Learn to crochet with these how-to videos. Once you have crocheted one row you can two, or three rows. Crochet a towel, a blanket, or anything longer. Watch and learn how to finish crocheting a first line and move on to the second one.
He explains how to tie a "blood knot" and what the blood knot is used for, which is joining two separated rope/string ends. He demonstrates the knot, which starts by taking the two lines and lining them up one on top of the other, so they are parallel to each other. Then, star ...more
Every fisherman has dealt with having to tie their own fishing knots, and when you come into a situation where you have two similar fishing lines with different rated strengths. Tying this fishing line together is simple and can be done with the Double Uni knot, sometimes call ...more
If you want to learn how to get and graph the slope of a line using two points, you should watch this. 1. Let your two points be (x1 , y1) and (x2 , y2). Draw a straight line that connects the two points. 2. Use the formula, m = change in y over change in x , for finding the s ...more
This is an interesting trick to solving multiplication problems. It involves multiplying 2 double-digit numbers with hand drawn, crisscrossing lines. Say you have a multiplication problem of 13 x 21, you would draw 1 line by itself, then 3 lines, side-by-side, all parallel to ...more
Learn how to dance the country two step with Kelly Anne. Country dancing has five popular steps; line dancing, el paso, west coast swing, county cha cha, and the two step. Also known in other parts of the country as Texas two step. Do the Two Step and Line dance - Part 1 of 17 ...more
One of the biggest advancements in the new iPhone XS, XS Max, and XR is the dual SIM functionality that will let you use two cellular networks at once. Like Sinatra, however, Apple is known to do things its own way, so their dual SIM setup is a bit different than you might thi ...more
In this video, we learn how to balance a chemical equation. First, take a look at both sides of the equation and figure out how many atoms there are for both. Once you write this out, you will have an idea of how unbalanced it is. Now that you've done this, you need to think a ...more
This video tells you how to find a slope of a parallel / perpendicular to it. In the equation y = mx + c, m is the slope. To calculate the slope of a line that is parallel to another line, you have to consider the rule m1 = m2 which means slope of the first line m1 is equal to ...more
In this video, we learn how to measure your space when drawing a landscape. First you want to draw a line in the middle and measure out the line to the top of the building, and create another line there. Measure the length and then measure the edge of the outside of the buildi ...more
This is a presentation of different types of immune responses in human body. There are two types of immune systems i.e., non specific and specific or adaptive immune system. Again, non specific immune system is sub- divided into barriers. It is the first line of defense. The s ...more
How to caulk the baseboards in your home When you change the baseboards in your home they will need to be caulked after they are installed to fill the gap between the baseboards and the wall. Put a line of painters tape along the top edge of the baseboard. Then put a second li ...more
In this video the instructor shows how to solve systems of linear equation by graphing. A system of linear equation is equations of two lines that are to be graphed on the same coordinate axes. Now take the first equation and write it to form y = mx + b. Now extract the value ...more
In this tutorial, we learn how to cite articles from online library databases in MLA. Make sure you have all the information available so you can include all of the information for the citation. The citation will be written in the following order: author, article title, public ...more
Welcome back, my hacker apprentices! To enter the upper echelons of hackerdom, you MUST develop scripting skills. It's all great and well to use other hacker's tools, but to get and maintain the upper hand, you must develop your own unique tools, and you can only do that by d ...more
When it comes to winter weather, the garage should not be neglected, especially if you have a room directly above it. Neglecting to properly insulate and seal your garage doors will create a constant rush of cold air inside, making the garage really cold, in turn making the fl ...more
Learn how to play the sweet song Drown in My own Tears by Ray Charles in Minutes! 1. The intro starts with the G# chord until the first line of the verse. 2. The next tab is the G# G#7 F# and G#; on the line after the lyric "my eyes". 3. The second tab of the second line: G# F ...more
Knowing how to cut a straight line is essential for most projects. AsktheBuilder.com host Tim Carter demonstrates one technique for cutting a straight line. With his tips, you'll have no problem getting perfect cuts every time. To assist with your cutting, first clamp a frami ...more
A bouquet of roses is a lovely thought but will quickly wilt and die. Give your loved one a bouquet of roses that will last for years to come and it will only cost you the price of a pencil and paper. They’re quick and easy to sketch. With a little patience, you can learn the ...more
Before I start a series on remote exploitation, I think we should learn the basics of Perl. Perl, Ruby, C, C++, Cython and more are languages that some penetration testers just need to learn. Perl is a great language for multiple things, sadly, like many other scripting langua ...more
First of all you have to open the 'notepad'. Now you have to type in "<html>" in first line. Write "<head> in second line. Write "<title>this website contains text wrapped around images</title>". In the fourth line you have to type '<body bgcolor="#999999">'. This shall add a ...more
Dead Island is known for having the most successful trailer of any game ever. It was a beautiful cinematic experience. But sadly, as details of the game itself emerged, and after it was shown at conventions around the world, doubt began to set in about whether this five-year-l ...more
Dark mode is finally rolling out for Gmail on Android. But this is a Google product, so you already know it'll be a while before the server-side update hits most devices. Sideloading the newest APK doesn't work, neither does switching accounts. But if you're rooted, you can en ...more
This method is easy, intuitive and requires very little math. You will need: Any flat flexible sheet material (ex. paper plates for this how-to) Pencil or pen Scissors Stapler, tape, glue or fasteners Ruler or straight edge Protractor Flatten Plates Flatten the paper plate ...more
Sometimes our information important. So important that we have to encode it to keep it away from criminals. What better way to encode information than to make our own encoder with Python? In this tutorial, we will cover the basics of cryptography in hopes to make a "gibberish ...more
For a while, Gmail only had one swipe gesture, and it could only perform one of two actions: Archive or Delete. Not that it wasn't useful — you could eliminate most spam emails in a matter of seconds by swiping left or right on any email in your inbox. But now, Google has fina ...more
In the last tutorial, we learned how to make functions and how they work on the high level. This time, we will take a peek under the hood again, stare deep into its soul and see its ugliness face to face to see how it works in the lower level. The Code Segment The code segme ...more
Hello everyone! This is part 7.0 of my Sorting series. I know, I said last time that there would be a 6.1, but not just yet! So, anyway, here we are at 7.0 -- and I'm wondering about how long I can drag this whole thing out... Merge Sort: The Algorithm Under the Hood Merge ...more
If you want the best two-factor authentication app out there, our pick is Authy. A close second is LastPass Authenticator. If neither of those is to your liking, try Duo Mobile or Microsoft Authenticator. But if you're fine with missing out on great features, then and only the ...more
A new study has found that up to half of people who think they have a penicillin "allergy" can still receive the drug, and other antibiotics with similar structures, without any negative reactions to the meds. Why? Because they're not really allergic, doctors say. In truly pe ...more
Welcome back, my aspiring hackers! Many of you have installed Kali Linux as a virtual machine (VM) using VMware or VirtualBox, while others have installed Kali (or BackTrack) in a dual-boot system. The drawback to installing these hacking systems as a VM is that it then requi ...more
Welcome, my neophyte hackers! The aspiring hacker needs to know a bit of Linux to be successful, and probably most importantly, Linux networking. To fill that knowledge gap, I'm offering this guide on Linux networking basics. I assume that you understand a small amount of net ...more
This article details the step-by-step instructions on how you can make a strawberry tower that can be used for your hydroponics/aquaponics system. The water dripping through the system contains the nutrients, so soil is not used. The growing media is expanded shale, but you co ...more
Welcome back, my greenhorn hackers! I began this series on scripting awhile back to teach all aspiring hackers how to write some basic scripts for hacking and reconnaissance. Without developing some basic scripting skills, the aspiring hacker will be condemned to the realm of ...more
Mobile privacy is one of the most pressing security issues in existence. Since we carry our phones with us everywhere we go, we need to ensure that we're safe from prying eyes. The Premium Mobile Privacy Lifetime Subscription Bundle is your ticket to ultimate privacy. The bun ...more
Welcome back, my hacker novitiates! In an earlier Linux Basics tutorial, I had demonstrated the basics of the Apache web server. Since Apache is the world's most widely used web server on the Internet (as of July 2015, Apache was 38%, IIS was 26%, and Nginx is 15%), the more ...more
Welcome back, my novice hackers! Episode 6 of Mr. Robot has come and gone and, as usual, it did not disappoint. Once again, our hero, Elliot, has used his extraordinary intellect and hacking skills to awe and inspire us. In this episode, Elliot is being blackmailed by the ru ...more
Welcome back, my aspiring hackers! In previous tutorials, I have shown you how to scan the globe for vulnerable servers and write simple scripts in BASH and Perl to perform other reconnaissance tasks. In a very recent guide, I taught how to scan vulnerable servers for Heartbl ...more
Welcome back, my greenhorn hackers! Now that we're familiar with the technologies, terminology, and the aircrack-ng suite, we can finally start hacking Wi-Fi. Our first task will be to creating an evil twin access point. Many new hackers are anxious to crack Wi-Fi passwords t ...more
Welcome back, my greenhorn hackers! I've been writing these Linux tutorials in an attempt to fill the void in the education of some aspiring hackers into the Linux operating system. There is a lot to know, and in this tutorial, we'll look at Linux file permissions. Step 1: Ch ...more
An incorrectly scaled object in your HoloLens app can make or break your project, so it's important to get scaling in Unity down, such as working with uniform and non-uniform factors, before moving onto to other aspects of your app. This HoloLens Dev 101 series has been desig ...more
Creating GIFs of your own burst images has been possible for a while with third-party iOS apps, some of which cost money or include in-app purchases to utilize the full potential. Fortunately, with Shortcuts, Apple's automation workflow app, there's finally a native way to ach ...more
If you're worried about the security of your Mac, there are easy measures to prevent the most dangerous attacks. Named after the tactic of accessing an unattended computer in a hotel room, we can thwart "evil maid" attacks with Do Not Disturb and LuLu, free macOS tools by Obje ...more
In iOS 13 and later, Spotify supports Siri commands, something we've wanted ever since Siri and Spotify were things. But if you're on iOS 12 still, you're missing out. All you can do is open the Spotify app, then pause and skip tracks with Siri after you start playing a song m ...more
Have you ever used an open wifi, which after you connect displays a website to enter your credentials to get internet? That website is called captive portal and widely used in airports, hotels, universities etc. Have you ever wondered what would happen if someone would set up ...more
Analysis of photographs and social connections can be a huge component of social engineering. Understanding who a person is, as well as who they know, can establish links within a company. This information could be used by hackers to execute elaborate social engineering attack ...more
Whether you miss the good old days of Telnet or you want to know what hacking was like when security was nothing but an afterthought, Telehack is the game for you. The text-based hacking game is a simulation of a stylized combination of ARPANET and Usenet, circa 1985 to 1990, ...more
After a long hiatus, we shall once again emerge from the shadowy depths of the internet to build an exploit. This time, we'll be looking at how to defeat a non-executable stack by using the ret2libc technique — a lean, mean, and brilliant way of exploiting a stack overflow vul ...more
If you're getting into automation, Bash scripting is usually the way to go. However, there are a couple of limitations, and one of them is logging into another device like a Raspberry Pi and running a script automatically. To help in those situations, we're going to automate d ...more
Cases and stickers are always great, but they aren't the only way to customize an iPhone. The software on your device is full of customization options, from a better-looking home screen and cooler lock screen wallpapers to app icon changes and a system-wide dark mode. There's ...more
I assume at this point you have already completed your control panel using Part 1 of this How To guide. Now, if you are anything like me, you couldn't fight the urge to play, and you have your panel sitting on saw horses in the living room. Depending on your situation, your s ...more
Looking for another Angry Birds fix? Well, drop the lame birds and pick up the zombies—Stupid Zombies, that is. You'd think that killing "stupid" undead beings would be easier than knocking off a few "angry" vertebrates, but it's actually more challenging—and more fun! Who wou ...more
Prank Calls, Masked NumbersWho is calling your phone or your child's? Pranksters use a lot of tricks to make sure they can get on your nerves. Being able to trace prank calls is important because you're not going to learn much from your Caller ID, since most prank callers use ...more
Airsoft doesn't get any better than a cloud chamber BB machine gun, aka Cloud BBMG. This design has an incredible rate of fire. If you've got a full charge of compressed air, it can easily fire more than 50 rounds per second at a 350 ft/s muzzle velocity. Since this is a legit ...more
It's easy to lose oneself when playing Minecraft and easier still to get plum lost. That's why it's always good to have a compass on hand. No compass? No problem. There are, in fact, no fewer than seven methods at your disposal for finding true north in a Minecraft world. Bett ...more
Over the years, I have enjoyed playing with Asterisk. I have found Asterisk to be extremely powerful and fun to play with. There are several books and many scattered how to articles out there, but most are outdated and the information required to build Asterisk from beginning ...more
For lazy children, winter snow means snowball fights, snowmen and snow days. For lazy homeowners, it can mean leaky roofs and costly repairs. Fortunately, where snowy roofs are concerned, a little bit of preventative maintenance can go a long way. As you're probably already w ...more
Many things cause a bike tire to deflate. Glass, sharp rocks, tacks, and nails can pierce the tire and puncture the tube within. A tube can be pinched between the rim and tire causing the tube to split when inflated. If a tire has a hole in it, the tube, which is filled with a ...more
Last weekend, some unlucky Gmail users inadvertently had their email accounts wiped out. Actually, it was 0.02 percent of all Gmail users—or roughly 40,000 of the 200 million who use the email service, due to an "unexpected bug" which affected copies of the data. Gmail does ma ...more
Kindle users love reading. But let's face it—nothing compares to the feel of a book in your hands. Sure, Amazon's Kindle makes it possible to read more books, clears up a lot of shelf space, fits snugly in anyone's baggage and can actually be cheaper in the long run. But each ...more