Check out this informative video tutorial from Apple on how to get familiar with a Mac in comparison to a PC. If you're used to working on a PC, this video will show you some of the basic differences between using a PC and a Mac. Once you get to know the fundamentals, you'll f ...more
The Anchor Bend is the boating knot generally used to fasten a line to an anchor. The free end should be secured with seizing to the standing line for a permanent, secure knot. One side of a Double Fisherman’s also makes a good backup knot to this and any knot. Make two turns ...more
Watch this video from This Old House to learn how to put in a storm door. Steps: 1 Use bevel square to establish angle of doorsill. 2 Mark doorsill angle onto the bottom end of the hinge frame. 3 Use hacksaw to cut hinge frame to length. 4 Screw hinge frame to edge of screen ...more
We've all been waiting for it, and now it's finally here— Video Skype for the iPhone 4. It's no longer just a voice over the phone, now you can finally see those rosy-red cheeks of your fellow Skyper, and maybe even their underwear. Check out the official Skype for iPhone - no ...more
WikiLeaks. In recent weeks, it's been the hottest topic on the web. It's been attacked on a multinational level by political influence peddling. First, U.S. Senator Joe Lieberman swayed Amazon's decision to stop hosting WikiLeaks. Then, Tableau Software removed graphs from th ...more
Now that you're officially allowed to do it, jailbreaking your iPhone, iPod Touch, or iPad is a better idea than ever before! This video will show you everything you need to jailbreak a wide variety of Apple devices, including the iPhone 3G and 3GS, the iPod Touch 2G and 3G, a ...more
This Butterfly knot will accommodate a load in any direction, and is used mostly in outdoor and boating situations, but also could be used as a paddling knot. It's used for securing a loop or many loops in the middle of a rope. Great for mountain climbing and canoeing. Mounta ...more
To help litter train your cats you want to have one more litter box than you have cats. So if you have two cats you want to have 3 litter boxes. You want to have the boxes in locations where it is easy for the cats to see what is going on around them. When they are using the l ...more
It only takes 15 minutes to install new RAM in a Macbook Pro. Before starting, remember to make sure that the power is off. Turn it over and release the latch in the left hand side. This will release the door and expose the battery. Remove the battery. With a #00 Philips screw ...more
Watch this video from This Old House to learn how to build a stained-glass bar cabinet. Steps: 1. Cut the cabinet's 1x preprimed pine sides to the length of the glass door. The ends and shelves should be 1½ inches smaller than the window's width. (You can also have the wood c ...more
Watch this video from This Old House to learn how to replace an old threshold. Steps: 1 Remove old threshold from doorway using hammer and reciprocating saw. 2 Use reciprocating saw to cut the nails securing toekick; remove toekick. 3 Test-fit new threshold in doorway. 4 Buil ...more
What's the easiest way to keep track of your website passwords? Maybe in a password-protected document on your computer? Makes sense. But surprisingly, this is no easy task in Mac OS X. Snow Leopard does not have an easy one-click option for password protecting files and fold ...more
How to Build a Basic BirdhouseMaybe you were outside in your back yard and you noticed that it seemed a little lonely and empty. Our maybe you have young kids that love to experience wild life in their own back yard. Whatever reason you have for searching out this article, you ...more
The video gives a step by step tutorial on how to replace the water pump, all belts and the shaft seals on a Porsche 944 S2. The video has a German soundtrack but English subtitles are available at YouTube. The repair is shown for a S2, but most steps are the same for other mo ...more
Have important files that you want to put on a USB drive but do not want anyone else to be able to access them? Put a password on it using USBSecure.net free resource. First, download the free software provided on the website. The USB drive that you want to secure should be p ...more
Learn how to make an origami catfish. Get a piece of square paper. Fold diagonally from the upper right tip to the lower left tip of the paper. Fold the lower right tip to the upper left tip and open it up halfway. Hold the right fold and slightly open it placing your finger i ...more
This video teaches the viewer how to make a memo book with a paper bag. For this craft you will need two paper bags, memo paper, adhesive, ribbon, and scissors. To begin, you'll need to cut off the bottom of the bag and discard it. She explains where to make decorative edges o ...more
Interested in finding out just how secure your WEP-protected wireless network is? Let this video be your guide. It's a simple process and this home-networking how-to will teach you everything you'll need to know. For specifics, including detailed, step-by-step instructions, an ...more
PayPal is a fast, secure online service that allows you to send and receive money online. This film help you to set up your own PayPal account with no difficulties. Open a PayPal account. Click through to watch this video on videojug.com
In this video, we learn how to make a box. First, fold the piece of paper into a triangle, then another triangle. Now, unfold the paper and fold all the sides into each other, making a square. After this, fold in the sides once more, making sharp creases on the edges. Now, ope ...more
If you're trying to hack someone's wifi, a useful bit of software you may want to try is called Wireshark. Wireshark is a wifi packet sniffer, which is an essential step in actually breaking into someone's wireless system. Of course, this is illegal, so make sure you're only d ...more
In this video, we learn how to delete hidden driver viruses. First, scan your computer with anti-virus and try to delete the virus that is harming your computer. If you have done this and your anti-virus can't delete it, download HijackThis from Trend Secure. Go through the do ...more
Tinkernut demonstrates how to crack a wifi connection, as well as how to better secure your own personal connection. Also included in the video gallery is Tinkernut's previous tutorial on the same subject. LifeHacker posted a great detailed text guide to accompany the second ...more
This quick tutorial runs you through a fast and easy way to make your iPhone or iPod Touch more secure. However the best security is abstinence. Just don't run the programs that leave your devices vulnerable unless you need them. The first half of this tutorial is for those w ...more
You're sitting in your favorite café enjoying a hot cup of joe, then you open up your laptop or turn on your tablet computer to get to work, but as always you get sidetracked and head straight for Facebook. Someone just tagged you in a photo, so you check it out, then you see ...more
This video by repairs universe shows viewers how to replace the battery in the 2nd Generation iPod Touch. The tools you will need for this project include safe-open pry tools and a small phillips head screwdriver. To begin, remove the screen by releasing several clips that hol ...more
The Mac OS's Disc Utility allows for the encryption of files. To open Disc Utility click on the magnifying glass (spot light) up in the top right hand corner, and search for Disc Utility. Click on the first result in the list. Once Disc Utility is open, click on "create a new ...more
To install the new toilet you will need a putty knife, hacksaw, tape measure, adjustable wrench, level, sponge, and replacement wax seal. Before you begin removing the old toilet, turn off and disconnect the water supply to the toilet. Then flush the toilet to get the water ou ...more
This video shows you how to remove and replace a sink basket. It's real quick and very efficient if you have a new sink and an old basket. Here are the steps on doing this. Procedure: 1. Remove the nut securing the drain line. 2. Use the sink basket wrench to remove the ears ...more
Are you a young aspiring actress? A triple threat? Many top singers and entertainers today got their start on the Disney Channel. In this video, learn how to get that audition with the Disney Channel... Who knows, it could be your big break! You Will Need: • Acting, singing, ...more
Originally made as portable convenience locks, padlocks are known for their cheap, simplistic and relatively secure design. Their construction is made up of a body, shackle and locking mechanism, with the shackle typically assuming a "U" shape to be easily linked to things lik ...more
Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their c ...more
As we all know, security is a big thing here in Null Byte. We've talked quite a bit about ways to encrypt traffic and become anonymous on the internet, some of which entail using proxies, VPNs, and SSH tunnels. We've also talked about preference using SSL pages in practice for ...more
Understandably, the tragedy in Japan has substantially risen the level of worldwide radiation-related hysteria. So much so, as an alternative to stampeding health food stores for iodine tablets, crafty individuals and organizations are hacking together personal radiation detec ...more
Chain locks are hardly highly secure to begin with, but a fun MacGyver-style trick nonetheless. Add it to the lock picking vault. Crack a Master Lock - Mathematically, No Shim. Open a Locked Door With a Credit Card. Wooden Combination Lock Demonstrates Inner Workings. DIY Digi ...more
Why buy lanterns for your backyard when you can recycle empty jars into beautiful ones? This video will show you how to make lanterns out of old jars. Step 1. Wash and dry Wash glass jars in hot, soapy water and let them air dry. Step 2. Make templates Cut templates out of ...more
One important part of jewelery making involves properly attaching hooks. This jewelry how-to video demonstrates the proper way to attach a hook, use it for making earing, bracelets or charms. Begin by holding the wire firmly in one hand. Using the chain nose pliers gently twis ...more
Now we'll learn how to secure PDFs so that we can safely send them out to clients for review and be assured that they can only access the content the way we want them to. Turn off things like printing and content extraction. Password protect your PDFs so that they can't even b ...more
In the last article, we left off with the Tor network and its hidden services. As I mentioned, Tor is not the only option in the game, and I want to offer a general introduction to I2P. For a web browsing proxy and hidden services host, Tor gets the job done well. But if you ...more
Some say Nigel Richards is to SCRABBLE what Garry Kasparov is to chess, but that doesn't make him perfect. The New Zealender lost on Sunday to Pakistani scrabble champion Muhammad Sulaiman, in the Malta International Scrabble Open Championship 2010, played in Qawra, Malta (So ...more
This video shows everything about how to put on a rented tuxedo. When you get your tux, the shoes will be hanging in a bag on the outside of the bag. Inside the bag will be the coat, shirt, vest or cummerbund, tie, pants and studs and links. Socks will be in the inside coat po ...more
By using sewing pattern Simplicity 4670, the author of this tutorial video takes you through the steps needed to produce a great shirt collar. First you should attach interfacing to one piece of the shirt collar. Here you will be using fusible interfacing and taking the facing ...more
More handy shelving ideas from home improvement expert, Danny Lipford. See how to expand your garage shelving in this video tutorial. While the garage is a great place for storage, it often becomes cluttered, making it hard to find what you need. Here are some easy projects t ...more
Lock picking is defined by locksmiths as "the art of opening a lock without the key". There's many ways to accomplish this, but I'm specifically interested in using a lock pick set. Since locks vary in shapes and size, it's better to stick with just one kind of lock at first. ...more
Here's a nasty little Null Byte. An open redirect vulnerability was found in both Facebook and Google that could allow hackers to steal user credentials via phishing. This also potentially allows redirects to malicious sites that exploit other vulnerabilities in your OS or bro ...more
Hello everyone and welcome to Part II - The Ultimate Guide: Diagnosing & Fixing Connection Issues. In this tutorial we will discuss more advanced methods that I took in order to fix our home network. I have also attached a link to download the FREE eBook - so feel free to down ...more
Gone are the days when you had to carry a clunky DynaTAC to make phone calls, pocket phone book for you contact list, Sony Discman for your tunes, and wallet for you cash and credit cards. Today, all you need is your smartphone. To be specific, Google's Nexus S 4G on Sprint. ...more
Dropbox continues to make headlines with their recent programming blunder which left the accounts of its 25 million customers wide open during a four-hour time span. During the duration, anyone in the world could access any Dropbox profile by typing in any password. And seeing ...more
Aside from food, oxygen, sunlight and water, there are other necessities that humans arguably need today to survive—clothing, love and shelter among them. Almost everyone wears clothes, needs somebody (or something) to love and a place to call home. And what's the one thing th ...more
In this tutorial, we learn how to change your car's oil to minimize wear and tear. First, you will need to gather all the equipment you need to change your oil. This will include: jacks for the car, new oil, oil pan, and filter. To start, you will need to jack your car up on t ...more
In this video we learn how to wrap handlebars. First, open up the tape and remove the adhesive. Place the tape on the bar and then tuck in one half as you work your way up the bar. The adhesive should be on the bars and there should be tension on them so they lay flat. Once yo ...more
In this video, we learn how to use cones when jewelry making with Christina. First, take a half inch hard wire with a looped end and use a pair of pliers to open up the loop slightly. Next, take your strands of beads and place them onto the loop. After this, close the loop mak ...more
This video tutorial is in the Computers & Programming category where you will learn how to secure your wireless internet connection. If you don't secure your wireless internet connection you are allowing others to enter in to your network. Open the set up CD and first change t ...more
For some people out there, whenever they get their hands on something new, the immediately need to know how it works. This can be especially true for electronics. That's no exception for the new Xbox 360 slim. This baby has been redesigned to feature wifi, touch controls, and ...more
In this tutorial, we learn how to detect all computers connected to your Wi-Fi network. To begin, go to the website, http://msdn.microsoft.com/en-gb/netframework/aa569263.aspx. Once you are on this site, download and install the program. Once it's installed, open the program a ...more
Secure a square-shaped piece of paper preferably six inches long on both sides. Cut the square paper into two equal halves. Fold one piece longitudinally right at the middle. Open the fold and refold it horizontally, on the shorter side. Refold the longitudinal crease you made ...more
If you're worried about having your private information taken away from you by hackers and other malicious people, this tutorial may help you. This tutorial will help show you how to easily use and understand the phishing filter in Internet Explorer 8. It only takes a couple o ...more
This video shows how to secure a wirelees internet connection on your Zyxel P-660hw-t1. For this, first click on Start button and open Internet Explorer(or any other browser). On the address bar of the browser, type in the IP address of your router. On the next page, enter you ...more
This video illustrate us how to make a light bulb oil lamp. Here are the following steps; Step 1: Take all the things required that is bulb, socks,adhesive tape,scissors,kerosene, rim with a hole in the center. Step 2:Now remove the back plug of the bulb carefully so that th ...more
Llewyn demonstrates how to configure your router for Wifi. Access the router by opening up your internet browser and typing in your router's IP address. That will bring up the router configuration page. Now, click on the wireless tab. You can set the wireless network mode to a ...more