B will equal the second, and C will equal the third term. This tells us if th ...more
Learn how to find the slope and y intercept of a line equation in algebra. This free video lesson will teach you everything you'll need to know. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to ...more
This video shows the method to graph a linear function by finding the X and Y intercept. Only two points are needed to graph linear functions. So we find the point on Y axis or the Y intercept and the point on the X axis or the X intercept. We notice that on the Y axis the X c ...more
A straight line can be represented in the form of a liner equation containing two variables x and y. When the equation is graphed on a pair of coordinate axes, the line passes cut through the axes in two points. The point where the line cuts the x-axes is called as its x coord ...more
In this tutorial the author explains about the concept of X and Y intercepts in coordinate geometry. She uses a graph consisting of a line to explain the concept. She tells that Y intercept of a line is nothing but the value of Y coordinate where the line crosses the Y axis. S ...more
In this tutorial the instructor shows how to find the x and y intercepts of rational functions. Finding the intercepts of a rational function is similar to finding the intercepts of other normal equations. You can find the x intercept of the equation by setting the value of y ...more
The first question asks for the intercepts x and y. To find X, you would need to set Y to zero, leaving the equation 3X=6. X then equals 2 after you divide both sides by 3. The X intercept that you found is not just the value of 2, but it is the ordered pair X=2 and Y=0 on a g ...more
On Yay Math, Robert Ahdoot, founder of Yay Math, will show you some square root functions and some inequalities. He begins with the problem y=x². Then he makes a sketch with two intersecting lines in a t shape. The problem is illustrated by a curved U shape, the U's bottom res ...more
ExcelIsFun will show you how to use indirect text and substitute in Excel. Select any date and product and create an intersession. Use Vlookup to look up your columns. Use the match function to find the value range. To do the same thing with dates, highlight the dates and name ...more
This is a mathematical instructional video on finding the point slope form of a line equation. This technique allows you to find the x and y intercepts of a line. The point slope form is (y-y1)=m(x-x1). The instructor tells you what each of the variables represents, and shows ...more
In this video the tutor shows how to find the mirror point using a quadratic equation. He says that to graph a parabola you need to find the mirror point symmetrical to the Y-intercept. Now he explains how to find a mirror point using an example with sample values. He begins w ...more
In this video the author shows how to find out if a Point lies on a Line in Slope Intercept Form. He shows it by an example where he takes a point, which is an ordered pair in the form (x, y) and a line, which is an first degree equation. Now he substitutes the values of x and ...more
This tutorial shows how to identify the slope and y-intercept given the formula y=mx+b. In this formula m is always going to be the slope and b is always going to be the y-intercept. Therefore if your given a problem like the one displayed in this video: y= 8/3x + 9, the slope ...more
Learn how to determine the equation of a line with this tutorial: The equation of a line can be determined by two given conditions. 1. The line passing through a single point with a given slope. 2. The line passing through two points. 1. Equation of the line passing through ...more
In this video the instructor shows how to find the equation of the line given its slope and a point that lies on it. If the slope of the line is m and the point that lies on it is (x,y) then you can find the equation of the line by substituting the values in the slope-intercep ...more
This video teaches us the method to write an equation in slope intercept form and to graph it. The equation of line is y = mx + c. m is the slope and c is the y intercept or the point where it crosses the y axis. Let us find the equation of line if it crosses (8,6) and m=1/2. ...more
A method for solving a linear system with no solution is described. The method is described in 4 steps. The first step in the method is designed to solve a linear system that is described consist of “solving by graphing”. Details fo ...more
In this tutorial the author shows how to derive a slope-intercept equation of a line given an X-Y table. He explains that the general form of slope intercept form which is y = m*x + b. Now he intends to find value of slope, i.e. m first. Now slope is change in y over change in ...more
This is the video about how to Find the equation of a line. The equation of a line with a defined slope m can also be written as follows: y = mx + b where m is the slope of the line and b is the y intercept of the graph of the line. The above form is called the slope intercept ...more
In this video tutorial learn how to graph an equation using the slope and y-intercept. To show how this can be done, the equation 4X-5Y=20 is used as an example. The first step that needs to be done is to convert the equation into the y=mx+b format where m is the slope and b i ...more
Want to know the easiest way to fail when bowhunting a big whitetail deer? Try to get in his bedroom. Wade Bourne of MyOutdoorTV.com shows you how to hunt deer near bedding areas… Not in them. Many hunters attempt to hunt in bedding areas, but this approach is very risky. Bu ...more
One of the most promising avenues of attack in a web application is the file upload. With results ranging from XSS to full-blown code execution, file uploads are an attractive target for hackers. There are usually restrictions in place that can make it challenging to execute a ...more
It's no secret that devices leak data, but sometimes they do so in ways you may not expect. Your phone, laptop, printer, and IOT devices leak Wi-Fi information that can (and is) used to track you. Today, we'll make a Wi-Fi probe logger with Probemon.py to track nearby devices ...more
It's always a good idea to know how an attack works at the very basic level. Manual techniques for exploitation often find holes that even the most sophisticated tool cannot. Sometimes, though, using one of these tools can make things so much easier, especially if one has a so ...more
It's common for IoT devices like Wi-Fi security cameras to host a website for controlling or configuring the camera that uses HTTP instead of the more secure HTTPS. This means anyone with the network password can see traffic to and from the camera, allowing a hacker to interce ...more
If you've spotted an unintended Ethernet connection and wondered what you could do with all of the information coursing through those wires, there's an easy way to hack into it and find out. Let's say there's a router that we need to know the password for, and we have physica ...more
Single sign-on (SSO) lets users login across different sites without having to manage multiple accounts. I'm sure most of us appreciate the convenience of seeing "Sign in with …" buttons that let us login with a single username. Hackers, however, see a possible avenue for expl ...more
NotesCollegeAlgebra teaches you how to find intercepts on a calculator TI-83. You start with y plus 1.7 equals .8 times x squared plus 1.4 times x. First you subtract 1.7 from both sides, you get y alone on one side. The window should be set to -5...5, -5...5. X scale should b ...more
Need to graph a line in slope-intercept form (y=mx+b)? See how it's done with this free video math lesson. Need help finding the From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And ...more
System Tool. It sounds like something your Windows computer might need, but it's the exact opposite. System Tool is a computer virus masquerading as a free antivirus program. But don't be fooled, System Tool Antivirus might as well be called System Tool Virus or even System T ...more
Find out how you can kick butt in Obsidian Entertainment and SEGA's video game Alpha Protocol. The RPG and action hybrid came out on June 1st, 2010, and is available on the PlayStation 3 (PS3), Microsoft Windows (PC), and the Xbox 360. This video game walkthrough series from M ...more
In this tutorial the instructor shows how to graph a parabola and also how to find its roots which are also known as zeroes. He gives the quadratic formula of how to find x-intercepts of a parabola. He takes an example and substitutes the values and finds out the values of the ...more
This video deals with solving quadratic functions. It does not involve the use of the quadratic equation; rather, only factored equations are used. The speaker starts out with a factored quadratic equation. The speaker goes on to do the mathematical steps necessary to find bot ...more
This video shows how to find the formula of a piecewise function when given a graph. The first step is to write a definition for the graph, which is done by identifying the different domains shown in the graph. The second step is writing formulas for each domain specified by t ...more
This video shows you how to graph an equation in standard form. In easy to understand instructions, you will learn how to find the x and y intercepts in order to put those two points on a graph, creating a line. Finding the intercepts is as easy as plugging in zero and solving ...more
In this video the teacher shows us how to use a TI-84 plus graphing calculator to graph a function, adjust the view window, and determine the values of several types of critical points on the graph such as x-intercept, y-intercept, local maximums, and local minimums. After ent ...more
You can draw intercept in graph. The teacher took 4x + 3y =12 for solving using intercepts and told that the standard form of the equation should have X and Y terminal at the left side and constant at the right side. He told for making X-intercept we need to substitute Y as z ...more
SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, w ...more
Interested in putting a linear equation in slope-intercept form? See how it's done with this free video math lesson. Need help finding the From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodi ...more
PatrickJMT takes you through step by step on the basics of how to use curve sketching to solve calculus equations. Steps that are covered in this two part video include domain, intercepts, symmetry, horizontal and vertical asymtotes, intervals of increase/decrease, local maxim ...more
This video shows us how to draw a linear equation using the slope and intercept technique. First, the narrator explains how to simplify the equation in order to get the slope and intercept out. He then shows how the coefficient of x equals the slope and the constant term tells ...more
In this article, you will find out how you can simulate poor network service on incoming callers on your Android phone using an Android app called CallDropper. CallDropper is available for Android 2.3 devices and above. Download and Installation There are currently two ways ...more
In this article, I'll show you how to easily "hack" Facebook, Twitter, YouTube, and any number of similar account types with an Android app called FaceNiff. FaceNiff allows you to sniff and intercept web session profiles over the Wi-Fi that your mobile device is connected to. ...more
Have you ever forgotten your password and didn't know how to get back on your computer? Or ever had an annoying roommate you wanted to play a trick on to teach them a lesson? Or perhaps overly religious parents who think the internet is of the devil and won't let you read onli ...more
Do you need to email your wife your Social Security number? Send confidential business plans to your partner in Thailand? Send your hacker buddies the recovered hashes from last night's breach? Try using GPG, a valuable and easy to use open-source encryption program. In my fi ...more
Wouldn't it be nice to just sit at your buddy's house, plug into his network, and see exactly what he's doing? What if it was as easy as that? What makes packet sniffers like Wireshark such potent tools is that a majority of local area networks (LANs) are based on the shared E ...more
Directory traversal, or path traversal, is an HTTP attack which allows attackers to access restricted directories by using the ../ characters to backtrack into files or directories outside the root folder. If a web app is vulnerable to this, an attacker can potentially access ...more
Welcome back, my budding hackers! One of the keys to becoming a professional and successful hacker is to think creatively. There is always a way to get into any network or system, if you think creatively. In previous tutorials, I have demonstrated ways to crack passwords on b ...more
On April 7, 2017, residents in Dallas, Texas, woke to the sound of emergency sirens blaring all over the city. No one could shut them off, and after repeated efforts to contain the situation, the city had to shut down the entire system. While the media reported a sophisticated ...more
KeePassX, 1Password, and LastPass are effective against keyloggers, phishing, and database breaches, but passwords managers rely on the operating system's clipboard to securely move credentials from the password vault to the web browser. It's within these few seconds that an a ...more
In a previous guide, I demonstrated how to extract images from a security camera over Wi-Fi using Wireshark, provided you know the password. If you don't know the password, you can always get physical with the Hak5 Plunder Bug. Using this small LAN tap, we can intercept traffi ...more
Cross-site scripting is one of the most common vulnerabilities found on the web today, with repercussions of this type of flaw ranging from harmless defacement to sensitive data exposure. Probing for XSS can be tedious and time-consuming for an attacker, but luckily there are ...more
It's easier than you might think to hack into Wi-Fi routers using just one unrooted Android phone. This method doesn't require brute-forcing the password, a Windows OS for converting PowerShell scripts into EXE format, a reliable VPS for intercepting hacked Wi-Fi passwords, or ...more
There are nearly 100,000 unique onion service addresses online with over two million people using Tor every single day. Join me as I explore a small fraction of what the Tor network has to offer. It's puzzling to imagine about 100,000 .onion websites in existence. Readers who ...more
The latest film addition in the American-produced Millennium series, The Girl in the Spider's Web, was just released on Blu-ray a few days ago. As you could expect, the movie has many hacking scenes throughout, just like the previous English and Swedish language movies centere ...more
Hashes containing login passwords are transmitted between Windows computers on local Wi-Fi networks. By intercepting and decrypting these hashes using Responder and John the Ripper, respectively, we can learn a target's login credentials which can be later used to gain physica ...more
In part one of this tutorial we found out that your English teacher is a paedophile, by using a Man in the Middle attack to intercept his internet traffic. Now you're faced with the dilemma of how to alert other staff at the school to how creepy he is without letting on that ...more
Data can be injected into images quickly without the use of metadata tools. Attackers may use this knowledge to exfiltrate sensitive information from a MacBook by sending the pictures to ordinary file-sharing websites. Continuing on the topics of DPI evasion, payload obfuscat ...more