How to Create an Access Database

How To : Get up to speed in Microsoft Access 2007

Check out this tutorial and learn how to get up to speed with the latest installment of Mircosoft Access 2007. Microsoft Office Access 2007 brings you a new look and new features designed to help you get your work done more easily than ever. You'll see differences right away, ...more

How To : Password protect queries in Microsoft Access

The Microsoft Office Access 2007 relational database manager enables information workers to quickly track and report information with ease thanks to its interactive design capabilities that do not require deep database knowledge. In this Microsoft Access video tutorial, you'll ...more

How To : Use the navigation pane to organize in Access 2007

In Microsoft Office Access 2007, the Navigation Pane replaces the Database Window as the main way to get around in a database. This tutorial shows you how to use the Navigation Pane to organize the objects in a database into categories and groups. Categories help you arrange t ...more

How To : Creating data-entry forms in Microsoft Access 2010

Learn how to create data-entry forms when working in Microsoft Access 2010. Whether you're new to Microsoft's popular database management application or a seasoned MS Office professional just looking to better acquaint yourself with the Access 2010 workflow, you're sure to be ...more

How To : Jacmel crochet a granny square

In Access 2010 you can now create a navigation form (like a home page) for your database without writing a single piece of code or logic! Great for busy people who need to organize their database quickly, but who don't have code writing skills. It's just drag and drop. There a ...more

How To : Use Perl to Connect to a Database

Note: The article assumes that the reader has a fundamental understanding of at least one other programming language and Perl. This is intended serve as a quick reference for Perl's input/output of data to databases. Once you've mastered the basics of Perl, you might want to ...more

IPsec Tools of the Trade : Don't Bring a Knife to a Gunfight

Pull up outside any construction site and you'll see tools scattered about—hammers, jigsaws, nail guns, hydraulic pipe benders—these are the tools of the trade. You would be hard-pressed to build a home or office building with just your hands! On that same page, security profe ...more

How To : Create PDO's (PHP Database Objects) in PHP

Learn to work with PDO in PHP with this informative video tutorial from JREAMdesign. The PDO extension is a consistent interface for accessing several types of databases in PHP and it has a ton of options. This knowledge is also required for Zend Certification.

How To : Use the Zoho Creator database application

While all Web 2.0 applications are by no means equal, certain among them can save you time, money, and frustration–one such web app is the Zoho Creator database utility, which is comparable to Access from the Microsoft Office suite. For more information, or to get started usin ...more

How To : Access the PS3 secret recovery menu

Learn how to access the PS3 secret recovery menu by following this tutorial. You will need a PS3, PS3 remote, and a USB charger cable. Hold the power button on your system. Listen for three beeps (as you keep your finger on the power button). The third beep will turn your syst ...more

How To : Research your genealogy and family tree

Researching genealogy takes a little enterprise and the skills of a master sleuth.. Watch this video to learn how to research your genealogy and family tree. You Will Need * A notebook * A tape recorder * Internet access Step 1. Interview Record interviews with family memb ...more

How To : Make an email server on your home computer

Learn how to make an e-mail server on your home computer to host your own web page and webmail service by following the steps outlined in this video tutorial. You will need a web server, an e-mail server, and a webmail interface. For the server, the most common program is Wamp ...more

How To : Cite reference books in MLA format

In this video tutorial, viewers learn how to cite reference books in MLA formats. Citation is a reference to a published or unpublished source. Viewers will learn how to cite an article in an online reference book and an article in a print reference book. The format for the on ...more

How To : Install MySQL on Windows 2003

MySQL is a multithreaded, multi-user SQL database management system which has over 10 million installations. It runs as a server providing multi-user access to databases. It is by far the most popular and common database used in web applications throughout the world, and almos ...more

Google Dorking : AmIDoinItRite?

What is Google Dorking? Well, simply put, "Google Dorking" is just an efficient way to utilise keywords in order to perform very specific searches on a given subject. In this case, one would look for websites/servers that are vulnerable to attacks or are configured improperly ...more

News : Traveling with Augmented Reality

Searching for some new new in Augmented Reality Apps I came across Augmented GeoTravel. I would have loved to have this app when I went to Europe. Being able to travel and hold up the camera & get more information on cool places I was seeing would have been awesome. It is like ...more

Top 10 : Best Ethical Destinations for 2011

By Ethical Traveler As the world becomes ever more interconnected, being an ethical traveler becomes both easier and more urgent. Travelers today have access to far more information than we did even 10 years ago. We can observe–almost in real time–the impact that smart or sel ...more

How to Hack Like a Pro : Getting Started with Metasploit

This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing p ...more

Hack Logs and Linux Commands : What's Going On Here?

This morning, I received a message from a friend who was reading a hack log, and she had some questions about the commands used. This got me thinking, as Linux has a ton of commands and some can be archaic, yet useful. We are going to go over everything you need to know to rea ...more

How To : Integrate Microsoft Access and Outlook 2007

This MS Office software tutorial gives tips and tricks on integration between Access and Outlook. Access is Microsoft's database software and Outlook is the email software. So if you need to work with your database and email at the same time, check out this tutorial on integra ...more

How To : The 4 Best Password Managers for Android

Over the years, the internet has become a dangerous place. As its popularity has increased, it has attracted more hackers looking to make a quick buck. However, as our dependency on the web grows, it becomes increasingly difficult to sever all ties. This means we have to prote ...more

How To : The 4 Best Password Managers for iPhone

Using a strong password is critical to the security of your online accounts. However, according to Dashlane, US users hold an average of 130 different accounts. Memorizing strong passwords for that many accounts is impractical. Fortunately, password managers solve the problem. ...more

How To : The Top 80+ Websites Available in the Tor Network

There are nearly 100,000 unique onion service addresses online with over two million people using Tor every single day. Join me as I explore a small fraction of what the Tor network has to offer. It's puzzling to imagine about 100,000 .onion websites in existence. Readers who ...more

How To : What Happens to Your Passwords When You Die?

Most of us have never put much thought into this, but the question needs to be asked — what exactly happens to all of our online accounts when we die? No, the internet won't just know and delete accounts for you, so you need to plan for life's one guarantee. Because without a ...more

How To : Use SQL Injection to Run OS Commands & Get a Shell

One of the ultimate goals in hacking is the ability to obtain shells in order to run system commands and own a target or network. SQL injection is typically only associated with databases and their data, but it can actually be used as a vector to gain a command shell. As a les ...more

How To : The Ultimate Guide to Hacking macOS

Apple's macOS operating system is just as vulnerable to attacks as any Windows 10 computer or Android smartphone. Hacker's can embed backdoors, evade antivirus with simple commands, and utilize USB flash drives to completely compromise a MacBook. In this always-updated guide, ...more

  • Hot
  • Latest