This tutorial shows you how to take your Zbrush character into Maya, pose it, and import the pose back into Zbrush. NOTE: This link is to a Flash version of the first 5 minutes of this hour long tutorial. A download link is provided on the page for the full WMP tutorial.
In part one of this two part Photoshop CS3 Extended video tutorial you will learn how to import Poser 3D models direct into Photoshop as .obj files. When you export from Poser, make sure you have one folder with a .obj file, a .mtl file, and the textures. Make sure to hit "pla ...more
Have you ever wanted to modify the 3D images from your favorite video games yourself? This video is here to help! It will teach you how to import and rig a 3D character (in this case a Bloodelf from World of Warcraft) in 3D Studio MAX. Now you can edit the character however yo ...more
If you want to make a hybrid machinima movie using WoW characters, you are probably going to have to import them into 3DS MAX at some point. Unfortunately, you cannot just do this straight away. This video will teach you how to use a program called Milkshape 3D to prepare a ch ...more
So you want to make your own video game using Flash CS4 and Actionscript 3. We applaud your chutzpah. This video will walk you through what should probably be your first steps: importing a sprite character, making them move around in response to keyboard inputs, and making the ...more
Despite a lack of native kerning tools for typesetting in Cinema 4D, it is possible with a little bit of effort. Letters and characters can be spaced individually using Mograph and the plane effector. Another solution is to first kern the entire block of text externally using ...more
A lot of people use Flash for 2D cartoon animation, but Adobe After Effects is another great tool to create some very cool cartoon animation. This how to gives you a clear idea of the steps to take to use AE as a cartoon creation device. This short video tutorial will demonstr ...more
The silent film era ended long before anyone had conceived of something like machinima, so your machinima movie had better have some talking! This movie will teach you how to use morph target in 3DS MAX to give your imported World of Warcraft characters facial expressions and ...more
In this article I am going to show you how to quickly and easily make a professional looking trailer. All you need is the Apple product iMovie '11 and some footage to make the trailer with. You can follow along in the video tutorial or follow the instructions in the text bel ...more
In this article, I'll show you how to create a simplistic AES python based text encryptor. You'll need python 2.7 and PyCrypto (found here). The code is fairly simple, a user enters an encryption key (which basically tells the program how to scramble the text, using an algorit ...more
As per Alex's request, I am posting about generating word-lists in Python. However, this is my FIRST attempt with Python, so please provide me with critiques and any and all comments. I really want to know what you think as there was a little bump here and there seeing as I a ...more
Creating textures in Photoshop and applying them to Flash animations is one of the most effective ways to make your characters look unique (watch the anime series Gankutsuou if you need proof). This video will teach you how to import custom textures from Photoshop into Flash a ...more
Learn how to convert a skeleton of a character for Unreal Tournament 3 (UT3) from 3D Studio Max to Maya and import it into the Unreal engine.
MDD files are a great way to bring in character animation or any deformation based animation from other 3D software systems. This modo 301 video reviews the basic method for import and use of MDD files. Learn how to load MDD files and apply them to a specific object in a modo ...more
In this video Jason Welsh imports and plays a new character step by step in Unreal Engine 3.0. for Unreal Tournament (UT3).
This video shows you how to change your skill levels in mount and blade. Go to the character menu and click on the statistics button, then click the export button. Exit Mount and Blade. Go to My computer, your local disk drive (usually C), program files, mount & blade, CharExp ...more
In this software tutorial you will learn how to digitally ink a manga/anime character in Corel Painter. Learn how to scan a drawing into Photoshop then import it into Corel Painter and ink the outline of the character for a more dramatic and artistic look. Usually, after inkin ...more
Learn how to make UVs in Blender and import the new UVs to Zbrush's High res model. This is important since Zbrush uses AUV's which are not recognizable by other packages or game engines. Once you have proper UV's, you will learn how to create the clothes (superhero costume) f ...more
In this tutorial, we learn how to establish an account on Twitter. First, log onto Twitter. After you get onto the website, click on the sign up button, then enter your screen name and other personal information in. When you are finished signing up, you will be able to change ...more
Boris Title Toolkit gives Adobe After Effects users advanced titling capabilities for maximum quality, speed, and creativity. Using Title Toolkit, graphic artists can import ASCII or RTF files for fast, easy credit rolls, take advantage of rich text style options such as bevel ...more
Photoshop CS3 Extended has support for popular 3-D formats, which allows users to render and incorporate rich 3-D content into their 2-D compositions, including texture editing on 3-D models. In this video tutorial you will learn how to edit texture on a Poser 3D model. This t ...more
This video series shows you how to create a movie using the Matinee feature of Unreal Tournament 3 Editor. Subjects covered include scene manager, actions, sub actions, 3ds Max export, character import, scripted sequences, Matinee setup and scripted triggers respectively. Part ...more
In this video series, watch as expert 3D animator and developer teaches you how to use iClone Machinima Filmmaking. Learn how to import backgrounds, how to add motion to your characters, how to frame the shot, how to position characters, how to save projects in iClone Machinim ...more
Minecraft was first released just a few years ago, but when a paradigm-shifting piece of media comes along the rest of the world is quick to take inspiration from it. The absolutely terrible XBLA knock-off FortressCraft was the first, and last month a much more interesting gam ...more
As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt ...more
When it comes to sniffing Wi-Fi, Wireshark is cross-platform and capable of capturing vast amounts of data. Making sense of that data is another task entirely. That's where Jupyter Notebook comes in. It can help analyze Wi-Fi packets and determine which networks a particular p ...more
There's a new trend on Instagram Stories: People are making viral AR filters where images of popular characters from TV shows, movies, and other mediums shuffle above your head until one sticks. The filters range from Disney and Pokémon characters to Harry Potter and Friends, ...more
Once a hacker has created a PowerShell payload to evade antivirus software and set up msfconsole on their attack system, they can then move onto disguising their executable to make it appear as a regular text file. This is how they will get a Windows 10 users to actually open ...more
With the Wigle WiFi app running on an Android phone, a hacker can discover and map any nearby network, including those created by printers and other insecure devices. The default tools to analyze the resulting data can fall short of what a hacker needs, but by importing wardri ...more
Amazon Web Services (AWS) opened its re:INVENT developers expo with a bang by launching Amazon Sumerian, a new tool that could become the dominant platform for building cross-platform augmented and virtual reality applications. Available now as a preview, Amazon Sumerian is a ...more
First of all, I hope the title makes sense. :D Well, this is basically creating a program that can help with dictionary attacks. Generate possible passwords. It pretty much lies in you knowing the person you want to hack. Story Time I just like stories :D Well, I heard abou ...more
Developers creating login systems know better than to store passwords in plain text, usually storing hashes of a password to prevent storing the credentials in a way a hacker could steal. Due to the way hashes work, not all are created equal. Some are more vulnerable than othe ...more
A couple of months ago we showed you Foldify, an iOS app that allows you to create your own custom, foldable, 3D papercraft files. Your designs could then be sent to your printer, cut out, and assembled. Video: . Now, 57Digital Ltd has followed the same concept with their new ...more
Compromised uTorrent clients can be abused to download a malicious torrent file. The malicious file is designed to embed a persistent backdoor and execute when Windows 10 reboots, granting the attacker remote access to the operating system at will. Torrent clients like uTorre ...more
Among all the new Magic Leap app announcements made at the recent L.E.A.P. conference, an update to one of the company's major in-house apps went mostly unnoticed: Create 1.1. For those unfamiliar with Create, the app isn't a game or a productivity app, but more of an incredi ...more
It only takes a few commands to manipulate a MacBook's secure HTTPS traffic and pluck login passwords out of the encrypted data. Let's take Facebook and Gmail hacking to the next level by intercepting Safari and Google Chrome web traffic in real time. Both Facebook and Gmail ...more
While Snapchat had a head start in making augmented camera effects popular on smartphones, Facebook has spent the past few years in hot pursuit, with no less than three apps offering mobile AR experiences, plus its Portal hardware lineup of smart home devices. Facebook's late ...more
If you're an Android user, you're very likely jealous of your iPhone friends who have access to the wide, wonderful world of augmented reality thanks to ARKit. But while ARCore is still in developer preview and AR Stickers remain an exclusive feature of Pixel smartphones, the ...more
Sometimes our information important. So important that we have to encode it to keep it away from criminals. What better way to encode information than to make our own encoder with Python? In this tutorial, we will cover the basics of cryptography in hopes to make a "gibberish ...more
With the advent of text messaging, our communication habits have changed drastically. Social niceties are still there, but we budget our words a little more since they have to be typed out rather than spoken. After all, SMS stands for "Short Message Service," so this is the na ...more
I've noticed that a few people using the crypto-currency, Bitcoin are having issues importing private keys to their Bitcoin wallet. This is easy to do and doesn't require anything other than your Bitcoin client/daemon (as of ver0.6.0 ) and the command line. Step 1: Setting Up ...more
Adobe is best known for its photo and video editing software, but they also have a number of lesser-known apps that you may be interested in. Adobe Fill & Sign, available on iPhone and Android, is the best way to electronically fill out important documents on your smartphone w ...more
Hello, fellow grey hat hackers and aspiring coders. I'm back again with another python tutorial. Just that this one is gonna be a lot cooler ;-). We gonna make an encryption program, that well you know encrypts all the files on your pendrive or hdd or whatever you want....Also ...more
Anyone remember Google Goggles? Well, it's back with a new name: Google Lens. But this time, there's more machine learning and it's integrated into many different Google apps and services. The latest is the Google app for iPhones. Adding Google Lens visual search to the Googl ...more
Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mit ...more
With the announcement of ARKit 2.0 at WWDC 2018, Apple is bringing some powerful new capabilities to mobile augmented reality apps this fall. Shared experiences, persistent content, and 3D object recognition will enable more social, transcendent, and immersive experiences for ...more
Google just rolled out a revolutionary feature to its Pixel devices — Google Lens. Previously, Lens had only been available in the Photos app, but now, whenever you want to learn about something in the real world, you can just bring up Google Assistant, turn on the camera, the ...more
Introduced along with the iPhone X, Animoji are animated characters, mostly animals, that are rendered from the user's facial expressions using the device's TrueDepth camera system to track the user's facial movements. The first viral phenomenon to emerge from the launch of t ...more
Greetings fellow students! I'm currently reading a book called "Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers" This book will teach you different kinds of Python programs for hacking, forensics or penetration purposes ! ...more
UnrealIRCd is an open-source IRC server that has been around since 1999 and is perhaps the most widely used one today. Version 3.2.8.1 was vulnerable to remote code execution due to a backdoor in the software. Today, we will be exploiting the vulnerability with Metasploit, exa ...more
Apple added the option to install custom fonts and use them in different apps on iOS 13. The rollout has been a bit confusing, with Apple announcing partnerships with vendors such as Adobe, but also limiting the feature to work with only certain apps. Nonetheless, you can now ...more
Here at Next Reality, our typical approach to all things augmented reality involves vision combined with remote control, either via a handheld device, gaze control, or hand/finger tracking. But a new dynamic takes the notion of interaction with virtual content into a new real ...more
In a previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when a Microsoft Word document is opened. The biggest challenge of this attack is that it requires getting the user to agree to a pop-up prompt. Fortunately ...more
Welcome back everyone. I apologize for the lack of training articles, but I've been rater busy lately. I've recently picked up a second job and my college courses are now back in session, so I'm a bit strapped for time. FTP is a very important protocol. It's not only importan ...more
While attempting to hack a web app, there may come a point where the attacker may have to escape the default directory in order to access unauthorized files. This is known as a directory traversal attack. Much as the name implies, this attack involved traversing the servers di ...more
Welcome, in this tutorial we shall we looking at creating a safe(r) way to back up your important files. The contents we will be covering are as follows; Creating a partition Updating the /etc/fstab file Mounting a file system with Python Copying the contents of a file system ...more
One of the biggest bummers about Netflix is the inability to create different lists for your favorite movies and TV shows. Instead, you're only able to lump titles into the single default "My List," and that can be impossible to browse. It doesn't separate titles into categori ...more
Google's next-gen cellular carrier, Google Fi, which replaces Project Fi, is making waves across the mobile industry. With super-cheap plans starting at only $20 and the ability to connect to millions of Wi-Fi hotspots across the globe, it's tempting many users to make the swi ...more
While iOS 11.3 doesn't have as many new features as iOS 11.2, there's still a lot to love about Apple's latest update for iPad, iPhone, and iPod touch, even if some of the best features we were expecting didn't make the cut. Apple released the iOS 11.3 beta on Jan. 24, and ju ...more
Format strings are a handy way for programmers to whip up a string from several variables. They are designed to save the programmer time and allow their code to look much cleaner. Unbeknownst to some programmers, format strings can also be used by an attacker to compromise the ...more