This video will demonstrate the process to implement page numbers in your Microsoft Word 2007 documents. The video starts out by showing the Insert Tab on the Microsoft Word 2007 Ribbon. On the Insert Ribbon, you will see an icon titled Page Number. All of the Page Number opti ...more
Bananabells are very popular and can be used for most body piercings. They are most commonly used for navel piercings and ear piercings. This how to video teaches you how to insert a bananabell, and what type of bananabell will be right for you. There are many different sizes ...more
Note: a bug was found in the Insertion Sort implementations. The bug was corrected in each language. Please refer to the pastebin links for the most up-to-date versions of the sample code. Any screenshots may be behind. More about the bug can be found here. Hello World! Today ...more
New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun, the 215th installment in their series of digital spreadsheet magic tricks, you'll learn how to create ...more
Learn. Evolve. Operate. That's the basis of Leo from Kryon Systems. It's a new application that runs on top of any program you have open (web and desktop applications), providing you with instant help. Leo can actually perform your duties for you! Like in Microsoft Word 2007. ...more
In this video the instructor shows how to insert a quick time video into your web page. To do this, first create a text box. It is always good to create a text box first and then insert your movie or flash object or any other media into it because it gives you more control of ...more
In this video tutorial, you'll learn how to insert a special character in Adobe Dreamweaver CS3.
To insert a picture on your wiki page you first need to find the picure you want. Hit the edit button and click the image of the tree. Browse your computer to find the picture you want, click open, and then scroll down and click "upload" If your file does not upload, it may be ...more
In this tutorial, we learn how to insert pictures and format text in Fusion Essentials. Start by selecting your image and then clicking inside the text box. Select an image, then it will appear in the text box. From here, click on the picture and go to the alignment section. C ...more
This video demonstrates how to insert photos into blog posts with Flickr. From the people who brought you the Dummies instructional book series, brings you the same non-intimidating guides in video form. Watch this video tutorial to learn how to insert photos into blog posts w ...more
Putting sound in Microsoft PowerPoint can be both practical and engaging. See how easy it is to add sound to PowerPoint.
This video describes how to insert keywords and SEO with the fusion essentials in the website. He asks you to first go to the site mode and then click on the home page and from there you can get in to the property box. There you can find three choices or tabs. He explains that ...more
Insert VuVox Collage to your profile at http://www.apojigo.com/. You can also include multimedia content like audio, video, and graphics.
Do you want to include more pages after your file is published into PDF? Or you have accidentally included pages that are not meant to be in the PDF? In this Adobe Acrobat video tutorial you will learn how to insert and delete pages in a PDF document. Make sure to hit "play tu ...more
A spare key is one of those things that never seems like a huge deal until you need it. If you've ever lost your keys, had them stolen, or locked yourself out of your house or car, you know how difficult and embarrassing it can be trying to get your door open. So, how would y ...more
A vending machine is an invaluable yet totally frustrating piece of equipment. It's a godsend whenever your tummy's growling or you need an ice-cold drink on a hot summer day. But when something gets stuck inside or the machine flat-out malfunctions, it quickly becomes your ar ...more
Why unlock your Samsung Galaxy S3 to use with a different SIM card? One possible reason is that you love your phone, but not your cellular provider because of the poor service or an unreliable connection. If you purchased a Samsung GS3 with AT&T, T-Mobile, etc. on a contract, ...more
School internet filters serve a valid purpose—they keep students from wandering off into the deep corners of the web while still allowing at least some internet access. But a lot of these restrictions are completely ridiculous, to the point where some school districts block ac ...more
What happens when you find your ball deflated and there's no pump or needle in sight? You could always cancel your plans of kicking around the soccer ball or starting that pickup football game in the park. Better yet, you could be terribly clever and find another way to get ai ...more
Apple's iOS 11 is finally here, and while they showed off several of the new features it brings to your iPhone, iPad, and iPod touch back at WWDC 2017, they've only just touched the surface of what iOS 11 has to offer. There are a lot of cool new (and sometimes secret) feature ...more
Normally, you'd have to jailbreak your iPad or iPhone to play any games that aren't available in the iOS App Store, like the now-extinct Flappy Bird game. But this isn't the case if you want to play some of your favorite old school Nintendo classics. There's a web app called ...more
Modular origami is a technique that can be used to build some pretty interesting and impressive models of mathematical objects. In modular origami, you combine multiple units folded from single pieces of paper into more complicated forms. The Sonobe unit is a simple example un ...more
Sharing your personal information can come up for any number of reasons: you may want to get in touch with a colleague after work or you've been involved in a car accident and need to stay in contact with the other driver. Unfortunately, giving out information can be the key f ...more
Greetings. This how-to on hacking Windows 7/8/10 etc. admin account passwords using Windows Magnifier is focused on adding, changing, or deleting an admin level account on a Windows 7/8/10 etc. Maybe you forgot or lost the password to your Windows Admin account, this guide wi ...more
Have you ever wanted to be famous? Of course you have! Now you can make your Twitter profile look like it's verified, just like professional skater Lil' Wayne. With Twitter's new header, you can now upload a cover photo onto your profile to be seen online and on mobile devices ...more
If you've ever had issues charging your iPad, iPhone, or iPod touch, like most other Apple products, the culprit to blame is usually a frayed or damaged cable. It's a common design flaw due to the thinness of the cords and the weak sheath surrounding them — but that's not alwa ...more
The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, ...more
If you're a teacher in any type of school, whether it's high school, college, or middle school, it's imperative that you keep an attendance sheet. The paper and pen route can get pretty messy, and very disorganized, and that's where Microsoft Excel comes in. With this software ...more
Most people have had the unfortunate experience of not having a washer and dryer at some point. Apartments in my area tend to charge at least one hundred dollars extra for the units with washer and dryer hookups, and even more if you want a unit with an actual washer and dryer ...more
This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing p ...more
Whether you're a celebrity or someone with something to hide, Facebook allows you to keep your "friends list" private so you can protect the identities of your Facebook friends. But it only kind of protects them. There's a simple Facebook hack that lets you unravel entire net ...more
It has happened to everyone at one time or another, but if you work in an environment with cars, it may happen much more often. I don't know about you, but the last thing I want to do is to call a customer to see if they have a spare key because I've locked the keys in the ca ...more
How to get a vending machine to pay you for its goodies, instead of you paying for them. First off, find a older vending machine, and insert your dollar bill as you normally would. Once you have entered it, you can select which ever item you want. Then quickly, before the item ...more
When the 6.1 version of iOS was released back in February, complaints of severe battery drainage for iPhone, iPad, and iPod touch users exploded onto every Apple-related forum on the Internet. Everyone was either losing a percentage every three or so minutes, or their battery ...more
At the recent DefCon conference in Las Vegas, researchers opened many of the top commercially available gun safes with simple tools like a straw or a paper clip, and in one case, just by shaking it a bit. The investigation began after the researchers, Toby Bluzmanis, Marc Tobi ...more
Windows 10 is officially here, and frankly, there's a ton of new features in Microsoft's latest operating system. From the return of the Start menu to the new Edge browser, Windows 10 can take some getting used to. Luckily, we've done a lot of the leg work for you, and what f ...more
Here we go again, softModders, it's time for another awesome tweak for your iPod, iPhone, or iPod running iOS 7. Have you ever felt like changing your lock screen with a custom text instead of it saying "slide to unlock"? Why shouldn't we be able to edit this? We're not given ...more
Google's next-gen cellular carrier, Google Fi, which replaces Project Fi, is making waves across the mobile industry. With super-cheap plans starting at only $20 and the ability to connect to millions of Wi-Fi hotspots across the globe, it's tempting many users to make the swi ...more
Hey, hackers! Now that you've hacked/owned your first "box" in my last article, let's look a little closer at another great feature of Metasploit, the Meterpreter, and then let’s move on to hacking a Linux system and using the Meterpreter to control and own it. Why Meterprete ...more
When you don't want somebody you're calling to know the real phone number associated with your iPhone, whether it's for privacy reasons, to avoid being called back, or to prevent being ignored, there are multiple things you can do to block it on their caller ID. Some of the b ...more
Making a custom location on Instagram is one of the best ways to generate traffic to your account. It gives you that extra uniqueness when it comes to standing out amongst other companies. It also allows people to check in at the same location, further promoting your account a ...more
Whether you locked yourself out of your house, or just into experimenting with locks, check out this video to learn how to open a deadbolt door lock. No skill, no experience, and no professional pick tools needed -- just 2 bobby pins. Using very light torque to the tension wre ...more
While my desktop is usually neat and organized, it quickly fills up with screenshots each and every day. Usually, I end up putting them in a folder or just trash them, but why not make the entire process of taking and organizing screenshots easier by changing their default sav ...more
Cases and stickers are always great, but they aren't the only way to customize an iPhone. The software on your device is full of customization options, from a better-looking home screen and cooler lock screen wallpapers to app icon changes and a system-wide dark mode. There's ...more
On the internet, everything is possible, even if it's not grounded in reality (check no further than anything The Onion publishes). Witty headlines combined with clever photo edits make even the most absurd topic seem like a serious news story. Some of these stories are so con ...more
F for FAKE. This video has been labeled a "Faux-To". Commonly contested as bogus science, we believe this video to be a hoax. What's your opinion? Comment below. Cut a potato in half. Hollow-out one side of the potato. Fill with mixture of salt and tooth paste. With tooth pic ...more
Apple's latest mobile operating system, iOS 9, may not be the huge overhaul that iOS 8 was, but that doesn't mean there aren't plenty of new features. In fact, there are a ton of subtle changes that you may not notice right away. Here's a rundown of all the coolest new feature ...more
Navigating and editing text is an essential part of any operating system, and with iOS 13, Apple has made some significant changes. Some things remain the same when working with text, but there are many updates to moving the cursor, scrolling, and selecting, cutting, copying, ...more
When there's a crappy stock app you want to hide, the easiest thing to do is just bury it in the back of a miscellaneous folder. But what if there's an app you want to hide on your home screen that you actually use? For instance, what if you don't want everybody in eyeshot to ...more
One of the most annoying things about the PlayStation 3 is its lack of backward compatibility on some models. There are several hacks out there to do this, but most of them involve extra hardware, like the Cobra-USB Dongle, or downgrading, which can cause all sorts of problems ...more
In my last tutorial, I talked about creating a virus inside of a Word Document in the scenario of a mass-mailer attack. In this post, however, I'm going to be covering creating a fake image or screenshot with a meterpreter backdoor hidden inside to be used in a similar scenari ...more
A powered-off Windows 10 laptop can be compromised in less than three minutes. With just a few keystrokes, it's possible for a hacker to remove all antivirus software, create a backdoor, and capture webcam images and passwords, among other highly sensitive personal data. The ...more
In this article, I'll show you how to build a coil gun. A coil gun is a device that fires magnetic projectiles at high velocities, using electricity. Coil guns require no explosive propellant, therefor can be fired an infinite amount of time, providing that there is ammunition ...more
When you're using vacuum power, moving water, or compressing air, it's more than likely being done with some sort of pump. I'll be needing a pump for some of my future projects, so in this tutorial, I'll be showing you how to make your own customizable PVC hand pump that will ...more
A powered-off MacBook can be compromised in less than three minutes. With just a few commands, it's possible for a hacker to extract a target's password hash and crack it without their knowledge. The goal in this article is to acquire a target's .plist file which contains the ...more
This medical how-to video demonstrates how to catheterize males and females with a Foley catheter. Follow along and learn how insert the catheter into a bladder using mannequins. The first part of the video shows a female Foley catheterization and the second half shows the mal ...more
As the holidays draw closer and closer, stores are getting more and more crowded, and of course, many have put off their Christmas shopping until the very last minute. Why not avoid the mall rush this holiday season and make a personalized do-it-yourself snow globe to gift to ...more
Apple's iOS 13 has been available for beta testing since June, and the stable release pushed out to everyone on Thursday, Sept. 19. To help you make the most out of iOS 13 for iPhone, we've rounded up everything you'll want to know, whether a colossal feature, small settings c ...more
Just recently, I was experimenting with a dual-boot Windows setup, and somehow managed to wipe my primary Windows installation in the process. "Why," I asked myself, "Why didn't I make a backup before I started this?" Still to this day, I'm going through the painstaking proces ...more
Welcome back, rookie hackers! We recently began an exploration of ways to hack using the Bluetooth protocol. As you know, Bluetooth is a protocol that connects near field devices such as headsets, speakers, and keyboards. Its minimum range is a 10-meter radius (~33 feet) and ...more