Logs

How To : Use XNEST to log into another local user's account

Have you ever wanted to go into another user's account on your computer but had trouble finding the energy to log out, then log out, only to log back into your own account? Well, here's your solution: XNest will let you log in to another user's account from your account in a v ...more

How To : Build a log cabin with Becky

Log cabins are so beautiful they look straight out of a storybook. In this two part tutorial, starring Becky from Becky's Homestead, you will learn how to make your very own wooden home. It's easier than you think! Part 1 of 2 - How to Build a log cabin with Becky. Part 2 of ...more

How To : Make a venison pastrami log

This is a short video on how to make beef, venison, or beef & venison pastrami log. Commonly available vertical sausage stuffer and mixer are used to produce 2-5lb pastrami logs. The process excludes the grind but is concentrated on the mixing, stuffing, and cooking process in ...more

How To : Make a corned beef flavored sausage log

This is a short video on how to make a corned beef flavored sausage log. Learn to make a single corned beef log from 80:20 ground chuck. The process excludes the addition of coarse ground venison to the recipe which works to improve the texture. This clip is concentrated on th ...more

How To : Make a mini Christmas log cake for a dollhouse

Here is another video by a woman named Angela on how to make a miniature Christmas log cake for a dollhouse. The first thing she does is roll out a sheet of brown clay with a pasta maker on a setting of 4. Then she rolls out a white sheet with smaller setting of 6. Use a razor ...more

How To : Saw logs

Dawn your flannel and grow out your beard, it’s time to do some log cutting. Put good use to unwanted trees or extra lumber by making proper logs. It may seem self explanatory but the correct form will create uniform, crack free logs and keep you with all your fingers. You ha ...more

How To : Change log-in wallpaper in Mac OS X

Do you want to change the login wallpaper on your Mac OS X? It is as simple as replacing an image in the file system. First, open the File Explorer. Select your hard drive from the Devices tab. Click on the System folder. Click on the Library folder Find the CoreServices fold ...more

How To : Search in Twitter Using Parameters Without Log In

This video will show you how to search Twitter by parameters without sign up or log in. Here a person can use search parameters to find the desire twits. So there is no headache for signing up or logged in for searching. So please Watch the video and follow all the steps to do ...more

How To : Make yule log cookies

In this video series, our expert will take another look at the traditional yule log cake, and make yule log cookies. Learn how to cream the butter, add the sugar, flour and wet ingredients for the Yule Log cookie dough. Part 1 of 15 - How to Make yule log cookies. Make yule lo ...more

How To : Make a free website or blog

The term blog is a shorthand for web-log. It can be considered as a online and publically viewable diary of user generated content usually sorted by date. Creating a blog is simple if you follow the steps as described in this video. The procedure to do so can be outlined as b ...more

How To : Disable referrer logging in Opera 5.01 & 6

In this tutorial the instructor shows how to disable referrer logging in Opera 6 and 5.01. To do this, first open Opera and click on the File menu. In the File menu select the Preferences option. Now this should open the Preferences window. There are lots of options in the sid ...more

How To : Work with logarithms in intermediate algebra

Learn how to evaluate simple log expressions and how to use the log operation to solve exponential equations in intermediate algebra with this free video lesson. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds ...more

How To : Crack Wi-Fi Passwords—For Beginners!

An internet connection has become a basic necessity in our modern lives. Wireless hotspots (commonly known as Wi-Fi) can be found everywhere! If you have a PC with a wireless network card, then you must have seen many networks around you. Sadly, most of these networks are sec ...more

How To : Everything You Need to Disable in Windows 10

Windows 10 is the most cloud-oriented version of Windows to date—yet, while this means you get some nifty new features, it also means some of your personal data is being shared with Microsoft's servers. Don't Miss: 45+ Tips & Tricks You Need to Know for Windows 10 In general ...more

How To : Top 10 Things to Do After Installing Kali Linux

Kali Linux, by default, probably doesn't have everything you need to get you through day-to-day penetration testing with ease. With a few tips, tricks, and applications, we can quickly get started using Kali like a professional white hat. Most Linux distributions are highly c ...more

How To : Successfully Hack a Website in 2016!

Hello partners, first of all I would like to thank all those who have sent me positive feedback about my posts, to say that I'm always willing to learn and teach. I'm also open to answer the appropriate questions. Second i want to say sorry for the series i left in stand by m ...more

How To : Hack a Vending Machine with a Special Code

JamesKesn teaches you how to hack a vending machine. You must use a very specific machine and an exact combination of button presses. For this it is: far left Pepsi, near right Mountain Dew, near left Pepsi, far right Mountain Dew. Then far left Pepsi, near right Mountain Dew. ...more

Hack Like a Pro : How to Evade Detection Using Proxychains

Welcome back, my novice hackers! The worst thing that can happen to any hacker is being detected by a security admin, the security technologies (IDS, firewall, etc.), or a forensic investigator. Every time we send a packet to our intended target, that packet contains our IP ...more

Binance 101 : How to View Your Transaction History

Given the volatility of cryptocurrencies like Bitcoin (BTC), Ethereum (ETH), and Ripple (XRP), it's good to keep track of your transaction history and get a better idea where you stand financially. Though tracking down past trades on Binance may seem convoluted at first, it ge ...more

How To : Bypass a Local Network Proxy for Free Internet

Have you ever been away from home or on holiday and noticed an open network connection? FREE INTERNET! But then you find out that every search or page redirects you to an "enter password" or "signup here" page. Well, there are ways around this. In this article, I'll show you ...more

How to Hack Wi-Fi : Automating Wi-Fi Hacking with Besside-ng

Besside-ng is the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. When run with a wireless network adapter capable of packet injection, Besside-ng can harvest WPA handshakes from any network with an active user — and crack WEP passwords outright. Unlike many tools, ...more

How To : Make Your Laptop Theft Proof

The dreaded moment you hope never happens—someone has stolen your laptop. You could have private information, pictures, or even private information belonging to the company you work for, all lost forever. It can cause you pain, money, or even a job. There are paid services th ...more

Android Basics : How to View Your Location History

Your smartphone has a GPS chip inside of it that can pinpoint your location down to the nearest 4 meters, and this little device stays in your pocket or purse all day. Combine those two facts and you start to realize that your phone knows exactly where you've been during every ...more

SPLOIT : How to Make a Proxy Server in Python

NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! Hello Guys, Welcome to my tutorial and in this tutorial, We are basically going to create a python script that serves as a proxy server ( Without External ...more

  • Hot
  • Latest