How to Open a Secured Wifi

How To : Pump out the waste on your boat for winter

In this Outdoor Recreation video tutorial you will learn how to pump out the waste on your boat for winter. This video is from LIBoatersClub. Take your boat to the waste disposal area and secure it. Remove the cap from the waste tank. Be careful not to drop the cap. Operating ...more

How To : Secure your Macbook Pro

In this video tutorial, viewers learn how to secure a Mac Book Pro. Begin by opening the System Preferences and select Security under Personal. In the General tab, users are able to put on a password when the computer goes to sleep or screen-saver, disable automatic log in and ...more

How To : Connect to Xbox Live through a laptop or PCs wifi

This video will show you how to connect to XBox Live through a laptop or PC’s Wi-Fi. Connect your XBox Ethernet cable and the other end of the cable you connect it to the Ethernet port of your laptop. On Vista and XP, open control panel and go to Network Connections. Right cli ...more

How To : Wrap a textblock for protection

Learn how to wrap a textblock in this video tutorial. Wrapping the block allows you to protect the book's inner pages while you are working on the outside of the book. All you need to do is use some butcher paper, or any other kind of heavy duty paper you may have on hand. Lay ...more

How To : Make a rocket out of Mentos and Diet Coke

To make a rocket our of Mentos and diet coke, you are going to need a 2 liter of diet coke, three Mentos, a screw, and a magnet. First, thread all three Mentos on the screw and set aside. Next, open up the bottle of coke. Take the head of the screw and place it inside the bott ...more

How To : SSH with an iPhone/iTouch (without Wifi)

Do you own an iPhone or iTouch and are looking to learn how to SSH into your phone? You've come to the right place. Learn how to SSH into your Apple device with help from this video. In addition, you will learn how to open a virtual connection with your iPhone or iTouch & your ...more

How To : SSH into your iPhone or iPod Touch w/o wifi

In this video tutorial, viewers learn how to SSH into the iPhone or iPod Touch without any WI-FI connection. Users will need to download the Cyberduck application. Once downloaded and installed, open the program. At the top, change it from FTP to SFTP. The server is your IP ad ...more

How To : Make a DIY wedding flower centerpieces

A wedding budget can quickly get out of hand as your planning progresses. Things like centerpieces are a major cause of skyrocketing wedding costs. If you have a little time and want to easily trim down the cost of your wedding, think about making your own floral centerpieces. ...more

How To : Watch TV on your PC

To watch TV on your PC you need a TV tuner. You have two choices. There are usb sticks and pci cards. The pci is an internal circuit board that goes inside your computer. The pci card is very easy to install. Literally just open the computer and pop it into an available pci sl ...more

How To : Make a toga out of a sheet fast and easy

Need a girl toga fast and easy for that crazy party coming up? This tutorial will show you how to make a toga quickly using common materials. Taking a bed sheet, you will need to open it and hold it lengthwise, folding it in two. Then, taking two pins, measure out the distance ...more

How To : How to tie an eye splice with rope

The eye splice might sound like some horrible procedure from the lab of Dr. Frankenstein, but it's actually a very useful skill to learn for camping or disaster preparation. Eye splicing is a way to secure different strands of rope together so they're stronger than a knot. In ...more

How To : Tie a pitzen knot

The pitzen knot has various uses, but it's ideal for securing a hook to a fishing line. It's relatively easy to learn and quick to do once you know how. In this video the folks at ITS Tactical teach you how to tie a pitzen knot. ITS Tactical, Inc. is dedicated to showcasing t ...more

How To : Secure remote desktop

Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to secure re ...more

How To : Create a twisting ponytail on curly hair

Tired of boring old ponytails? This video demonstration shows how to make a unique twisting ponytail on curly hair. Gather the hair into a high ponytail and secure it with a hair band. Now, pull the hair band up, split the hair in two, pull the ponytail over and through the op ...more

How To : A Self-Protection Guide

A Self-Protection Guide 1) You can help protect yourself from violent crimes. Self-protection involves:Avoiding crime * Without a doubt prevention is your best prevention against crime.Knowing what to do in case of an attack* An attack can happen despite your best efforts to p ...more

Uncrackable : Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt ...more

How To : Encrypt Your Sensitive Files Using TrueCrypt

Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm ...more

HowTo : Read Your Own Mind

The days of trundling hoops, hopscotch and painted wooden rocking horses are long since past. The latest trend in toys? Biofeedback. Electroencephalography. A decade into the 21st century, the toy market is awash in products that incorporate functional neural sensors. One suc ...more

Tor vs. I2P : The Great Onion Debate

In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and m ...more

How To : Add Ctrl+Alt+Delete to Windows 7 Logon

Merry Christmas all! I hope you are all having a very wonderful day! Today we will be talking about further measures you can take to secure your Windows 7 logon screen. To see my previous post on how to add a username and password to your logon screen, see here. Introductio ...more

How To : Carve Saved Passwords Using Cain

I've previously mentioned how saving browser passwords is a bad idea, but I never went into much detail as to why. Passwords that are saved in your browser can be carved out and stolen very easily. In fact, even passwords you save for instant messaging and Wi-Fi are vulnerable ...more

How To : Bypass Windows and Linux Passwords

If you're interested in bypassing Windows and Linux passwords, there is a great tool from the good people at Kryptoslogic. Have you ever forgotten your administrator password? Have you ever bought a used computer with a password on it? Well, Kryptoslogic have created a boot-di ...more

Friday Fresh : Protect Your Email From Spam And More

Every day of the week, WonderHowTo curators are hard at work, scouring the web for the greatest and most inspiring how-to videos. Every Friday, we'll highlight our favorite finds. Protect your email with encryption Did you know that all you have to do to avoid getting spam i ...more

How To : Wear a full formal kilt outfit with accessories

In this tutorial, we learn how to wear a full formal kilt outfit with accessories. You will need: socks, garters, shoes, kilt, sporran, kilt pin, jacket, vest, and knife. First, put your socks on, then wear the garter around the sock, folding the top of the sock over the top o ...more

How To : Fish a two-hook panfish rig for deep-dwelling fish

The two-hook panfish rig is meant for vertical fishing under the boat in fairly deep water, for deep-dwelling fish like crappie, catfish, bluegills, and sometimes even bass. It involves two hooks hanging off the line, off droppers, to fish close to the bottom. Watch and learn ...more

How To : Completely delete items from Mac OS X

In order to completely delete items from Mac OS X. Download Google desktop. This will search your computer and the web and your computer. Go to Applications. Right click on Google Desktop. Go to Show Package Contents. Drag contents into the trash. Next, go to Google Gadgets. C ...more

How To : SSH into a iPod Touch or iPhone using Filezilla

This video tutorial from iTouchMaster2 shows how to SSH to iPod or iPod Touch using FileZilla application. FileZilla is a freeware application working on Windows, Linux and Mac OS X. To start, download and install FileZilla from this web site: filezilla-project.org. Note, y ...more

How To : Do construction paper weaving with your kids

This is a project to keep your kids entertained. It is also a great way to practice hand eye coordination and motor skills. The materials that you are going to need are; construction paper and something to cut the paper with.Depending on the age of the child you can use 3 colo ...more

How To : Encrypt files with OpenSSL in Debian Linux

This video shows how to encrypt files with OpenSSL in Debian Linux. First we check if open SSL is installed on the system. If not, install it using packet manager. Next create the file going to be encrypted. Now encrypt the file. In this case AES algorithm in ypher block chain ...more

How To : Set up a classic A-Frame tent

There are tons of quick pop up tents available nowadays, but the classic A-Frame tent still remains one of the most popular. A-Frames are those classic tents with the spikes in the ground that hold it up. They take a little more effort to erect but they are perfect for backpac ...more

How To : Easily SSH into your iPhone without Wifi

If you don't have a Wi-Fi network, you can still easily SSH into your iPhone. Just follow the steps outlined in this video tutorial. First, you will need a Mac or iPhone along with Fuju. Just download the program. Once you have all of this, click on the Wi-Fi bar and click on ...more

How To : Make a chain mail bracelet

You can learn to make a beautiful chain mail bracelet by watching this video. The bracelet is easy to make and affordable too. Start by sliding two silver jumper rings onto a paper clip. Two copper jumper rings are passed through the silver rings and twisted to complete the lo ...more

How To : Attach a crimp and cover to jewelry

Crimp can be made easily and covered to the jewelry by using the following instructions. First purchase the proper supplies of crimping tool. This tool acts like pliers and is used by placing the bead in the appropriate slot at the tip and then squeeze the handle together. The ...more

How To : Get summertime beachy wavy hair

Shampoo and condition your hair. Use a lightweight conditioner that won't weigh it down; try a volumizing formula. Blow dry the roots of your hair with your head upside down, using the cool-shot button every few minutes to lock in some volume. Stop when your hair is damp, but ...more

How To : Prevent bike theft

Don’t play Russian roulette when it comes to your wheels. Keep your bike secure with these precautions. You Will Need * A bike * A fixed object, such as a bike rack * A U-shaped bike lock * A cable or chain lock * A personal identifier Step 1 Leave your bike in an open area w ...more

How To : Build a locking tool cabinet

With the growing popularity of cordless power tools, it's extremely easy these days to accumulate a lot of portable tools, and when you add in quality corded tools, such as circular saws, routers, planers and air nailers, you can end up with a pretty hefty investment. These sa ...more

How To : Maintain your RV furnace

Watch this quick RV tutorial video to find out how to maintain or repair your furnace. All of the items shown are simple steps you can do yourself. Some motor homes have two furnaces and some have one. They should be located on one of the sides of the unit. In the shape of a m ...more

How To : Make a Cheap & Easy Prop Skull

Skulls. What spooky Halloween décor or staging of Hamlet is complete without a skull or two popping up? For ghoulish special effect and/or setting a dramatic scene, skulls are absolutely integral. Well, with some artistry, hardware supplies, and a good dose of patience, you ca ...more

How To : Do a bent row back exercise with resistance tubing

This exercise is a convenient alternative to the traditional barbell row. The main target is the upper back, or scientifically, the latissimus dorsi. The "lat" muscles function to pull things. So whenever you open a door, your lat muscles are allowing the movement to take plac ...more

How To : Add stairway headroom with This Old House

Watch this video from This Old House to learn how add stairway headroom. Steps: 1 Carefully pry old stair treads from staircase. 2 Use reciprocating saw to cut out the old stair stringers. 3 Cut new notched stringers from 2x12s using a circular saw; finish cuts with handsaw. ...more

News : The Value and Worth of Daily Positive Affirmations

I've been dealing with emotional difficulty for many years. It started when I had surgery for the epilepsy I was dealing, and quite literally, dying with. Since the surgery on March 28, 1990 I have had no seizures, but I have had plenty of emotional difficulty. Along with that ...more

How to Make a Jacob's Ladder : Chained Lightning

In this article, I'll show you how to create a simple yet accurate demonstration of the "rising ionized gas" principle. In other words, a transformer, two metal prongs and lots of evil laughter. Remember those large "towers" in the background of Frankenstein movies with a "lig ...more

  • Hot
  • Latest