Name Protect

How To : Protect your blog by trademarking your domain name

When you start a blog of your own you will want to make sure you protect yourself. Even before your blog takes off you will want to research trademark law when you attempt to register for a domain name. This will protect you against potential lawsuits from people with similar ...more

Protect Your Facebook Profile : 10 Ways to Increase Privacy

Don't want one of your Facebook "friends" knowing your status updates? Prefer to keep a few of those "friends" out of your photo albums? Would you like to prevent a few "friends" from accessing your address? The simple answer would be to remove all of those so-called friends— ...more

How To : Protect Your PHP Website from SQL Injection Hacks

As a web developer, I often read articles about hackers (from the lowly to the knowledgeable) infiltrating websites via the dreaded 'SQL Injection' method and completely taking control, changing, gaining access, or destroying the owner's data. As a fellow web developer, I'm su ...more

How To : Create a website and improve web presence

When you need a website to showcase your product or service, it can be quite confusing. Follow these easy steps to gather everything you need to have a successful website. Start your search for a domain name in the domain name registrar. (Example: www.companyname.com) Rent spa ...more

How To : Affix a mezuzah to a doorpost of a Jewish home

This animated video, produced by Jewish Pathways, demonstrates how to affix a mezuzah to a doorpost. In Judaism, the mezuzah (or mezuza) is a parchment inscribed with religious texts that is attached in a case to the doorpost or doorframe of a Jewish house as a sign of faith. ...more

How To : Do a Salah Prayer

See how to do Salah Prayer for Muslims by Sheikh Adly, with instructions in English. Sunni way! Holy Quran 22.78: And strive in His cause as ye ought to strive, (with sincerity and under discipline). He has chosen you, and has imposed no difficulties on you in religion; it ...more

How To : Play Better in Counter Strike Source

So You're New to Counter Strike Source? So you're new to Counter Strike Source and you want to improve your gameplay? Great. You've come to the right place. The first step to improving your game is to admit that you are a NEWB or NEWBIE. Do not confuse this with NOOB. A "new ...more

How To : Protect Yourself from Hackers

Social Profile Change the privacy settings on your social profile (Facebook, MySpace, Friendster, Twitter, etc.) so that the following information can't be found by a random person who you didn't accept you as a friend: Birthdate E-mail address Hometown Pictures A hacker ca ...more

How To : Recover Lost Files and Images

You've had a massive hard disk failure.. ...in your PC or laptop and like a large number of people who think it will never happen to them...you did not have a backup of those 2000+ family pictures, those hundred of important Word documents, those family videos that you downlo ...more

How To : Use uTorrent

How to use uTorrent First of all we need to understand what uTorrent is. uTorrent is a file or a Micro-Torrent that helps you, the user, download stuff like documents, pictures, videos, or e-books. uTorrent is very, very, useful when you know how to do it. so hope fully this ...more

News : Should Kids Be Allowed to Use Facebook and Google+?

It's a question I've been pondering a lot lately. Technically, children under the age of 13 are not allowed to join Facebook. But according to a Consumer Reports in May, 7.5 million children 12 and younger are already on the site. Currently, federal law prohibits websites from ...more

How To : Keep your diary private

If you're serious about keeping your diary for your eyes only then you might have to take some drastic steps. There are some very clever ways to distract from, encrypt, hide, or disguise a diary if you're willing to put in the work. If you keep a diary, you’re likely to want ...more

How To : Set up an Epson printer wirelessly

Learn how to set up an Epson printer wirelessly when you bring your new printer home you will want to start by installing the software that came with the new printer. You can set up your printer to work without wires and it will print from all over the house. There are 3 ways ...more

News : 8 Tips for Creating Strong, Unbreakable Passwords

This weekend, hackers broke into the servers of the popular shoe shopping site Zappos, giving them access to the personal information of 24 million Zappos customers. The user data taken included names, email addresses, billing and shipping addresses, phone numbers, the last fo ...more

How To : Detect Facebook Spam

Spam is everywhere and Facebook is no exception. In fact, spammers are constantly stepping up their game by tricking unsuspecting Facebook users to participate in quizzes, games, apps, or "new features" that are actually dangerous computer viruses, spyware, or other trojan hor ...more

How To : Password protect your folders on a Mac coomputer

In this tutorial, we learn how to password protect your folders on a Mac computer. First, use the spotlight tool to type in "disk" and then click on disk utility on the drop down menu. From here, go to the save as menu and enter in the name for the volume. After this, change t ...more

How To : Password protect a folder on Windows Vista

In this tutorial, we learn how to password protect a folder on Windows Vista. To do this, you will first need to have WinRAR downloaded on your computer, you can get it here: http://download.cnet.com/WinRAR-32-bit/3000-2250_4-10007677.html. Next, you will right click on your s ...more

How To : Passsword protect your files

In this video tutorial, viewers learn how to password protect their files. This task can only be done on a Windows computer. Begin by creating a Microsoft Word document. Simply right-click on the desktop, go to New and select Microsoft Word Document. Then double-click on the d ...more

How To : Build a website for free with Weebly

1. On the browser, type www.weebly.com. If you are a new user, then sign up. Write your username, email, password, and click on Sign Up and Start Creating. 2. Next, it will ask, "Title Your New Site". Give any name, for example, Online Business Trainer, and click on Continue ...more

How To : Sell a screenplay

Attention aspiring screenwriters! In this tutorial, learn how to sell that script. You may have written the next Hollywood blockbuster – but unless you can finance the film yourself, you’ll need to sell the screenplay to a producer who can make it come to life. You Will Need: ...more

How To : Protect your online reputation

With social networking systems, YouTube comments chains, chat rooms, bulletins boards, Twitter updates... It seems as if almost everyone has at one time publicly stated an opinion on the Internet. Nearly half of all prospective employers research job applicants online. Make su ...more

Dungeon Defenders : Heaven for Hardcore Gamers

Dungeon Defenders is the most exciting craft game on the Fall 2011 release schedule. I got a chance to play it at PAX in August and interviewed developers Trendy Entertainment last month. After more than a year of publishing difficulty and delay, the game finally came out on P ...more

How To : Password protect PDF files with NovaPDF

This video tutorial belongs to the software category which is going to show you how to convert a Word document to a password protected PDF file with NovaPDF. Go to NovaPDF and download the program and install it. It is a paid program. Select the word document that you want to ...more

How To : Use old tennis balls

Tennis balls aren't just for playing tennis, so when you are getting ready to trash those tennis balls… DON'T. There are many different uses you can find for them, from donating them to fluffing up laundry. Recycle them using these 7 helpful tips. You Will Need * Trailer hitc ...more

How To : Restore a deleted file on your computer

Oh no! You've just accidentally deleted an important computer file! Have no fear. When you delete a file on your computer, it is not necessarily destroyed. This video will show you how to search for and restore your file before it is lost forever. You Will Need * A PC or Mac c ...more

News : Foreign Countries

International Pet Travel: Taking Your Pet Animal to a Foreign Country If you are taking a pet to another country (permanently or for a visit), contact that country's consulate or embassy for information about any requirements that you must meet. A list of consulates can be fo ...more

How To : Create your own ringtone on an iPhone

If you're tired of the boring old ringtones on your iPhone but don't want to shell out extra dough to buy a new one, here's an easy way to make your own. WARNING: This process will not work with DRM-protected songs – songs downloaded from the iTunes store before April 2009. S ...more

Changing Positions : Flip Flopping

Politics(the Government) is built to accomplish a few things: maintaining order, providing necessities, operating businesses (stimulating the economy, trade), maintaining public relations and the most important of all, protecting the rights of the individuals it governs. It ha ...more

The League : Intro

Author's Note: Hi there, some of you may know but most of you probably won't. My name is Semeria and I am an author on the rising. I plan to be posting one of my novels on this website for people to read. Comment and let me know what you think and I hope you enjoy the story. ...more

How To : Hack WPA WiFi Passwords by Cracking the WPS PIN

A flaw in WPS, or WiFi Protected Setup, known about for over a year by TNS, was finally exploited with proof of concept code. Both TNS, the discoverers of the exploit and Stefan at .braindump have created their respective "reaver" and "wpscrack" programs to exploit the WPS vul ...more

How To : Become Anonymous on the Internet Using Tor

The internet is a scary place, and if you're like me, you don't want anyone tracking you or learning your search habits. It's a blatant invasion of privacy for companies to do this, but at least we have methods of fighting back—one of which is Tor. Tor stands for The Onion Ro ...more

News : Google+ Updates Name Policy—Still No Pseudonyms

As Google+ became available to more people, it started running into issues of accounts being suspended due to names that did not sound "real". According to Google+'s community standards, names that users "commonly go by" were encouraged, but not pseudonyms. Those who were usin ...more

Prev Page
  • Hot
  • Latest