In my free time, I like to program in an image programming language called Context Free. You can download it at www.contextfreeart.org for free. The first thing to know about Context Free is that there are three basic shapes to which the program will understand and respond. T ...more
How to use uTorrent First of all we need to understand what uTorrent is. uTorrent is a file or a Micro-Torrent that helps you, the user, download stuff like documents, pictures, videos, or e-books. uTorrent is very, very, useful when you know how to do it. so hope fully this ...more
When you think of a dagger, you imagine a weapon that is small in stature, but useful for thrusting and cutting things. This next tutorial is going to show you something that is incapable of performing those tasks. This video is going to focus on how you can easily tie a Celt ...more
A fireplace is a great tool to use during the cold winter months. It can be used to help set a mood or just to keep you and others warm. But when the fire is out, it's important to close off the entrance to prevent any cold air from coming in and any warm air from leaving. The ...more
This Animal Welfare Foundation two-part video tutorial is from expert veterinary staff demonstrating the correct procedures for handling small mammals for clinical examination and medication. Its aim is to show that the primary consideration should be for the the welfare of th ...more
Tenderfoot is the first rank earned as a Boy Scout. The requirements of becoming a Tenderfoot provide basic skills to begin preparing the scout for higher adventure outings. Earning badges and receiving recognition can be very satisfying to boys. However, keep in mind that the ...more
Second Class Boy Scouts work on building their outdoor survival and camping skills. Compass work, nature observation, camp tools, and swimming are areas where new skills are mastered and demonstrated. A second class scout, having completed all the requirements, should be able ...more
Second Class Boy Scouts work on building their outdoor survival and camping skills. Compass work, nature observation, camp tools, and swimming are areas where new skills are mastered and demonstrated. A second class scout, having completed all the requirements, should be able ...more
As a Boy Scout, when the First Class rank is attained, a scout has learned all the basic camping and outdoors skills of a scout. He can fend for himself in the wild, lead others on a hike or campout, set up a camp site, plan and properly prepare meals, and provide first aid fo ...more
As a Boy Scout, when the First Class rank is attained, a scout has learned all the basic camping and outdoors skills of a scout. He can fend for himself in the wild, lead others on a hike or campout, set up a camp site, plan and properly prepare meals, and provide first aid fo ...more
As a Boy Scout, when the First Class rank is attained, a scout has learned all the basic camping and outdoors skills of a scout. He can fend for himself in the wild, lead others on a hike or campout, set up a camp site, plan and properly prepare meals, and provide first aid fo ...more
Ever wanted to display text in Minecraft? It's actually not overly difficult. In this tutorial, I will endeavor to guide you through the process between storing and displaying text from memory. To do this, we will examine two different methods of displaying and storing text in ...more
Today I was the only admin online at like 2:30 to 3:45. I had to deal with 27 people....asking me to World Edit all of their builds, and I explained how to apply online 3 different ways to 1 person...it was horrible. The other people who were online with me were getting super ...more
Making your own circuit boards can be a daunting challenge. You have to design a schematic, test it on a breadboard, design the board layout, and then after all of that, you still have to print and etch a board! Luckily, we have Fritzing. Fritzing is a free open-source PCB d ...more
In my Wireshark article, we talked a little bit about packet sniffing, but we focused more on the underlying protocols and models. Now, I'd like to dive right back into Wireshark and start stealing packets. The filtering capabilities here are very comprehensive. You can filte ...more
Big brother is watching when you're playing around on another system—and big brother is that system. Everything from operating systems to intrusion detection systems to database services are maintaining logs. Sometimes, these are error logs that can show attackers trying vario ...more
I finally got around to trying out another one of Will's mad science experiments and found out that this one was actually more satisfying (and less frustrating) than my slightly uncooperative jar jet. There's something very pleasing about making potassium nitrate at home in th ...more
No doubt you've seen some of the hack logs being released. One part that stands out over and over again is the heavy database usage. It used to be early on that virus and hackers would destroy data, usually just for lulz. However, with the explosive commercial growth of the In ...more
Wouldn't it be nice to just sit at your buddy's house, plug into his network, and see exactly what he's doing? What if it was as easy as that? What makes packet sniffers like Wireshark such potent tools is that a majority of local area networks (LANs) are based on the shared E ...more
So far, I've talked a lot about what's going on in the world around us, but it's time I come back to politics for a bit. That said, the name of this world is somewhat misleading, in the sense that I talk about everything, not just politics! But I digress again. In the current ...more
¬¬Just about every business has a website these days but very few businesses know how to effectively use their websites to get more customers. There are two different things that a business owner needs to do to increase their website traffic: optimize their site so that search ...more
Since the internet is becoming more and more important all the time in regards to overall marketing plans for many companies, it’s imperative that the company website be up to the task of attracting visitors and converting them into customers. There are many methods and techni ...more
If you know anything about search engine optimization and online marketing then you know that having as many links going into your site from good sources is very important. And if you’re not really experienced at building links or SEO in general then you might not know the bes ...more
Brainwashing is something that happens to us every day, whether you believe it or not. It doesn't take fancy tools or space-age technology. Even if our country didn't intentionally brainwash people (believe me, they do), our country's media is brainwashing people nonstop. Just ...more
Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm ...more
This is a two-part series to locking down the computer to provide maximum protection. Even though this guide will sound intrusive, we are talking about reality here. Extreme measures must be taken to protect our computers, especially when we have confidential documentation or ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more
Laptops are almost a necessity in today's society. It doesn't help that a laptop that can actually increase your work productivity will put at least a $1,500 dent in your wallet. I'm sure you have searched around to try to find factory direct deals, or (shiver) even looked at ...more
Curve stitching is a form of string art where smooth curves are created through the use of straight lines. It is taught in many Junior High and High School art classes. I discovered it when my math students started showing me the geometric art they had created. The process of ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. While mining is a basic aspect of Minecraft, it is often overlooked. Every adventure requires iron and diamonds and other ore and if you're playing in hardcore mode then you need al ...more
HOOSGOW 64 points (14 points without the bingo) Definition: a jail [n] Actually, it's slang for jail. You may not believe that slang is allowed on the Scrabble board, but it most definitely is when the word in question is used by a good majority of the people out there. Mer ...more
This Null Byte is the first part in a mini-series on the art of Social Engineering. I will be teaching you how to effectively defend yourself against it. What is Social Engineering? Social Engineering is the art of hacking humans. It's when a person is manipulated into doing ...more
This week, Google held back on introducing a slew of new Google+ features, and introduced new Chrome extensions instead. The new additions won't replace of your favorite Chrome extensions, but they are very useful, and elegant. Google+ Chrome Extensions From Google +Timothy ...more
Grand Theft Auto 3 was the biggest video game of the last decade, by far, introducing open-world adventure games to consoles, a genre that now rivals shooters and sports games for market dominance. A huge map, decentralized narrative, and myriad of interlocking quests and obje ...more
If you've gained entry into Google+, one of the first things you should do is adjust your Google account settings. Your settings will now look quite different, and you can adjust your notifications, password retrieval methods, and more. There are many settings that you may not ...more
Japanese game shows are legendary for being more extreme (and absurd) than their American counterparts. Chris Farley immortalized the concept in a classic SNL sketch, and MXC and Ninja Warrior have both achieved great success dubbed and subtitled on American television. A big ...more
One of the coolest things about Twitter is the fact that you can get direct access to some of your favorite celebrities, and have one-on-one conversations with them in less than 140 characters. With Google+, you can have the same advantage, but you don't need to feel constrict ...more
Although circles are Google+'s answer to the problem of social network relationship management, that's not the only thing it's good for. People on Google+ are using circles for all sorts of creative activities, some of which aren't obvious as first glance. 1. Take Advantage o ...more
After the media outcry of Google Buzz's privacy issues, Google has set its goals on making the privacy parameters of Google+ simple to learn and as explicitly manageable as possible. No small feat. The approach has been to make the process of organizing your friends, contacts ...more
One of the things I consistently notice amongst fellow internet users is that many people don't know how to properly search for stuff. Google may have served you well in the past, but I'm going to share a few little tricks with you to help make your search results even spiffie ...more
The African Soft Fur Rat though new to the pet trade is a unique little rodent with unusual qualities. Not only is this little rat a great step up for people who feed reptiles it is virtually odorless and that is definately a plus for those who would like to have a pet rat or ...more
The relationship between developers and publishers in the video game industry has always been awkward. Many great game developers such as Bizzare Creations, Clover Studio, and Bullfrog Productions have been disbanded due to corporate shenanigans involving their publishers and ...more
Without Japan, video games would not be very fun. Atari's early work was important, but Japanese developers, publishers, and hardware makers were responsible for almost every major advance in video games for the first 25 years of their mainstream existence. In recent years, it ...more
Spam is everywhere and Facebook is no exception. In fact, spammers are constantly stepping up their game by tricking unsuspecting Facebook users to participate in quizzes, games, apps, or "new features" that are actually dangerous computer viruses, spyware, or other trojan hor ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
Looking to go "Green" When I'm looking to do new remodeling projects around the house, I find myself asking, is this Eco-Friendly? Is this main stream America brain-washing me into a "Greener Tomorrow?" I doubt it! Embracing Eco-minded products is not just good for preserving ...more
Movies like to show hackers breaking passwords with fancy software and ludicrous gadgets. The reality of busting passwords open is much more mundane. Simple as it may sound, most passwords are broken purely by guesswork. Check out this infographic from ZoneAlarm, as well as th ...more
Guiding internet users to useful content is one of the most lucrative businesses in the world. This process is called aggregation. Google and other search engines form the top of the food chain, aggregating all of the content on the web in response to queries. There are all so ...more
Hi there Dolls, I just got done putting the children to bed for the night. Fed the husband, made a little love, and took a bubble bath! I lathered up my body with a Gardenia lotion and have thrown on my amazing silk robe. I smell and feel wonderful as I sip on my Cantaloupe ...more
Warnings i cant be held responsible for any illegal act done by anyone but myself and there are copyrights so notise that taken the trademarks or copyrights are strigtly prohibeted by law and will be punshied by law and i or my partners cant be held responsible for sudo camma ...more
(This is a manifesto I wrote 2 years ago. I have never published it. It was a reaction to the ignorance I faced in graduate school from the modernist sculpture department administrators) MANIFESTO Postmodern Figurative Artists (Following The Dionysian Tradition) By Adam ...more
STANDP'S CUSTOM DESKTOP "ASK NOT WHAT YOUR DESKTOP CAN DO FOR YOU...". http://standp-how-to-vidzzz.wonderhowto.com/corkboard/new-post/text/ Showing newest posts with label tips-n-trick. Show older posts DEC 07 Computer Backup If you have taken good care of your computer th ...more
There are endless deep-fried recipes for disaster (re: heart attack), but this one takes the cake. Abel Gonzales Jr., the inventor of fried Coke and fried cookie dough, presents deep-fried butter, which tastes like a “a mix between a biscuit or a croissant that is just stuffed ...more
For as long as I've loved SCRABBLE, I can't believe I've never come across this before. "CRAZIEST" - A short story by Liz Dubelman about words and numbers as a religion (think Pi), about SCRABBLE being the oracle, about her quest for the "triple-triple". This spoke words to m ...more
if you love playing games that take place in the not tood distant future, Metro 2033 might be for you. In this game you'll be going up against others who are trying to survive in a harsh world filled with traps, poisonous skies, and mutant monters. In this achievement tutoria ...more
If you like tying different things just for show or to use, then you're going to love this next tutorial. This video will teach you how to easily make a paracord ladder strap. It looks really cool and seems easy to do, but it could take some time to finish. It's created using ...more
The contenders: PS3: Singstar Dance 360: Harmonix's Dance Central Wii: Just Dance 2 Out of the three 'god do I really dance like that?' upcoming games, which one is better? Singstar Dance will come out for the PS3 using the new Move controllers and Harmonix (Rock Band) wil ...more
In Alan Wake, there are hidden messages hidden throughout the levels that are only visible with a flashlight. If you don't flash the light at a particular spot, you will not be able to see the message. These messages are left by a mysterious entity trying to give hints to Ala ...more
If you're worried about having your private information taken away from you by hackers and other malicious people, this tutorial may help you. This tutorial will help show you how to easily use and understand the phishing filter in Internet Explorer 8. It only takes a couple o ...more
A lot of people fear bats; in fact, bats rank third on America's most feared list behind spiders and snakes. Most people get nervous around bats because they are hard to see at night and can fly around undetected; not to mention that Dracula myth that hasn't done bats any favo ...more