How To : Massage to clear your lymph nodes
Learn techniques for lymphatic drainage using the power of massage.
Learn techniques for lymphatic drainage using the power of massage.
The most common Wi-Fi jamming attacks leverage deauthentication and disassociation packets to attack networks. This allows a low-cost ESP8266-based device programmed in Arduino to detect and classify Wi-Fi denial-of-service attacks by lighting a different color LED for each ty ...more
Learn how to turn a node off when working in Nuke 5. Whether you're new to the Foundry's popular node-based compositing application or a seasoned post-production professional just looking to better acquaint yourself with Nuke 5's new features, you're sure to be well served by ...more
Using nodes, this Blender tutorial will show you how to pan (more the camera side to side) and zoom in/out on a portion of an image. In fact, you can make a web video out of a static HD image, as if you had a video camera while you were there! Whether you're new to the Blender ...more
This tutorial teaches you how to use LightWave 9.0's Node Editor feature. This is a powerful tool that can be used for surfacing 3D objects. Part 1 of 3 - How to Use LightWave 9.0's Node Editor. Part 2 of 3 - How to Use LightWave 9.0's Node Editor. Part 3 of 3 - How to Use L ...more
See how to build a simple coil spring using the curve, sweep, and skin nodes in Houdini. Whether you're new to Side Effects Software's popular 3D production program or a seasoned graphic artist just interested in better acquainting yourself with the application, you're sure to ...more
Learn how to edit node trees when working in Nuke 5. Whether you're new to the Foundry's popular node-based compositing application or a seasoned post-production professional just looking to better acquaint yourself with Nuke 5's new features, you're sure to be well served by ...more
This video presents an introduction to node-based compositing from the perspective of an After Effects User. Whether you're new to Adobe's popular motion graphics and compositing software or a seasoned video professional just looking to better acquaint yourself with the progra ...more
This quick video tutorial will show you how to examine a patient's lymph nodes. Lymph nodes are found in certain areas of the body. The examination is usually done with the doctor standing behinds the patient. There are lymph nodes under the jaw, behind the ears, etc. If you n ...more
Learn how to use set key frames (or keyframes) working in Nuke 5. Whether you're new to the Foundry's popular node-based compositing application or a seasoned post-production professional just looking to better acquaint yourself with Nuke 5's new features, you're sure to be we ...more
This Blender tutorial covers methods for bake rendering compositing nodes and ways to speed up render times. We will pre-render the objects and save the precious time when rendering animations. We'll discover the challenges that we meet (such as missing specular in the baked t ...more
This tutorial will help you understand how to use displacement and APS functionality (adaptive pixel subdivision) in LightWave 9. This is an important part of creating volumetric shaders which every 3D modeler should know. Use a displacement node in LightWave. Click through to ...more
The object properties panel in Lightwave 3D 9 now includes the capability of doing displacement and creating displacement via nodes. This video shows you how. Use displacement maps via nodes in Lightwave 3D 9. Click through to watch this video on vtutorial.com
When working in a network, you can't always see the connection lines if you are too zoomed out. This tutorial shows you how you can quickly connect nodes in Houdini.
In this tutorial, you'll see how to use the Scale Node in the Blender Compositor to manipulate an image. You'll see how to stretch it, spin/rotate, and have all sorts of fun with uniform linear distortion. The clip discusses the difference between resolution handling between t ...more
Learn how to remove grain and noise from garbage mattes when working in Nuke 5. Whether you're new to the Foundry's popular node-based compositing application or a seasoned post-production professional just looking to better acquaint yourself with Nuke 5's new features, you're ...more
This is a tutorial on the SPH fluids nodes. This is a particle-based distributed fluid simulator application designed for Hewlett-Packard Scalabe Visualization Array. This application uses volume domain distribution among the nodes. This is a particle-based distributed fluid ...more
This is a quick tutorial on setting up a nodes-based texture for 3D volumes in Blender 2.5. Were you aware Blender 2.5 includes a cloud generation script? See how to use it with this video guide. Whether you're new to the Blender Foundation's popular open-source 3D computer gr ...more
In this tutorial, we take an introductory look at node based compositing from the perspective of an After Effects user. If you are someone who has lots of experience with After Effects, and wants to get into using a program like Shake, Nuke, or Fusion, this will help you get o ...more
You can alter the lighting (general ambient, specific spots, color/warmth) of a video using compositor nodes within Blender. This clip will show you how it's done. Whether you're new to the Blender Foundation's popular 3D modeling program or a seasoned graphic artist just inte ...more
The Node Window is a workspace or desktop for compositing. This clip covers all the mouse and hot keys you use for navigating around and in that workspace and discusses how to add/delete/move nodes, pan/zoom/autozoom the window. Handy tip: Select a viewer node (or the composi ...more
Creative Cow Contributor Michael Mench demonstrates a brief overview of the Morph Node in Shake. You can even take your morph effect and import it into Final Cut Pro. The explanation and step-by-step is great but the text on the interface is hard to see. Use the morph node in ...more
These Apple Shake 4.1 tutorials shows you the basics how to use the Stabilize Node in Shake 4.1 for match moving. Apple Shake 4.1 is a high-end compositing and visual effects package, which can help you make your graphics look as professional as possible. This tutorial also sh ...more
This medical how-to video demonstrates a bilateral lymph node dissection in a patient with endometrial cancer using the da Vinci system with the HD optical system. The HD optical system allows surgeons to perform more precise anatomical dissections with enhanced dexterity. Wat ...more
Learn how to use generate node trees when working in Nuke 5. Whether you're new to the Foundry's popular node-based compositing application or a seasoned post-production professional just looking to better acquaint yourself with Nuke 5's new features, you're sure to be well se ...more
Keep your projects organized and find what you need quickly by color coding nodes in Houdini.
Another way to keep your nodes and projects organized is to put different parts of a project into different subnetworks within Houdini. This video shows you how.
Appending nodes allows you to reuse node trees from previous files. This can be a huge time saver, particularly when working with complex setups. Whether you're new to the Blender Foundation's popular open-source 3D computer graphics application or are a seasoned digital artis ...more
This medical how-to video details a robotic left aortic lymph node dissection in a patient with endometrial cancer using the Standard da Vinci system. The dissection on the right side of the aorta has been completed and the anatomy is outlined. The dissection on the left side ...more
Learn how to use viewer nodes when working in Nuke 5. Whether you're new to the Foundry's popular node-based compositing application or a seasoned post-production professional just looking to better acquaint yourself with Nuke 5's new features, you're sure to be well served by ...more
This medical how-to video details a laparoscopic extraperitoneal aortic lymph node dissection. Watch and learn how to perform this surgical procedure on a patient. This surgical video is intended for medical students.
In this video tutorial, Creative Cow Contributor Michael Mench begins a series called "Shake is Money" in which he will discuss how Final Cut Pro editors can quickly learn how to integrate Shake into their workflow for added flexibilty in the studio. In this first video in the ...more
This clip demonstrates how to get video and images into the node-based compositor in Blender using the RenderLayer and the Image input nodes. Whether you're new to the Blender Foundation's popular 3D modeling program or a seasoned graphic artist just interested in better acqua ...more
In this tutorial, you'll how you can create a library of reusable composite nodes in Blender. It takes time to create node setups, and often the work is repetitive, so let’s see what can be done to be more efficient. Whether you're new to the Blender Foundation's popular open- ...more
You've spent untold hours playing your favorite games. You know what you love. More importantly, you know what can be improved upon. The distance between vision and reality is not as far as you think. You just need a bit of training. That's where The Hands-On Game Development ...more
Last night, I was reading a riveting National Geographic article on the green-eyed tree frog, until I was quickly interrupted by an annoying popup asking me to "create a free account" or "sign in." Really, I'd like to do neither. I just want to read about tree frogs. This popu ...more
Beginners learning brute-forcing attacks against WPA handshakes are often let down by the limitations of default wordlists like RockYou based on stolen passwords. The science of brute-forcing goes beyond using these default lists, allowing us to be more efficient by making cus ...more
A powered-off MacBook can be compromised in less than three minutes. With just a few commands, it's possible for a hacker to extract a target's password hash and crack it without their knowledge. The goal in this article is to acquire a target's .plist file which contains the ...more
Fresh herbs are a surefire way to enhance a dish, but buying them at the store each time you need them is costly. Luckily, growing your own herbs is a lot easier than it seems: You can even using cuttings from the herbs you already buy to start your own little herb garden. An ...more
Bitcoin is a new currency built off "Satoshi Nakamoto's" (alias) 2008 Bitcoin white-paper. Bitcoin provides its users with a way to make peer-to-peer (P2P) transactions without having to use a bank as a mediator. There is no middle man, no corporation backing it, and no one ha ...more
You may have heard of a signal jammer before, which usually refers to a device that blasts out a strong enough radio signal to drown out the reception of nearby devices like cell phones. Purpose-built jammer hardware is outright illegal in many countries. Still, Wi-Fi is vulne ...more
Hacking from a host machine without any form of proxying is reckless for a hacker, and in a penetration test, could lead to an important IP address becoming quickly blacklisted by the target. By routing all traffic over Tor and reducing the threat of malicious entrance and exi ...more
Welcome back, my tenderfoot hackers! Well, the first season of Mr. Robot just ended and Elliot and fsociety successfully took down Evil Corp! They have effectively destroyed over 70% of the world's consumer and student debt! Free at last! Free at last! Of course, global finan ...more
A mention of the deep web can bring to mind images of drugs, hackers, and other criminal activity. Despite the presence of these elements, the Tor network is a valuable tool for preserving privacy and anonymity. And browsing the deep web and any hidden services can be as simpl ...more
In the first part of this series, we learned about darknets, as well as how they came about. But these patches of forgotten Internet are not the oasis of free information you might think. Despite being hidden—or just harder to come across—these networks are no more safe then a ...more
In the recent hit movie Furious 7, the storyline revolves around the acquisition of a hacking system known as "God's Eye" that is capable of finding and tracking anyone in real time. Both the U.S. spy agencies and an adversarial spy agency (it's not clear who the adversary is, ...more
In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and m ...more
The internet is a scary place, and if you're like me, you don't want anyone tracking you or learning your search habits. It's a blatant invasion of privacy for companies to do this, but at least we have methods of fighting back—one of which is Tor. Tor stands for The Onion Ro ...more
In this tutorial you will learn how to create a pretty decent looking water shader in Maya without many nodes. Water materials are a great and fast way to get around creating real 3D water effects so watch this Maya tutorial and create your own water shader.
In the last article, we left off with the Tor network and its hidden services. As I mentioned, Tor is not the only option in the game, and I want to offer a general introduction to I2P. For a web browsing proxy and hidden services host, Tor gets the job done well. But if you ...more
Most won't know what the acronym HEENT stand for, but if you're a medical student, doctor or nurse, you know that it stand for head, ears, eyes, nose and throat. To perform a HEENT examination properly, you must know all the steps and techniques to diagnose your patient. This ...more
Defcon is the largest hacker conference with something for everyone, whether it be the talks, parties, villages, or any of the hundreds of events. In this guide, we'll take a holistic view at everything that goes into attending the con for the first time, from securing your el ...more
The herpes simplex virus (HSV) can cause devastating complications for infected newborns whose mothers have genital herpes. Understanding risk and research can help you, and your baby, when the time comes. In the US, about one out of six people aged 14 to 49 have genital herp ...more
Introduction The 3 major anonymity networks on the Internet are Tor/Onionland, I2P and Freenet. If you feel confused on which one is the "best" one to use the answer is simple. Use all three! Each anonymity network is designed for a different specific purpose. One network al ...more
Your social security number, credit card information, and medical history can fall into the wrong hands if you're not careful about how and where you share your data online. If you really care about your data, there are tools and techniques you can utilize to protect yourself ...more
This Null Byte is a doozey. On Sunday, September 19th, an exploit for the latest Mac OS X 10.7 "Lion" was discovered by Patrick Dunstan. This exploit allows for an attacker, even remotely, to request to have the root user's password changed without knowing the password to the ...more
The dark web is an intimidating place for a newbie hacker, but it's a powerful tool once you've learned to navigate it safely. To help you out with that, this guide will cover some need-to-know information for traversing the dark corners of the internet while keeping your iden ...more
Encryped traffic and tunneling is a must when away from home to keep you and your information safe. SSH tunnels can be slow, and are heavily encrypted. VPNs are an all port solution, and proxies are just not what we need in most cases. Then, there is Tor. Tor runs your traffi ...more
The easiest way around a security policy is to find users who don't follow it. The Have I Been Pwned database identifies accounts with information breached by major third parties like Yahoo and LinkedIn. With Maltego, hackers can locate breached accounts created using company ...more
Hello my anxious hackers, the week has started and here we begin a new series that I think will help many here and not only, for those that have the opportunity to follow our tutorials but they are not yet part of the community. Don't be a script-kid? what do you mean? In pro ...more