iTunes has now made printing CD case inserts out of your song lists simple and quick. It's as easy as opening iTunes, clicking on the desired play list and printing the CD case label. Print CD jewel case inserts from iTunes. Click through to watch this video on videojug.com
2012 has arrived! Time to get rid of that generic 2011 calendar that was gifted to you two Christmases ago and replace it with a new and updated calendar, personalized with your own photos. Thanks to the wonderful girls at Shutter Sisters, creating your own 2012 photo calendar ...more
Finally, the professionals are weighing in on how to create fake wounds! This video features a makeup artist from the BBC demonstrating how to make a really realistic fake cut on the hand of an actor using theatrical makeup. The plastic pieces from a CD jewel case that resembl ...more
Watch this video to learn how to print text with C++. Other topics covered in this video include semicolon usage, whitespace, and case sensitivity.
Lost the jewel case for one of your CDs or making a mix-CD as a gift? Don't let that CD get scratched. Here's a real simple method to fold a quick and easy case for any stray CD. Watch this video tutorial and learn how to make your own today!
If you've cracked or lost the jewel case for a CD, or if that big plastic holder is just too bulky to carry around, have a look at this fun tutorial. In this video, learn how to make a protective case for a CD or DVD out of paper, and prevent scratches. This is pretty quick an ...more
Did you loose a CD jewel case somewhere in life? Do you have enormous amounts of data cds lying around and have no place to put them? You can make a CD or DVD case out of a simple piece of paper in a few easy steps. You Will Need: • CD or DVD • Piece of 8.5x11" paper • Marker ...more
To start off making the guitar pick case, the apparatus you need here is an old CD case, scissors, a pencil, ruler, background design, the guitar picks, blue tack, knife and glue. Open the CD case and remove the holder part of the CD case using the knife. Cover the back side u ...more
HP TouchSmart PC is a powerful computer with various features. You can use you PC to connect to other hardware devices like printer, scanner etc. A hardware device might not even work with you computer because the connecting cables might not match. So if you want a printer to ...more
In this tutorial, we learn how to use Adobe Acrobat to read PDF files. First, click on combined files on your desktop, then add files to the program. You will see different documents on your computer when you browse, then take these files and move them up and down in the order ...more
A remedy for barren walls everywhere. The experts at Photojojo show you how to hang art on your walls using CD jewel cases as frames. Make a CD case photo frame. Click through to watch this video on photojojo.com
This video tutorial teaches how to find homegroup password in Windows 7. For this you should be using the computer which is part of the homegroup. The way to check this is by going to the control panel and clicking on network and internet link. In the ensuing window the networ ...more
STANDP'S WINDOWS 7 "ASTON-2" CUSTOMIZED DESKTOP IT ROCKS COMPLETELY!. DEC 07 Computer Backup If you have taken good care of your computer then you know what you have to do to keep it running smoothly. It has to be cleaned regularly so there isn't any dirt and dust on it. It ...more
Introduction I am currently starting to learn the Python programming language, programming languages make up all the programs that we use, that is enough for it to fascinate me if it isn't for you then maybe start reading this and you will quickly see how powerful it is. This ...more
This little bad boy is lots of fun, but I'm not sure I'd hold it up to my ear in public... especially wearing creator Junior Tan's menacing facial expression. The best part about the iPhone revolver? There's a HowTo. Junior Tan created his Ruger LCR Revolver iPhone case usin ...more
STANDP'S CUSTOM DESKTOP "ASK NOT WHAT YOUR DESKTOP CAN DO FOR YOU...". http://standp-how-to-vidzzz.wonderhowto.com/corkboard/new-post/text/ Showing newest posts with label tips-n-trick. Show older posts DEC 07 Computer Backup If you have taken good care of your computer th ...more
Note: The article assumes that the reader has a fundamental understanding of at least one other programming language, and that this is intended serve as a quick reference for Perl's basic syntax & behavior in regards to Variables, Control Structures, & Functions. Learning to ...more
While some people might like Thanksgiving because of the food, seeing family, or another wholesome reason, many of us also enjoy saving big on the items we've been eyeing all year. Take iPhone cases, for example. Speck, Insignia, even Apple all make cases that can put a dent i ...more
The holidays are here, which means a slew of new smartphones are set to be gifted to loved ones in the spirit of giving. Of course, a great case to compliment and protect that precious flagship is a must, regardless of whether it's a OnePlus 6T, iPhone XS, or Galaxy Note 9. An ...more
Surveillance is always a useful tool in a hacker's arsenal, whether deployed offensively or defensively. Watching targets yourself isn't always practical, and traditional surveillance camera systems can be costly, lacking in capabilities, or both. Today, we will use motionEyeO ...more
Developers creating login systems know better than to store passwords in plain text, usually storing hashes of a password to prevent storing the credentials in a way a hacker could steal. Due to the way hashes work, not all are created equal. Some are more vulnerable than othe ...more
As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance. The issue with port ...more
Welcome back! In the last iteration of how to train your python, we covered loops, today we'll be covering something that I wish I had learned about much earlier in my scripting career, errors. We all run into them, and they can be frustrating, but there is also a silver linin ...more
Apple's new Watch models go on sale April 24th in Apple Stores everywhere, and can be preordered online starting April 10th. If you're set on preordering one, how do you know which size to choose? Whether you plan on getting an Apple Watch, Apple Watch Sport, or Apple Watch E ...more
Apple is no newbie when it comes to color. First there was the iMac G3, which rocked a translucent and brightly-colored plastic shell (pictured below) available in 13 different shades. Shortly thereafter, there were the similarly colored iBooks. After that came the assorted b ...more
Apple's streaming music service, Apple Music, offers a three-month free trial that hopes to get you addicted enough to pay for a monthly subscription. You may even see a one-month trial if you're a former subscriber. While it's not very obvious, there is a way to cancel either ...more
Welcome back to another C tutorial, this post covering the first part of control structures, if statements. Let's get right into it. What Is an if Statement? If statements are conditionals which allow the programmer to direct execution flow depending on certain circumstances ...more
A dead man's switch is a fairly simple concept. If you don't perform a specific task before a set amount of time, it'll perform a specific action you set. They can be handy not just for hackers but for everyone who wants to protect themselves, someone else, or something tangib ...more
It looks like Snap's foray into augmented reality billboards last year was successful, as the company has returned with two more outdoor advertisements for its Snap Originals series. Now through Sept. 24, Los Angeles residents and visitors will have the opportunity to interac ...more
The Washington Post believes augmented reality adds an extra layer to stories, and they're doubling down on that belief by adding in new AR features into their already popular "rainbow" news (iOS and Android) and Classic (iOS and Android) news apps. Last year the media compan ...more
While attempting to hack a web app, there may come a point where the attacker may have to escape the default directory in order to access unauthorized files. This is known as a directory traversal attack. Much as the name implies, this attack involved traversing the servers di ...more
Apple Card has generated quite the buzz since its March 2019 announcement. The iPhone maker's new credit card pairs with Apple Wallet on your device, is simple to sign up for, includes enhanced security over other cards, has zero fees, and provides daily rewards right to your ...more
With an inconspicuous Android phone and USB flash drive, an attacker can compromise a Windows 10 computer in less than 15 seconds. Once a root shell has been established, long-term persistence to the backdoor can be configured with just two simple commands — all while bypassin ...more
There are hundreds, if not thousands, of programming languages and variations of those languages that exist. Currently, in the augmented reality space, it seems the Microsoft-created C# has won out as the overall top language of choice. While there are other options like JavaS ...more
Welcome back everyone. I apologize for the lack of training articles, but I've been rater busy lately. I've recently picked up a second job and my college courses are now back in session, so I'm a bit strapped for time. FTP is a very important protocol. It's not only importan ...more
Welcome back, my hacker apprentices! To enter the upper echelons of hackerdom, you MUST develop scripting skills. It's all great and well to use other hacker's tools, but to get and maintain the upper hand, you must develop your own unique tools, and you can only do that by d ...more
While we now know that iCloud was not exploited by hackers to steal private celebrity photos, Apple did admit that guessed (aka brute-forced) passwords and/or iCloud security questions were to blame for the breach. All of the celebrity accounts that were compromised were targ ...more
I'm back! We're learning Java WhileLoops today. What Are "while" loops Just like For Loops, While loops are another type of loops in Java, except they rely on only a true/false statement to determine whether they run or not. Parts of a While Loop A while loop has 3 parts: ...more
Last time in how to train you python, we covered the basics of variables and output. While we were covering variables, we talked briefly about strings. "String" is just a fancier way of saying "Word". A string is simply a set of characters encased in quotations, this lets pyth ...more
Frankly, I never cared about the care labels on my clothing. They supposedly held some secret key to keeping clothes clean and bright, but who wants to look at little icons and a bunch of fine print for every single garment they wash? After moving out to go to college, I fina ...more
Welcome back! Sorry for being so quiet, I've been rather busy with this project lately! Anyways, in the last iteration of how to train your python, we covered lists. Today we'll be introducing iteration and the two loops python has to offer, for and while. Also, we'll be cover ...more
Welcome back, my greenhorn hackers! I began this series on scripting awhile back to teach all aspiring hackers how to write some basic scripts for hacking and reconnaissance. Without developing some basic scripting skills, the aspiring hacker will be condemned to the realm of ...more
Puzzle games are a great way to kill time and exercise your brain in one fell swoop. They challenge you to think strategically and plan ahead, whether that's to create killer chain combinations for maximum points, or to plain old keep from getting killed. But with so many puz ...more
Are you one of those people that waits until the last minute to come up with a costume for Halloween? Unless you're a makeup artist, have a ton of money, or are ultra-crafty, coming up with a good Halloween costume is always a low-priority task. That is, until it's Halloween a ...more
After a long hiatus, we shall once again emerge from the shadowy depths of the internet to build an exploit. This time, we'll be looking at how to defeat a non-executable stack by using the ret2libc technique — a lean, mean, and brilliant way of exploiting a stack overflow vul ...more
Bash scripting is a convenient way to automate things on any Linux system, and we're going to use it here to automate certain tasks we use all the time. Bash is a simple language for stringing together several different Linux utilities. Its simplicity makes it easy for beginn ...more
Kindle users love reading. But let's face it—nothing compares to the feel of a book in your hands. Sure, Amazon's Kindle makes it possible to read more books, clears up a lot of shelf space, fits snugly in anyone's baggage and can actually be cheaper in the long run. But each ...more
We’ve all been there before. Relentlessly refreshing Ticketmaster and filling in those CAPTCHA codes only to receive the miserable “No tickets are available at this time” message. That’s because ticket brokers with a dozen screens and God knows how many browsers snatch up anyt ...more
After years of false rumors and abandoned hopes, the day has finally come. Verizon Wireless is finally getting the Apple iPhone! No longer does AT&T monopolize the iPhone market. Three weeks ago, Verizon Wireless and Apple announced the iPhone 4's arrival to the nation's most ...more
Even with all the technological advancements, iPhones and Blackberries look sleek but lack individual style, their backs a basic black or silver. Turn a blah cell phone cover into a fairytale work of art by watching this video. Using 100% silicone and small jewels, pearls, an ...more
Eco...in this case also meaning 'economize' as we take an item that would normally have been thrown away & use it to make a cool fashion statement piece! This project is dedicated to the Green Guru Challenge and just uses household scraps headed for the trash, and turns them i ...more
Imagine that every time you print a document, it automatically includes a secret code that could be used to identify the printer -- and, potentially, the person who used it. Sounds like something from a spy movie, right? Unfortunately, this scenario isn't fictional. Most colo ...more
Want to be able to print wirelessly without having to buy a pricey network printer? Now you can! All you need to do is follow these simple, quick, steps. What you need: At least two computers running Windows Normal non-network printer A network Once you have all of these th ...more
Create sexy leopard print eyes. Fresh Face: Start with what I call a fresh face, which is your clean slate for all of your looks. A fresh face is after you have put concealer and foundation all over the face or only where needed, which ever you prefer. Also groom the eyebrows ...more
The Motorola XOOM was just released last week to Android-hungry fans waiting the next best thing to Apple's iPad. But should it have been released, considering Verizon's switching to the 4G LTE network soon? From what I saw across Android forums, yes—because most could not wa ...more
Solving a Dilemma This is a simple how-to for a cost effective drip irrigation system for your garden. My motivation to set up my garden for drip irrigation was pretty simple. In the summer, it gets to 90+ degrees outside, and my 50’ garden hose didn’t reach the far extents w ...more
The holiday season is here, and if you didn't already pick up a SCRABBLE set during Black Friday or Cyber Monday, then you still have time to buy the perfect gift for your lexical-minded friend. There's sure to be deals out there over the next couple of weeks, you just need to ...more
Need a little help choosing the right paper for the job? When it comes to making a good impression, choosing the right paper can make all the difference. Use guidelines will help you pick the best type for your project. • Something to print • Correct weight • Brightness ra ...more
Last week's challenge brought up a good question (thanks Lisa) regarding the functionality of the Official Scrabble Players Dictionary, 4th Edition, both online and in print form. The word TACTICAL was the answer to the first puzzle in that challenge, but when you search for t ...more
In Japan, kanzashi are hair ornaments, often in a floral or jeweled style, which adorn traditional female Japanese hairstyles. These are gorgeous long pins with a special adornment attached at the end. Kanzashi are what inspire this tutorial's messenger bag, which is similarl ...more