Have you ever been the victim of theft? It sucks. Why would these lazy scumbags rather steal from us than work hard like everybody else? Well, teach them a lesson with your own homemade security system. This video tutorial will show you how to create a fun and easy security/a ...more
Watch this video tutorial, and learn how to turn an ordinary inexpensive webcam into a hidden home security system, viewable anywhere in the world from your cell phone! With a cute and cuddly teddy bear and a cheap webcam, you can make the perfect homemade security camera, or ...more
Got a mystery to solve? Somebody’s been making off with your stuff, and you don’t have a clue who it is, do you? Here’s your chance to catch them in the act. In this how to video you will learn to make a DIY laser security system.
In this video, we learn how to avoid getting infected by "system security". Make sure you avoid the website that show the System Security Anti-Virus. Once you install this onto your computer it will pretend like it is doing a scan, but in reality is hurting your computer. It w ...more
Learn how you can protect your home in a pretty radical and fun way by transforming two cheap household items into a stealth hi-tech, anti-burglar, security system! Literally to hot for any bad guy to handle!
This is Hydroponics: At Home for Beginners. To build a home hydroponic system, you will first need to acquire a storage tote tub at any local store. That's the first big step, then everything from then on gets easy... well, almost. There's actually a lot of work to accomplish ...more
Make your own DIY Hydroponics System! This no-messing-around video is really helpful and instructive.
Cyber Security is a horrible computer virus. It mimics a virus protection program and invades your system, making it nearly impossible to remove. In this tutorial, learn how to remove this annoying trojan horse from your PC and save your computer.
How's it goin'? In this tutorial, we will learn about the security issues of the popen and system functions. I've seen a few people attempting to run command line utilities or whatever it is they require with calls to these two functions but may not know the security implicati ...more
Home security is as important as having a job. You have to protect your family and your valuables. If you can't afford a high tech security system, then maybe a fake security camera will do the trick. This security camera dud is also a cheap alternative for a film prop. Watch ...more
Looking for a front-yard upgrade that'll have visitors beating a well-lit path to your door? The answer is an easy to install pathway lighting set. Too often, we're forced to choose between form and function. But when it comes to the route that leads to your front door, you ca ...more
System Tool. It sounds like something your Windows computer might need, but it's the exact opposite. System Tool is a computer virus masquerading as a free antivirus program. But don't be fooled, System Tool Antivirus might as well be called System Tool Virus or even System T ...more
System Tool and System Tool 2011 are the most widespread fake-antivirus rogues on the internet today, infecting countless machines. This video will teach you how to uninstall both warez completely, returning your computer to blessed normalcy. Instructions from the Creator: 1 ...more
Have you ever thought of building your own social networking site? Before you get to making websites like Facebook, you need to start off smaller, and this 29-part video series is where to begin with developing a social networking community website . Before you start with thes ...more
Keeping secrets out of the wrong hands warrants desperate measures—or maybe just sensical. If you have a secret, the best way to protect it is with a code—and the best way to transfer that secret message is via an electronic telegraph system. This video will show you how to ma ...more
Watch this video from This Old House to learn how to install a solar attic fan. Steps: 1 In attic, mark location of solar-powered vent between two roof rafters. 2 Drive nail through center of vent location. 3 Install roof brackets and fall-arrest system to roof. 4 Scribe outl ...more
In this installment from the Unorthodox Hacking series of computer security videos, you will explore a few of the areas in Windows that most Sysadmins don’t even know exist. See how to become Local System through the Task Scheduler and abuse long filenames. Take a look at some ...more
Harvest the sun! This easy step-by-step tutorial will show you how to build your own solar heating/hot water system. Green energy is the wave of the future. Stop high oil and gas prices. All we need is 160°. No drilling, no rigs, no refining, no transportation, a no-brainer. ...more
This video gives a step by step tutorial how to service a Porsche 944. The service is demonstrated on an S2, but most steps are very similar for other versions. The video has a German soundtrack but English subtitles are available at YouTube. Working under the car Remove engi ...more
Do you remember "The Heist" from episode 21? Well, the sequel is even more unfair than the original! Check out this video if you want to stump people with a trick called "The Heist II." For this trick, you need only a few simple supplies: a match, a cup, and a nickel. From Re ...more
How to Use Your Mac as a Server: Turn your Mac Mini into a server! Yes, that's right, with a little know-how and a little spunk, you can turn an inexpensive Mac Mini computer into a server to provide services over you network. You won't even need the Mac OS X Server, just the ...more
Burglary is common, but is also quite preventable with these tactics. You Will Need * A dog * Motion detector lights * A security system * Strong doors * Impact-resistant doors and windows * Neighborliness * A wooden dowel Step 1: Get a dog Get a dog. Even small dogs will bar ...more
Keep your possessions safe from thieves with these tips. You Will Need * Motion detector lights * Locks * A locksmith * A security alarm system * A safety deposit box or home safe * An engraving pen * A trusted neighbor * Bolts or wooden dowels (optional) Step 1: Eliminate bu ...more
iPod and iPhone home automation remote control using Girder is only an install away. Run the lights, heat, security system among other things in your space age home for the 21st century. Make your home a modern marvel with this app for iPhone.
Installing a home security system can be expensive, but it doesn't have to be. This how to video shows you some easy practices that keep your home well protected. All you need is a few inexpensive items such as flood lights, signs, and light timers.
When choosing a security system for the office, Billy Chasen decided to ditch the traditional lock & key barricade for something a little more 21st century. He hacked together a device that uses a web server, servo motor and some parts from Home Depot to enable locking & unloc ...more
In this video tutorial, viewers learn how to test their system performance. Begin by clicking on the Start menu and select Control Panel. Then click on System and Security, and select "Check the Windows Experience Index" under System. Now click on "Rate this computer". The sys ...more
Your Windows computer may be experiencing some issues, and those issues may be a direct result of computer viruses and malicious software from the internet. One of the simplest ways to find these issues and repair them is by using a freeware program called System Repair Engine ...more
Introduction In the competitive world of today's video game scene, PC gamers are known to squeeze out the best possible visuals in their games. Every few months a new video card rolls out, and RAM is ever increasing; constant upgrading is the norm of staying ahead the curve. ...more
This article relates to changing the settings in Adobe Flash so that you can improve your overall computer security and privacy. Changing these settings might have a negative performance impact on your computer - but it is worth while. How to Amend Adobe Flash Settings Adobe ...more
Today's WSJ takes a tour of Russian billionaire Andrey Melnichenko's 394-foot insanely luxe yacht, coined "A". Designed by none other than the world renown Philippe Starcke, "A" features a fingerprint security system, an all-white, 2,583-square-foot master suite wrapped in bo ...more
In this video series, learn how to tackle a fairly simple do-it-yourself home improvement project that can significantly strengthen your security system. Our expert, Daniel Nell, will show you how to install a single-cylinder deadbolt lock on any door in your home. Watch these ...more
In this how-to video, you will learn how to quickly make a Windows 7 boot disk. This is essential for making backups or booting from something other than the operating system on your hard drive. First, go to the control panel and click the back up your computer option under sy ...more
In this Microsoft Windows 7 users guide, you'll learn how to take advantage of the operating system's new Applocker security feature. It's easy! So easy, in fact, that this home-computing how-to can present a complete, step-by-step overview of the process in about a minute and ...more
Fans do a pretty good job of cooling you down in the summer but sometimes only an air conditioning can do the job right. In this tutorial, SuChin Pak and Daniel Sieberg demonstrate how to make a homemade air conditioning system with a fan, coil and ice water. Save the environm ...more
In this video you will learn how to update your version of Windows 7 and how to check the system settings for automatic updates. In order to do this you need to go in the Start Menu and then in the Control Panel. Then you need to click System and Security. The next step is to ...more
This video tells us the method to open ports in Windows 7. Click on myu icon and go to 'Preferences'. Copy the port number from the resulting window. Go to 'Start', 'Control Panel' and 'System and Security'. Go to 'Windows Firewall' and 'Advanced Settings'. Go to 'Inbound Rule ...more
This video instructs you on how to backup your files on windows 7. To do this, first you must go to Start>Control Panel. After that you must look at System and Security, and click on back up your computer. Next you must click set up back up, then pick where you want to save yo ...more
This video demonstrates how to change a drive letter to a certain drive in your Windows 7 computer. On you Windows 7 computer, go to Start > Control Panel. In the Control Panel, select System and Security then open the Administrative Tools. Look for and open the Computer Manag ...more
This video by Butterscotch shows viewers how to uninstall a program in Windows 7. To begin, click on the start button at the bottom-left of the screen. Click 'Control Panel' in the boxes that pop up. Click 'System and Security'. On the left side of the window, there will be a ...more
Every day of the week, WonderHowTo curators are hard at work, scouring the web for the greatest and most inspiring how-to videos. Every Friday, we'll highlight our favorite finds. Make your own G-spot & protect your car It's not what you think. The G-spot here does not refer ...more
Learn how to fix or recover a corrupt windows registry following the steps outlined in this video tutorial. To begin, take the hard drive out of the computer with the corrupted registry and connect to another computer. To find the files you need to replace go to Start and My C ...more
Hangouts are one of the most fun features in Google+. As long as you have a webcam and a microphone, you can "hangout" with up to 10 of your buddies on Google+ and do just about anything. Of course, sometimes it can get kind of awkward when you are hanging out and you don't re ...more
Note: Little Brother is available as a free ebook download. Warnings I read Boing Boing a lot, which means that I know just about everything about Cory Doctorow's politics and opinions. So, knowing his politics definitely colors my perceptions of this novel. My review will i ...more
This tutorial will be based on creating a partition in Windows Seven. I have seen so many people attempt to do this themselves without guidance. Ultimately, they end up with a corrupt system. The aim of this tutorial is to make sure you don't corrupt your system. What does th ...more
This is my homemade led light system. The main unit has a total of 228 LED's, the corners are using super wide angle LED's to maximize visibility. There are also 48 LED mini lightbar, 5x 16 LED mini modules. The main controller is controlling the light bar as well as the indiv ...more
In this video tutorial, viewers learn how to secure a Mac Book Pro. Begin by opening the System Preferences and select Security under Personal. In the General tab, users are able to put on a password when the computer goes to sleep or screen-saver, disable automatic log in and ...more
Snowflakes aren't much to look at during a storm, but when you look real close, you can see just how marvelous they really are. But winter is over and most of us can no longer enjoy the intricate nature of ice crystallization, unless you're sticking your head in your freezer. ...more
Have an old-school tabula recta lying around? No? Then just print out the chart below. Nothing ensures better password security than this centuries-old cipher technique. Here's how it works, via Wikipedia: "Using a tabula recta, each alphabet is shifted one letter to the left ...more
In Linux, all password hashes are normally stored using the MD5 hashing algorithm in the /etc/shadow file, but MD5 is algorithmically weak due to collision vulnerabilities. The new recommended standard are the higher level SHA-2 hashing algorithms, SHA256 or SHA512. As a frien ...more
Quickly turn a profit during a combat mission by ratting - killing NPC enemies who spawn in asteroid belts. The difficulty of rats depends on how secure your system is - the lower security, the harder the rats are to kill. This tutorial shows you the best way, as a new player, ...more
It's no secret that the Canon EOS 5D Mark II is being used in low-budget indie films, as well as big blockbuster movies from Hollywood. But it's also become a staple for television commercials. Geoff Fox has been a weather forecaster for over 28 years in Connecticut and can b ...more
In this tutorial, we learn how to remove pop up screens when Avira Antivirus updates. First, locate the installation folder for Avira, this should be in your computer programs. After this, locate the file "avnotify.exe". Next, right click this and go to the preferences option. ...more
Summary ======= Bugzilla is a Web-based bug-tracking system used by a large number of software projects. The following security issue has been discovered in Bugzilla: * A CSRF vulnerability in the implementation of the XML-RPC API when running under mod_perl could be used to ...more
When Windows stores a password, it is done so by hashing the password in an LM hash and putting it in the Windows SAM file. In the scary moment that you lose your password, but don't want to pay some geek to have full root access to your computer, you need to recover it using ...more
If you're interested in bypassing Windows and Linux passwords, there is a great tool from the good people at Kryptoslogic. Have you ever forgotten your administrator password? Have you ever bought a used computer with a password on it? Well, Kryptoslogic have created a boot-di ...more
In this tutorial, learn how to disable the annoying UAC or User Account Control on your Windows Vista computer. This clip will show you how to do this without compromising your security. No doubt the Vista User Account Control (UAC) is the single biggest irritation in the who ...more
In this tutorial, Mike Lively of Northern Kentucky University gets you started in getting the Adobe Air Content Management System up and going. This is going to be a flat file management system run on XML files from a server using XML files to add and manage data. The Adobe Fl ...more
In this tutorial, we learn how to set up and secure a wireless router. First, take your cable and plug it into your modem from your computer. After this, plug in an Ethernet cable into your modem to a wireless router. Now, plug the wireless router and modem into the wall. Now, ...more
AntiVirus Live is a fake antivirus software which comes onto your system and asks you to buy it. It doesn't provide any security to the computer. Here is the procedure to remove it: (1) disable the proxy server for your LAN in Internet Explorer. 2) download the process explore ...more