Root

How To : Add volume to short hair

This video shows how to add volume to short hair for anyone with flat or fine hair. Dean Banowetz shows how to add volume using the InStyler Rotating hot iron in this video tutorial. To use this tool, take a section of hair and then curl under to create body at the root of hai ...more

How To : Use Trucha Bug Restorer to mod / hack your Wii

Trucha Bug Restorer is a powerful piece of homebrew software that you can use on your Wii to make sure that it is formatted properly in order to play burned games and use other hacks. This video will show you how to use it to set up an installation of cIOS on your Wii, which i ...more

How To : Reset your SSH password on an iPhone or iPod Touch

This video tutorial from DrJailbreak shows how to reset your SSH password on iPhone or iPod.If you changed your password through Rock with your Mobile Terminal and forgot it, this is what you are going to do to set your root and mobile password back to alpine.First you will ne ...more

How To : Use WinSCP to SSH into your iPod Touch or iPhone

Many videos out there tell you about how you need to SSH into your iPod touch or iPhone in order to do certain things. But what does this mean? This video explains how to SSH into the iPhone or iPod Touch using WinSCP. On your iPod Touch or iPhone, get these packages from Cyd ...more

How To : Analyze Wi-Fi Data Captures with Jupyter Notebook

When it comes to sniffing Wi-Fi, Wireshark is cross-platform and capable of capturing vast amounts of data. Making sense of that data is another task entirely. That's where Jupyter Notebook comes in. It can help analyze Wi-Fi packets and determine which networks a particular p ...more

How To : Recover a Windows Password with Ophcrack

When Windows stores a password, it is done so by hashing the password in an LM hash and putting it in the Windows SAM file. In the scary moment that you lose your password, but don't want to pay some geek to have full root access to your computer, you need to recover it using ...more

News : What REALLY Happened with the Juniper Networks Hack?

Last month, it was revealed that Juniper Networks' routers/firewalls were hacked. It was reported that a backdoor was implanted in the operating system of their routers/firewalls and that attackers could listen in on all encrypted communication. There are now fears that all co ...more

How To : Compare methods of solving quadratic equations

In this video the instructor shows the different methods of solving quadratic equations. There are many methods to solve quadratic equations each with its pros and cons, each method suitable for a particular situation. The first method to solve quadratic equation is factoring. ...more

How To : Upgrade Your Motorola XOOM 3G to Verizon's 4G LTE

The Motorola XOOM was just released last week to Android-hungry fans waiting the next best thing to Apple's iPad. But should it have been released, considering Verizon's switching to the 4G LTE network soon? From what I saw across Android forums, yes—because most could not wa ...more

Ingredients 101 : The Secret Powers of the Humble Radish

The Spanish and Portuguese introduced many things (some desirable, some not, depending on your POV) to Mexico in the sixteenth century: Christianity, language, and lots of flora and fauna. Among the flora were radishes, a root vegetable which was briskly inducted into the loc ...more

How To : Stop Any Android App from Stealing Your Data

Many popular apps automatically share your personal data. While I have accepted a certain amount of data collection from Google, to know companies such as Facebook perform this without my consent bothers me. After some researching, I've found a great solution, and it doesn't r ...more

How To : Rationalize a denominator that contains a surd

In this video, we learn how to rationalize a denominator that contains a surd. First, you need to rationalize the denominator by removing any square root sign. To do this, you will multiply the fraction but the flip of the denominator over itself, with the square root. Then, y ...more

How To : Always-Updated List of Google Pixel Codenames

In a tradition dating back to the Nexus days, Google has always used fish-themed codenames when communicating internally about their phones. Their laptops and tablets are usually named after video game characters. These names often give us the first evidence of an upcoming dev ...more

How To : Bypass Windows Passwords Part 1

This is my first article on here, it's based off of a project that I'm working on at school which is on three ways to bypass windows user password's. If all goes as planned and you all would like I'll work on part two and part three and post them as soon as I can. I do have to ...more

How To : Install Android 9.0 Pie on Your Pixel Using a Mac

While installing the new Android 9.0 Developer Preview is fairly easy if you're using a Windows machine, it's a little trickier if you want to use macOS instead. To help you get the latest Android OS on your Google Pixel phone, we'll break down the whole process so using your ...more

How To : Dice an Avocado in Seconds — Without a Knife

Avocados are one of the most universally loved foods, yet a lot of people avoid them because they can be a hassle to cut, especially if you're trying to make cubes. Don't Miss: Ripen an Avocado in 10 Minutes or Less You can peel the avocado and then cube them, but that take ...more

News : Medieval peasant house

Hey everybody, here is my entry for the medieval building contest. I don't actually care if I win, it was just fun to think about. I have this great book series called The History of Private Life which goes into wonderful detail about how people did everyday things throughout ...more

  • Hot
  • Latest