Numbers

See Jane Pwn : A Primer for Internet Slang

Making your way into an online community can be really exciting. Some life-long friendships and lasting romances begin in humble chat rooms and message boards. But for the novice internet user, one of the biggest hurdles can be trying to figure out just what people are saying ...more

How To : Fish for bass using a plastic jig worm

What's a jig worm? Well, it's exactly what the name implies: a jig rigged with a trailing plastic worm. If you're not a seasoned fisherman, the answer might not have been so obvious, but that doesn't matter when you find out how important this jig worm is. Wade Bourne of MyOut ...more

How To : Ease travel with iPhone travel apps

Super Fly Life brings this iPhone, three-part, traveling video tutorial to teach you how to ease travel with iPhone travel apps. You could even double your dating experience with these time saving applications on the Apple iPhone. Some of them are free from the Apple Store and ...more

How To : The Messaging Trick You Never Knew You Needed

Whether you're wielding an iPhone, iPad, Mac, Android phone or tablet, or even a Windows PC, this little-known secret holds the key to effortless assistance and unwavering obedience. Intrigued? I thought so. Let's say a friend or family member needs the email address of someb ...more

How To : Count from 1 to 10 in Klingon

Admit it: you're a die-hard Star Trek fan at heart. And you know that the best aliens in Star Trek are the Klingons. This video will show you how to count in Klingon. There's English subtitles, but pay attention to the pronunciation! Once you learn these Klingon numbers, go ah ...more

How To : Watch the 2012 London Olympics Online (Legally)

Later today, the Olympics are kicking off in London on NBC and its partner stations. However, if you don't have cable or a television with some good reception—or if you'd rather just follow the events on-the-go or at your desk—you're not out of luck. Photo by Locog Watch a Li ...more

News : Understanding Modern Cryptography: Public Keys

Last time, we looked at archaic cryptography, so you should have a basic understanding of some of the concepts and terminology you'll need. Now, we'll discuss one of the most important advances in computer security in the 20th century—public key cryptography. What Is Public K ...more

How To : Simplify Square and Cube Roots

Whenever you simplify a square root or a cube root you are writing them in the simplest form. This video teaches a factoring method. The factoring method Involves factoring the numbers under the radical. If the problem is a square root look for pairs, and for cube roots look ...more

How To : Use repeat (REPT) function in Excel

There are many functions in Microsoft Excel. One function that people rarely use is the Repeat function or REPT. In this video, an example used is a chart of people and their sales of a certain item. Just looking at the numbers, it is hard to compare the different sales easily ...more

How To : Detect counterfeit money

Look at the money you are receiving. Carefully inspect it for any strange colors, marks, or texture. Do not assume that a different color, texture, or design is simply a mistake made at the treasury. The bills there are all made the same based on the denomination. Compare the ...more

News : In a Rare Moment, Pixel's Sales Figures Are Revealed

Savor this moment: we've got a confirmed number of sales for the Google smartphone. We say this because unlike most hardware manufacturers, Google refuses to share official sales numbers for their phone. Instead, during earning reports they simply bundle the product under Alp ...more

How To : Add symbols and emoticons to your text on Facebook

Here we learn how to insert secret symbols from your keyboard onto Facebook or any other regular program. This only works on PCs, sorry Mac users! By holding down the alt key and pressing numbers on the keypad from 1-9 and beyond, we discover there are many different symbols t ...more

How To : Rename Multiple Files at Once in Mac OS X Yosemite

With the sheer amount of photos, videos, and miscellaneous files we place on our computers, proper organization becomes necessary. Not only so that we can quickly get to a file when it's needed, but also to declutter folders and keep them from looking like random file dumps. ...more

How To : Call internationally from a cellphone

Call internationally from a cell phone This video by howtocallinternational.com demonstrates how to call any international number using a several cell phones, each phone uses a different method to dial an international number. The phone brands Nokia, Motorola, Sony Ericsson, ...more

How To : Knit Ribbing

The two basic stitches in knitting are the Knit Stitch and the Purl Stitch. Once you know how to do both of them you can put them together to make RIBBING. RIBBING is usually, but not always, used at the bottom of a garment, as well as at the cuffs and at the neck. It's also a ...more

News : Facebook Privacy Settings

You could read through Facebooks Privacy Guide, but I found it a little confusing and a lot of people have been asking me for specific settings. SO here are some screenshots of the privacy settings so you can find where everything is located really easily! Click privacy setti ...more

News : New Map Shows Where Zika Mosquitoes Live in the US

As summer heats up, new maps from the Centers for Disease Control and Prevention (CDC) gives us our best guess at where Zika-carrying mosquitoes could be hanging out this year in the US. The Zika virus is a potentially serious virus carried by mosquitoes. As of June 2017, the ...more

News : The Future of Augmented Reality Mainstream Adoption

What does mainstream augmented reality look like? I'm not talking about the stuff you see in concept videos and science fiction films. No. What does it really look like? If you ask anyone working within the AR space today, the future of AR is wherever the immediately realizab ...more

How To : Use Excel data analysis filter & dynamic ranges

We're on sheet, tab, filter. We want to talk about filter, but we also want to talk about an Excel table or list. It is simply a data set with field names at the top, records in rows, no blanks anywhere and no other data sets touching this data set. When we convert to a table, ...more

How To : Perform a matchstick equation bar trick

This how-to video demonstrates a stumper of a puzzle‚ using only 4th grade math. Effect: Using matches (or in our case - toothpicks), create the incorrect math equation 1+11+111=1111. Then challenge your friend to move only 1 match and make the equation true. Make sure to poi ...more

News : A Brief History of Hacking

Welcome back, my fledgling hackers! Hacking has a long and storied history in the U.S. and around the world. It did not begin yesterday, or even at the advent of the 21st century, but rather dates back at least 40 years. Of course, once the internet migrated to commercial use ...more

How To : Security-Oriented C Tutorial 0x01 - Hello, World!

Welcome back, reader! In this tutorial, we will be covering our first program! So let's get to it. We all know the unspoken tradition of the first program when learning a language and of course, here we will respect and complete it. Fire up your favorite text editor (be it vi ...more

How To : Find the median & inter-quartile range

This video shows us the method to find the median and the inter-quartile range. The first step involves the arrangement of the numbers in the ascending order. Median is the middle number. The middle number is the number at (number of numbers + 1)/2 if the number of numbers is ...more

News : Palm-Sized Pentakis Dodecahedron

I finally got around to making the pentakis dodecahedron from the instructions in Math Craft admin Cory Poole's blog post. It's not tightened/straightened up yet because I just noticed that I have two black and white and two blue and green compound modules next to each other ( ...more

How To : Return a Lost iPhone to Its Owner Using Siri

I misplaced my iPhone 6 just a few weeks ago, so I know firsthand that losing an iPhone sucks. Luckily, my tale didn't have a bad ending. While at a bar, I went to use the restroom and mistakenly left my iPhone on an unguarded chair. When I returned, it was gone. Admittedly, ...more

How To : Apply conditional formatting within MS Access 2010

lyndapodcast teaches you how to apply conditional formatting withing Microsoft Access 2010. You click View - Design View. Click the Total tab and you'll notice some highlighted options above. Click Format and then Conditional Formatting. This where you will create rules. Click ...more

How To : Introduction to Modern Cryptography

Cryptography is the science of keeping secrets, or more specifically, the science of disguising them. As a point of fact, cryptography has progressed quite a bit farther and now encompasses file and message integrity, sender authentication, and pseudo-random number generators. ...more

How To : Make a Christmas countdown chain with your kids

In this video tutorial, viewers learn how to make a Christmas countdown chain. The materials required for this craft are: construction paper, paper cut into small circles, glue and marker (optional). Begin by cutting the green and red construction paper into even strips. Users ...more

How To : Encrypt Your Sensitive Files Using TrueCrypt

Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm ...more

  • Hot
  • Latest