In this Outdoor Recreation video tutorial you will learn how to pump out the waste on your boat for winter. This video is from LIBoatersClub. Take your boat to the waste disposal area and secure it. Remove the cap from the waste tank. Be careful not to drop the cap. Operating ...more
In this video tutorial, viewers learn how to secure a Mac Book Pro. Begin by opening the System Preferences and select Security under Personal. In the General tab, users are able to put on a password when the computer goes to sleep or screen-saver, disable automatic log in and ...more
This video will show you how to connect to XBox Live through a laptop or PC’s Wi-Fi. Connect your XBox Ethernet cable and the other end of the cable you connect it to the Ethernet port of your laptop. On Vista and XP, open control panel and go to Network Connections. Right cli ...more
Learn how to wrap a textblock in this video tutorial. Wrapping the block allows you to protect the book's inner pages while you are working on the outside of the book. All you need to do is use some butcher paper, or any other kind of heavy duty paper you may have on hand. Lay ...more
To make a rocket our of Mentos and diet coke, you are going to need a 2 liter of diet coke, three Mentos, a screw, and a magnet. First, thread all three Mentos on the screw and set aside. Next, open up the bottle of coke. Take the head of the screw and place it inside the bott ...more
Do you own an iPhone or iTouch and are looking to learn how to SSH into your phone? You've come to the right place. Learn how to SSH into your Apple device with help from this video. In addition, you will learn how to open a virtual connection with your iPhone or iTouch & your ...more
TrueCrypt is a free application that lets you encrypt designated programs on your Ubuntu system to prevent unwanted access. Provided you select a strong password, intruders will not be able to open your personal files and documents. This instructional video walks you through t ...more
In this video tutorial, viewers learn how to SSH into the iPhone or iPod Touch without any WI-FI connection. Users will need to download the Cyberduck application. Once downloaded and installed, open the program. At the top, change it from FTP to SFTP. The server is your IP ad ...more
A wedding budget can quickly get out of hand as your planning progresses. Things like centerpieces are a major cause of skyrocketing wedding costs. If you have a little time and want to easily trim down the cost of your wedding, think about making your own floral centerpieces. ...more
To watch TV on your PC you need a TV tuner. You have two choices. There are usb sticks and pci cards. The pci is an internal circuit board that goes inside your computer. The pci card is very easy to install. Literally just open the computer and pop it into an available pci sl ...more
In order to secure a PDF with a password when opened in Adobe Acrobat 9 Pro, press the secure button and go into password security settings. Here you can change on what versions of this software the file will run on, the next option asks which portion of the document is to be ...more
Need a girl toga fast and easy for that crazy party coming up? This tutorial will show you how to make a toga quickly using common materials. Taking a bed sheet, you will need to open it and hold it lengthwise, folding it in two. Then, taking two pins, measure out the distance ...more
The eye splice might sound like some horrible procedure from the lab of Dr. Frankenstein, but it's actually a very useful skill to learn for camping or disaster preparation. Eye splicing is a way to secure different strands of rope together so they're stronger than a knot. In ...more
The pitzen knot has various uses, but it's ideal for securing a hook to a fishing line. It's relatively easy to learn and quick to do once you know how. In this video the folks at ITS Tactical teach you how to tie a pitzen knot. ITS Tactical, Inc. is dedicated to showcasing t ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to secure re ...more
In today's time of rampant information crimes, including identity theft, security is more important to the average computer user than ever. This tutorial from Linux Journal Online shows how you can use GnuPG to secure and verify data on your Linux box. (This video was created ...more
Tired of boring old ponytails? This video demonstration shows how to make a unique twisting ponytail on curly hair. Gather the hair into a high ponytail and secure it with a hair band. Now, pull the hair band up, split the hair in two, pull the ponytail over and through the op ...more
A Self-Protection Guide 1) You can help protect yourself from violent crimes. Self-protection involves:Avoiding crime * Without a doubt prevention is your best prevention against crime.Knowing what to do in case of an attack* An attack can happen despite your best efforts to p ...more
As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt ...more
Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm ...more
This is a two-part series to locking down the computer to provide maximum protection. Even though this guide will sound intrusive, we are talking about reality here. Extreme measures must be taken to protect our computers, especially when we have confidential documentation or ...more
A few days ago, CloudOn released their free mobile app that brought Microsoft Office directly to your Apple iPad. The cloud-based service effectively runs Office on their end, allowing you to use apps like Word and PowerPoint to edit your documents, which you would house in Dr ...more
The days of trundling hoops, hopscotch and painted wooden rocking horses are long since past. The latest trend in toys? Biofeedback. Electroencephalography. A decade into the 21st century, the toy market is awash in products that incorporate functional neural sensors. One suc ...more
Wireless networks. Nowadays, everyone uses 'em, but most don't secure 'em. On average, I can drive up and down any block in my city and find at least one or two open or semi-open networks on any given day. With some changed MAC addresses for good measure, an attacker can use y ...more
In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and m ...more
Do you need to email your wife your Social Security number? Send confidential business plans to your partner in Thailand? Send your hacker buddies the recovered hashes from last night's breach? Try using GPG, a valuable and easy to use open-source encryption program. In my fi ...more
SSH is amazing, and we praise its existence on Null Byte for many reasons. Notably, it allows us to reroute our traffic through encrypted ports on our local host to be sent to its destination when on the go. You can even control your home computers remotely over a secure and e ...more
Merry Christmas all! I hope you are all having a very wonderful day! Today we will be talking about further measures you can take to secure your Windows 7 logon screen. To see my previous post on how to add a username and password to your logon screen, see here. Introductio ...more
OpenVPN is the open-source VPN (Virtual Private Network) client, used over the PPTP (Point to Point Tunneling Protocol). It allows you to connect to a remote network over a secure, encrypted connection and mask your IP addresses over all ports. Since there is only one "hop," t ...more
I've previously mentioned how saving browser passwords is a bad idea, but I never went into much detail as to why. Passwords that are saved in your browser can be carved out and stolen very easily. In fact, even passwords you save for instant messaging and Wi-Fi are vulnerable ...more
If you're interested in bypassing Windows and Linux passwords, there is a great tool from the good people at Kryptoslogic. Have you ever forgotten your administrator password? Have you ever bought a used computer with a password on it? Well, Kryptoslogic have created a boot-di ...more
Developers have created many tools for testing the strength of passwords (1, 2); there are also plenty of tips for coming up with a strong password in the first place. But why do the grunt work when an app could generate a perfectly secure one for you? There are plenty of pas ...more
Every day of the week, WonderHowTo curators are hard at work, scouring the web for the greatest and most inspiring how-to videos. Every Friday, we'll highlight our favorite finds. Protect your email with encryption Did you know that all you have to do to avoid getting spam i ...more
In this tutorial, we learn how to wear a full formal kilt outfit with accessories. You will need: socks, garters, shoes, kilt, sporran, kilt pin, jacket, vest, and knife. First, put your socks on, then wear the garter around the sock, folding the top of the sock over the top o ...more
The two-hook panfish rig is meant for vertical fishing under the boat in fairly deep water, for deep-dwelling fish like crappie, catfish, bluegills, and sometimes even bass. It involves two hooks hanging off the line, off droppers, to fish close to the bottom. Watch and learn ...more
Selling isn't easy. And it isn't any easier online, at least, until you get set up. It sure beats the streets. But how do you get ready to sell online? This video tells you the basic 6 steps to successfully starting your own website online store, which include picking your pr ...more
In order to completely delete items from Mac OS X. Download Google desktop. This will search your computer and the web and your computer. Go to Applications. Right click on Google Desktop. Go to Show Package Contents. Drag contents into the trash. Next, go to Google Gadgets. C ...more
This video tutorial from iTouchMaster2 shows how to SSH to iPod or iPod Touch using FileZilla application. FileZilla is a freeware application working on Windows, Linux and Mac OS X. To start, download and install FileZilla from this web site: filezilla-project.org. Note, y ...more
This is a project to keep your kids entertained. It is also a great way to practice hand eye coordination and motor skills. The materials that you are going to need are; construction paper and something to cut the paper with.Depending on the age of the child you can use 3 colo ...more
This video shows how to encrypt files with OpenSSL in Debian Linux. First we check if open SSL is installed on the system. If not, install it using packet manager. Next create the file going to be encrypted. Now encrypt the file. In this case AES algorithm in ypher block chain ...more
If you have files on your PC that you don't want other window's accounts to be able to access, you can encrypt them. Right click the file that you want to encrypt and select properties from the drop down menu. Once the properties page comes up, choose advanced. Now choose Encr ...more
There are tons of quick pop up tents available nowadays, but the classic A-Frame tent still remains one of the most popular. A-Frames are those classic tents with the spikes in the ground that hold it up. They take a little more effort to erect but they are perfect for backpac ...more
If you don't have a Wi-Fi network, you can still easily SSH into your iPhone. Just follow the steps outlined in this video tutorial. First, you will need a Mac or iPhone along with Fuju. Just download the program. Once you have all of this, click on the Wi-Fi bar and click on ...more
You can learn to make a beautiful chain mail bracelet by watching this video. The bracelet is easy to make and affordable too. Start by sliding two silver jumper rings onto a paper clip. Two copper jumper rings are passed through the silver rings and twisted to complete the lo ...more
Crimp can be made easily and covered to the jewelry by using the following instructions. First purchase the proper supplies of crimping tool. This tool acts like pliers and is used by placing the bead in the appropriate slot at the tip and then squeeze the handle together. The ...more
Shampoo and condition your hair. Use a lightweight conditioner that won't weigh it down; try a volumizing formula. Blow dry the roots of your hair with your head upside down, using the cool-shot button every few minutes to lock in some volume. Stop when your hair is damp, but ...more
Don’t play Russian roulette when it comes to your wheels. Keep your bike secure with these precautions. You Will Need * A bike * A fixed object, such as a bike rack * A U-shaped bike lock * A cable or chain lock * A personal identifier Step 1 Leave your bike in an open area w ...more
With the growing popularity of cordless power tools, it's extremely easy these days to accumulate a lot of portable tools, and when you add in quality corded tools, such as circular saws, routers, planers and air nailers, you can end up with a pretty hefty investment. These sa ...more
Watch this quick RV tutorial video to find out how to maintain or repair your furnace. All of the items shown are simple steps you can do yourself. Some motor homes have two furnaces and some have one. They should be located on one of the sides of the unit. In the shape of a m ...more
Skulls. What spooky Halloween décor or staging of Hamlet is complete without a skull or two popping up? For ghoulish special effect and/or setting a dramatic scene, skulls are absolutely integral. Well, with some artistry, hardware supplies, and a good dose of patience, you ca ...more
The seated row with resistance tubing is a great back exercise. The largest muscle in the back is scientifically known as the latissimus dorsi. You might see it referred to as the "lats" or "wings." The lats are used any time you pull something. For example, when you open a fr ...more
This exercise is a convenient alternative to the traditional barbell row. The main target is the upper back, or scientifically, the latissimus dorsi. The "lat" muscles function to pull things. So whenever you open a door, your lat muscles are allowing the movement to take plac ...more
Watch this video from This Old House to learn how add stairway headroom. Steps: 1 Carefully pry old stair treads from staircase. 2 Use reciprocating saw to cut out the old stair stringers. 3 Cut new notched stringers from 2x12s using a circular saw; finish cuts with handsaw. ...more
If you're bound to a wheelchair and living in Orange County, California, then this video is a must-see if you use public transportation. It will show you the steps to boarding an Orange County Transit Authority (OCTA) bus the right way, when in your wheelchair. 1. Arrive at t ...more
Computer viruses are terrifying. They are undetectable, dangerous, and operate constantly right under your nose. For the average computer user, there are only a few repair options. You could buy expensive antivirus software that causes more problems than it fixes, you can wipe ...more
I've been dealing with emotional difficulty for many years. It started when I had surgery for the epilepsy I was dealing, and quite literally, dying with. Since the surgery on March 28, 1990 I have had no seizures, but I have had plenty of emotional difficulty. Along with that ...more
In this article, I'll show you how to create a simple yet accurate demonstration of the "rising ionized gas" principle. In other words, a transformer, two metal prongs and lots of evil laughter. Remember those large "towers" in the background of Frankenstein movies with a "lig ...more
Welcome to the Goodnight Byte for HackThisSite, Basic Mission 4. In Friday's session, we tackled some coding in Gobby. Nothing special, just a few modifications to the NullBot script we made a few session ago, and some education on regular expressions. Apart from coding, we di ...more
"How do I install Arch Linux?" That question was bound to come up eventually. And with me using Arch, it's no coincidence that all of you want to use it as well. Arch is arguably the best Linux distro available. Distros that come close are Gentoo and some aspects of Ubuntu, bu ...more
Last weekend the 2011 World Scrabble Championship was held at the Hilton Hotel in Warsaw, Poland. There were 106 players competing from 44 countries for the $20,000 first place prize and title of World Scrabble Champion. Players spend years mastering their Scrabble skills in ...more