Get Access to Work Internet

How To : Use the Sticky Keys feature in Windows 7

In this video tutorial, viewers learn how to use the Sticky Keys feature in Microsoft Windows 7. To use the Sticky Keys, click on the Start menu and open Control Panel. In the Control Panel window, double-click on Ease of Access and click on Change how your keyboard works unde ...more

How To : Make it easier to see the cursor in Windows 7

Windows 7 uses several options to make it easier to change and locate the cursor on the screen. 1) To access these options select “Start” then click on “Control panel“from the menu. 2) Click on the “Ease of access” option. 3) Select the “Change how your mouse ...more

How To : Use the Filter Keys feature in Windows 7

In this video tutorial, viewers learn how to use the Filter Key features on a Windows 7 computer. Begin by opening Control Panel and select Ease of Access. Under the Ease of Access Center, click on Change how your keyboard works and click on Set up Filter Keys, at the bottom o ...more

How To : Secure a Linksys WiFi network from a Mac computer

In this video from benjamoon we learn how to secure a linksys wifi network from a Mac. First type in your IP address in your browser bar which is 192.168.1.1 then press enter. If it asks for a password it is admin. Click on Wireless and here you can edit your name and who can ...more

How To : Delete browser history & temp internet files in IE

In this video, we learn how to remove our browsing history on Internet Explorer. First, click on "tools", then click on "delete browsing history". If you want to delete all of your browsing history, then click on that option. Most people are content with only deleting temporar ...more

The Job Board : "Don't be an asshole"

The Job Board is a weekly entry of the most ridiculous Cinematography related jobs posted online. DP Looking for a Director of Photography that is an all around on a set. Will be performing role of DP and also camera operation.  I’m hoping to find someone with access to a R ...more

How To : Make a bicycle rack out of repurposed closet racks

Danny Lipford and Joe demonstrate how to make a bicycle rack out of repurposed closet racks. Closet brackets can be used to store bicycles. Instead of hanging the bicycle on the ceiling for long term storage, fasten closet brackets to your garage wall to more practically easil ...more

How To : Search your computer and the internet in Windows 7

The new Windows 7 layout is streamlined for the occasional user to the head of human relations for Microsoft. Wall papers, system sounds, and resolution settings were covered in the instructional how to video. The evaluation specialist was knowledgeable and articulate. Transit ...more

How To : Be a product tester

Testing products for a living is a bit more complicated than it sounds. You Will Need * A field of interest * A college degree Step 1: Pick a field Pick a field. Do you want to test toys? Evaluate appliances? Judge new ice cream flavors? The area that interests you will deter ...more

How To : Turn a used vinyl record into a bowl

Don't toss that old LP! A few minutes in the oven and you can have a bowl that will be a real conversation piece. Watch this video to learn how to turn a used vinyl record into a bowl. Step 1. Choose an album Choose an album. Then do a quick internet search of the title to m ...more

How To : Watch digital video files on an Xbox 360

Got video files on your computer? Watch them on your big-screen TV – using your Xbox! You Will Need * A computer with wireless internet connection * An Xbox 360 * A USB drive or memory card capable of storing video files * Windows XP or higher * Windows Media Player 11 Step ...more

How To : Stack plow in Facebook Farm Town (04/02/09)

This video will show you how to stack plow in Facebook's Flash game Farm Town. This only works if you are using Internet Explorer (IE). This involves making a plot and then stacking a second plot atop the first plot. This is stack plowing. This is a cool cheat for Facebook's F ...more

How To : Create shared parameters in Revit Architecture

This intermediate level CAD software tutorial gets into the basics of creating shared parameters in Revit and how to create schedules to access them. In this Revit tutorial scheduling is meant to be used more as a spreadsheet interface for driving the model and not so much for ...more

How To : Trim a hedge with This Old House

In this video from This Old House, Roger explains why pruning with electric shears can inhibit interior hedge growth, and how to repair the damage with pruning shears. Steps: 1. Pull back outer branches to access the inner recesses of the hedge. 2. Use bypass pruning shears t ...more

How To : Do this quick foot experiment to trick your brain

This week's experiment has made the rounds through the Internet as a strange trick, but there is science here too. We are going to use the science of complex systems to confuse your body. To try this, you will need: your hands and feet Lift your right foot about 6 inches off ...more

How To : Get inside someone's mind with NLP

Jamie Smart from Salad Ltd demonstrating eye accessing cues and gestures. This is a great tool for helping people work out how they are dealing with certain issues. Is it an image, sound or feeling? Are they remembering something or constructing something? Once you've figured ...more

How To : Secure your data with an SSH Tunnel

This new episode of Full Disclosure shows you how to use a SSH Tunnel to secure your data when you are on an untrusted LAN (ex. Coffee Shop, School's network, or Defcon). Furthermore, you can use the SSH Tunnel to bypass the LAN's internet filters. The SSH tunnel protocol work ...more

How To : Edit JPG files in Camera Raw CS3

The camera raw functionality in Adobe Photoshop provides fast and easy access within Photoshop to the "raw" image formats produced by many leading professional and midrange digital cameras. By working with these "digital negatives," you can achieve the results you want with gr ...more

Introduction to Cryptography : Archaic Beginnings

Cryptography is a quintessential part of computer security in the modern world. Whenever you buy something on eBay or log into Facebook, that data is encrypted before it's sent to the server in order to prevent third parties from eavesdropping and stealing your sensitive infor ...more

How To : How Anyone Can Retire Early & Wealthy, Part 1: CDs

I'm pretty sure that it's a universal dream for everyone in the world to retire early. Who wants to to be stuck with the rest of the country and retire when you're almost 70 years old? You heard me right, 70! Most people can't go out and do the things they love to do by the ti ...more

How To : Securely & Anonymously Spend Money Online

Anonymity is very important to many internet users. By having your "e-identity" exposed online, you can be stuck with a number of unwanted issues, such as: Privacy invasion. Internet tracking. Exposure to being hacked. However, what if we wanted to spend money anonymously? T ...more

League of Legends : Dominion Coming Soon

If you’re unfamiliar with League of Legends, you’re either not into PC gaming or you haven’t spent much time on the internet. Riot Games officially released League almost two years ago, and since then it’s become a huge hit. In fact, the Santa Monica based company recently ann ...more

News : Is Your Dream Gaming PC Worth It?

The last week has been a trying one for me. On Sunday, there were four computers in my office, three of which were broken. The fourth was not really a computer, but more of a collection of parts that were cobbled together for the purpose of constructing a PC that would sneer d ...more

How To : Get Your Suspended Google+ Profile Reinstated

Last week, we discussed whether Google should require you to use your real name for Google+ profiles. Google is working on eliminating fake profiles, and in the process, they've booted some real people, including actor +William Shatner. If you find out that your Google+ accoun ...more

News : Welcome to the Google+ Insider's Guide!

Google+ is the most exciting new social network to come around this decade, and the only product with a chance of challenging the monopolies we know as Facebook and Twitter. As an Internet addict, I've joined every major social network there is - from Friendster (who?) to MySp ...more

Instacast : A Better Way to Listen To & Manage Podcasts

Though it could be argued that Apple's popular and widely used iTunes media player was responsible for the growth and explosion of podcasting, I would argue that iTunes is not the best way to manage and listen to your podcast subscriptions—if you're a iPhone, iPad, or iPod Tou ...more

News : How-To-Do Everything Quickly On Media Players

INTRODUCTION In this Digital world now almost every one knows the a, b , c of computer. From a child of 5th grade to an old man, everyone knows how to operate computer and do simple work on it. Thats why you need to have something which makes you different from others. How q ...more

News : Microsoft SharePoint 2010

Microsoft SharePoint is a business management system introduced by MICROSOFT. It has many build in functions to work in web based environment easily. Microsoft SharePoint 2010 is released on April 17, 2010. It is introduced with the promise of better performance than its prede ...more

News : 10 of the Finest Cell Phone Mods

Oh, LifeHacker, we love you. You've brought us so many handy HowTo's: Hack Wireless Internet, Bypass Blocked Websites, Convert a Laptop Into a Projector, Watch TV & Movies on the Web For Free, 10 Must-Know Google Privacy Settings, and more. And now, another great one: LifeHac ...more

How To : Display Text in Minecraft Using Redstone

Ever wanted to display text in Minecraft? It's actually not overly difficult. In this tutorial, I will endeavor to guide you through the process between storing and displaying text from memory. To do this, we will examine two different methods of displaying and storing text in ...more

News : Make Friends by Using Proper Server Etiquette

What happened to please and thank you? When did asking someone to come look at your build degenerate into COME NOW or FOLLOW or sending out teleport requests to any and all currently on the server without asking? Phillip Chan, a yahoo network contributor wrote this back in 20 ...more

How To : Pick Basic Tumbler Locks

Professionally and academically speaking, I am a computer scientist, but I also enjoy lock picking as a hobby, so I thought I would share what knowledge I have with this. Before we start doing anything, first we need to understand the fundamentals of how locks work and then ac ...more

How to Hack Like a Pro : Getting Started with Metasploit

This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing p ...more

How To : Recognize Crowd Control - Part 2

In the first part we differentiated the two types of control, mental and physical. In part 2 we will dig deeper into Physical crowd control and analyze examples that are present today. Physical Crowd Control This is the easy one. Wikipedia says: Crowd control is the controll ...more

How To : Secure Your Computer with Norton DNS

There are so many hackers around these days, and they are becoming very smart. So smart that they have successfully taken down many government websites. The most recent attack was on the Department of Justice (DOJ). To read about the history of these hackers, check out Wikiped ...more

News : SOPA and PIPA Blackout!

As of today (January 18, 2012) many websites have "blacked" out their content for the day, one of the more notable websites is Wikipedia.org. As this can be a small compromise as an act of protesting against the heinous bills going through the United States' Congress. A lot of ...more

  • Hot
  • Latest