In this After Effects tutorial, Creative Cow leader, Michael Park, demonstrates how to simulate shimmering glitter particles using fractal noise, colorama effect and Trapcodes Particular plugin. Make shimmering glitter in Particular in After Effects. Click through to watch thi ...more
This excellent tutorial shows you how easy it is to make a crowd out of a few people. Using the Trapcode plug-in particular, Mike Goedecke from the design firm Belief, teaches us how to do it. Turn a small group into a mass of people.
The Reminders app has always lacked the oomf that would make a person switch from a powerful third-party task manager. But Reminders has received quite the makeover in iOS 13, including a revamped UI and several new features, such as timed reminder alerts, which make the app a ...more
This software tutorial shows you how to create custom particles in Trapcode Particular plug-in for After Effects. Learn how any object can be used to create particles with the Particular plug-in in this After Effects tutorial. Create custom particles in Particular in After Eff ...more
This video guide offers a complete overview of how to create a seamless looping particle animation with Trapcode Particular and Adobe After Effects. Whether you're new to Adobe's popular motion graphics and compositing software or a seasoned video professional just looking to ...more
Trapcode's Particular is a powerful 3D particle system AFter Effects plugin that creates a wide range of effects — from natural smoke and explosions to geometric or organic abstract elements. In this Particular tutorial you will learn how to bounce particles on a 3D layer in a ...more
This software tutorial shows you how to get started using Trapcode Particular particle plug-in for After Effects. Particular is a powerful 3D particle system that creates a wide range of effects — from natural smoke and explosions to geometric or organic abstract elements. If ...more
Here is a simple way to make an extruded shape emit from Trapcode Particular. Particular is a particle plug-in for After Effects and this two video tutorial will show you how to create and then use 3D stars with Particular. It's a simple example, but the creative possibilities ...more
In this video tutorial, you'll learn how to control the emitter position in Trapcode Particular within Adobe After Effects (as well as how to draw paths with your mouse). For all of the particulars, and to get started using this effect in your own projects, take a look! Contro ...more
In this video tutorial, we learn how to create custom, particle-based visualizations for music with Trapcode Particular, Soundkeys & Adobe After Effects. Whether you're new to Adobe's popular motion graphics and compositing software, new to the Trapcode Suite or merely looking ...more
In this video tutorial, you'll learn how to create a seamlessly looping particle system within Adobe After Effects with Trapcode Particular and Starglow. For all of the specifics, and to get started using this effect in your own projects, take a look! Loop particles with Trapc ...more
This is a quick tutorial on how to use Trapcode's Particular to generate an asteroid belt. Whether you're new to Adobe's popular motion graphics and compositing software or a seasoned video professional just looking to better acquaint yourself with the program and its various ...more
In this video tutorial, we learn how to create a lighted X-Mas tree with Trapcode Particular (TP) and Adobe After Effects (AE). Whether you're new to Adobe's popular motion graphics and compositing software or a seasoned video professional just looking to better acquaint yours ...more
In this video tutorial, we learn how to create a stitched denim effect with Trapcode Particular. Whether you're new to Adobe's popular motion graphics and compositing software or a seasoned video professional just looking to better acquaint yourself with the program and its va ...more
In this tutorial, Creative Cow leader, Michael Park, demonstrates another, more advanced method for creating shimmering glitter particles using Trapcode's Particular in After Effects. The main advancement is the implementation of 3d rotation of the glitter particles, as well a ...more
In this video tutorial, we learn how to create 3D picture montages with Trapcode Particular in Adobe After Effects. Whether you're new to Adobe's popular motion graphics and compositing software or a seasoned video professional just looking to better acquaint yourself with the ...more
Using Trapcode Particular, Harry Frank teaches us how to create subtle unusual particle effects using the Aux Particle function in Trapcode Particular. Whether you're new to Adobe's popular motion graphics and compositing software or a seasoned video professional just looking ...more
In this Googler's guide from the folks at Mahalo, we learn how to limit search results to a particular national domain like .co.uk or .ru. For all of the relevant details, and to get started using this handy Google hack yourself, watch this video tutorial.
Want to block one specific website while allowing access to the rest of the web? With the Microsft Windows 7 or Windows Vista operating system, it's a cinch! So cinchy is it, in fact, that this home-computing how-to can present a complete, step-by-step overview of the process ...more
In this clip, you'll learn how to create a realistic 3D thunderstorm scene using Adobe Adobe After Effects, Trapcode Particular and Horizon. Whether you're new to Adobe's popular motion graphics and compositing software or a seasoned video professional just looking to better a ...more
Learn how to use Trapcode Particular 2 to generate a realistic crowd scene within Adobe After Effects. Whether you're new to Adobe's popular motion graphics and compositing software or a seasoned video professional just looking to better acquaint yourself with the program and ...more
Learn how to use Trapcode Particular within After Effects with this helpful video guide. Whether you're new to Adobe's popular motion graphics and compositing software or a seasoned video professional just looking to better acquaint yourself with the program and its various fe ...more
In this lesson from Red Giant Software, you'll learn how to use Trapcode Particular 2 with Adobe After Effects CS4 or CS5. Whether you're new to Adobe's popular motion graphics and compositing software or a seasoned video professional just looking to better acquaint yourself w ...more
With so many different types of yeast, it can be difficult for a novice baker to know which one is best for which bread type. This video shows you the difference between sourdough starter, cake yeast, active dry yeast, instant yeast and RapidRise highly active yeast. Use the b ...more
In this clip, you'll learn how to search for tweets abot a specific subject on Twitter. What do President Obama, the Dalai Lama and Justin Bieber have in common? Why, they're all on Twitter, of course. Join the party. Whether you're new to Twitter's popular microblogging appli ...more
You've probably connected your Android device to dozens of Wi-Fi networks since you've had it, and your phone or tablet remembers each of them. Whether it's a hotspot at home, school, work, the gym, a coffee shop, a relative's apartment — or even from a friend's phone — each t ...more
An internet connection has become a basic necessity in our modern lives. Wireless hotspots (commonly known as Wi-Fi) can be found everywhere! If you have a PC with a wireless network card, then you must have seen many networks around you. Sadly, most of these networks are sec ...more
A spare key is one of those things that never seems like a huge deal until you need it. If you've ever lost your keys, had them stolen, or locked yourself out of your house or car, you know how difficult and embarrassing it can be trying to get your door open. So, how would y ...more
Only three things in life are certain: death, taxes, and getting a dent in your car or truck. Even if you're as careful as possible, you can't always account for runaway shopping carts, wrongly thrown footballs, out-of-nowhere light posts, and other real-life annoyances. Howe ...more
Downloading YouTube videos for offline use to watch later has always been a problematic endeavor. Dedicated third-party apps don't last long in the App Store, web-based converters aren't very functional on mobile, and rogue apps outside the App Store are tricky to sideload and ...more
When I see the words "free trial," I know I'm probably going to have to whip out my credit card and enter in the number to "not get charged." Then I end up forgetting about the trial and want to kick myself in the ass when I see my statement at the end of the month. In order ...more
In the UK, 20 percent of divorce filings include the word "Facebook." You may think you're being slick by using the site to chat with your ex, but the problem is that Facebook saves everything, and I mean everything. All someone needs is your login information and they have ac ...more
Spotify is one of the most popular music streaming services available and allows you a high degree of control over the way you experience your music. Included in that is the album art for your playlists. While not an option ingrained in the mobile app itself, changing a playli ...more
Welcome, my hacker novitiates! As part of my series on hacking Wi-Fi, I want to demonstrate another excellent piece of hacking software for cracking WPA2-PSK passwords. In my last post, we cracked WPA2 using aircrack-ng. In this tutorial, we'll use a piece of software develop ...more
One of the most popular things to do on Snapchat is to earn a Snapstreak. This occurs when you and one other friend have sent snaps (not chatted) to each other within 24 hours for at least three consecutive days. One you've passed the three-day mark, then you and your friend w ...more
If browsing speed is important to you—and it should be—you'll probably be interested to know that there are ten simple flag modifications you can make in Google Chrome in order to achieve the fastest browsing speed possible. A few months ago, Dallas covered six ways to speed ...more
Welcome back, my fledgling hackers! In the first part of my series on Wi-Fi hacking, we discussed the basic terms and technologies associated with Wi-Fi. Now that you have a firm grip on what Wi-Fi is exactly and how it works, we can start diving into more advance topics on h ...more
Throwaway phones aren't just for seedy criminals and spies—they can be useful for many everyday situations. For example, you don't necessarily want to give your real phone number out to strangers when you're buying or selling something on Craigslist, managing an Airbnb listin ...more
Smartphones are almost always connected to the internet, so it stands to reason that they can be hacked remotely. Or perhaps a jealous boyfriend or girlfriend got hold of your device physically, in which case they could've potentially installed a keystroke logger, a virus, or ...more
The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, ...more
As the best-selling toy of all time, the odds of you once playing with a Rubik's Cube are pretty high. And if you're like me, or even the cube's inventor Erno Rubik, your first attempts likely ended in futility. Every twist, every turn, the cube just gets more and more mixed u ...more
Traditional root ad-blockers like AdAway and AdBlock Plus have no effect on YouTube anymore. Until now, if you wanted to get rid of the commercials that play before your favorite videos, there have only been two ways—either by paying for a YouTube Red subscription, or by using ...more
Clearing the cache on your computer is (usually) a quick and easy way to help speed it up. Deleting those temporary files frees up space, helping you computer run smoother, especially if you have not cleared the cache for a extended period. However, finding the different cache ...more
There's lots of new stuff in iOS 11, but just because things have changed doesn't mean they're better. So if you've updated to Apple's latest OS and decided it wasn't for you, you'll be happy to know that you can still go back to iOS 10.3.3. But this window of opportunity for ...more
Welcome back, my apprentice hackers! In this series on password cracking, I have been attempting to develop your skills in the age-old art of password cracking. Although it might seem like a simple and straightforward exercise, those of you who have attempted password crackin ...more
There are a few different ways to install Magisk. If you're already rooted and you just want access to Magisk modules, you can use Magisk Manager to install the Magisk framework. Or, if you want to pass SafetyNet on a rooted device, you can switch from SuperSU to Magisk SU. Bu ...more
Have you ever seen those super-expensive universal remote controls like the Logitech Harmony and thought to yourself, "Man, I really want one of those, but that's just too much money"? You're not alone. Luckily, if you're an owner of an Android device with an infrared (IR) bl ...more
I'm constantly searching for a homemade pizza dough that tastes good but isn't too challenging to execute. In other words, a recipe that doesn't require any arcane "dough whispering" skills. However, my hunt may be coming to an end thanks to one celebrity chef's concept. Maki ...more
Without a comprehensive root method for all Android phones and tablets, a device-specific approach is needed. And since we always cover new rooting methods for all the popular phones here at Gadget Hacks, we've built this always-updated guide to rooting many mainstream Android ...more
There are two options when it comes to a dent in your car — live with it, cringing each time it enters your view, or get rid of it. While the latter is obviously the best option, most of us will probably just live with dents and dings since spare money is better spent on the a ...more
In my first installment in this series on professional hacking tools, we downloaded and installed Metasploit, the exploitation framework. Now, we will begin to explore the Metasploit Framework and initiate a tried and true hack. Before we start hacking, let's familiarize ours ...more
There's a lot of conflicting information out there when it comes to the best habits for charging a smartphone's battery, so let's clear some of that up right off the bat. Lithium ion batteries (the type used in most modern electronics) start to lose their ability to hold a cha ...more
There's a lot more to your iPhone's dialer screen than just entering phone numbers and hitting the green call button. It's not very obvious, but there are secret codes that you can enter on the dialer to find out information about your device, help troubleshoot issues, and mas ...more
Search engines index websites on the web so you can find them more efficiently, and the same is true for internet-connected devices. Shodan indexes devices like webcams, printers, and even industrial controls into one easy-to-search database, giving hackers access to vulnerabl ...more
If you're not much of a drawer, you can still get the look of a detailed drawing simply by taking a picture and using Photoshop's tools and filters to transform it into something that looks drawn by hand. Video: . There are actually many ways to do this, but in this how-to, we ...more
UPDATE 11/17/15 The Xposed Framework now officially supports Android 5.1 through 5.1.1 Lollipop devices as well. Everything will still work the way it has with Android 5.0 through 5.0.2, but there are a separate set of files for the newer Android version. I'll cover both belo ...more
Welcome back, my hacker novitiates! Recently, I demonstrated a hack where you could redirect traffic intended for one site, such as bankofamerica.com, to your fake website. Of course, to really make this work, you would need to make a replica of the site you were spoofing, or ...more
Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this tactic used to take up to 8 hours, the newer WPS Pixie-Dust attack can crack networks in seconds. To do this, a modern wireless ...more
With tools such as Reaver becoming less viable options for pen-testers as ISPs replace vulnerable routers, there become fewer certainties about which tools will work against a particular target. If you don't have time to crack the WPA password or it's unusually strong, it can ...more
Not having internet sucks! We do a ton online these days, from working, shopping, studying, and collaborating, to watching fail videos and endlessly clicking through memes. But sometimes your mobile screen is just not big enough! So, wouldn't it be cool if you could use your ...more