Most of the most important information in the world is stored on computers, and if your part of it gets deleted in some way you're probably in trouble. There are lots of data recovery options out there, and this video will show you how to figure out what sort you need for your ...more
This video is regarding air conditioner services. Leaks are a major cause of problems. Water and air can leak into the system. Water damage, rust and refrigerant leaking all make the unti ineffiecient. You should evaluate the unit regularly and also run it periodically to keep ...more
Netflix releases monthly reports on major ISPs relating to how well their service works on each provider. The purpose is to educate the public on their choice of service provider, but since many of us hardly have any choice at all when is comes to an ISP, it backhandedly works ...more
In this clip, you'll learn how to call web services over HTTPS when working in Silverlight. Whether you're new to Microsoft's popular web application framework or a seasoned web developer merely looking to improve your chops, you're sure to find benefit in this free MS Silverl ...more
Using ASP.NET Secure Services and Applications Services In this video, Tim Heuer demonstrates two important features of Silverlight and ASP.NET, using secure web services and using ASP.NET application services from within Silverlight. This demonstration walks through securing ...more
This tutorial shows you how to build web services with MapForce. Load an existing WSDL file and build a complete web service by retrieving data from databases or XML files and using a visual function builder. It's easy to build web services in MapForce as this tutorial shows.
In this clip, you'll learn how to selectively enable or disable a service on a desktop or laptop computer running the MS Windows Vista operating system. For more information, including a complete demonstration of the process and detailed, step-by-step instructions, watch this ...more
Every so often, a big site will make a change to its terms of service that's not so great for its users—without even informing them—and they (understandably) get really pissed off. Recent examples are Facebook's and Instagram's changes, which resulted in user backlash. They'l ...more
In this clip, you'll learn how to automate the process of resizing and attaching images for and to emails on an Apple computer running Mac OS X. It's easy! So easy, in fact, that this home-computing how-to can present an overview of the process in just over two minutes' time. ...more
There are many considerations to make when choosing a web hosting plan. Storage space, performance, security, and reliability all matter. The cheapest option isn't always the best idea. StartHost covers all the bases. With a lifetime subscription, you'll get access to its pre ...more
You're hiking up a beautiful mountain when all of a sudden you remember it's your mother's birthday. You begin to panic—you forgot her birthday last year, and you know if you don't say something soon, you're as good as dead. But there's a problem—amongst a beautiful landscape ...more
In this clip, you'll learn how to make a call to a web service when working in Silverlight. Whether you're new to Microsoft's popular web application framework or a seasoned web developer merely looking to improve your chops, you're sure to find benefit in this free MS Silverl ...more
You may or you may not have your domain name at the same web hosting company. Most web hosting companies can give you a free domain or two just by subscribing to their service. If you happened to register your domain somewhere, say from GoDaddy, and would like to subscribe to ...more
Jonathan Ginsburg shows you how to sing the Shabbat Torah service in Hebrew.
The name of your business will leave an impression on people as this is probably the first information they will receive. Make sure to express yourself and give the impression you intend by choosing the best name for your business. Although a great name won’t save a failing b ...more
Interested in optimizing OS processes in your Win 7 install? With the SMART tool, it's easy! So easy, in fact, that this home-computing how-to from the folks at Britec can present a complete overview of the process in just over seven minutes. For more information, including st ...more
In a bad economic environment, providing a great customer service experience is even more important than normal. Word of that great experience will spread via Twitter and Youtube, helping your business attract buzz without requiring it to spend cash on marketing. This video fe ...more
Not sure how to plan a funeral? A well-planned memorial service honors the deceased and comforts those who are grieving. Learn what steps to take when planning a funeral in this how-to video. What you will need: • Consideration • Friends and family of the deceased • A venu ...more
Just some suggestions and roughly the way I handle calls. There is more than one way to do this and every call is different. Enjoy!
Interested in better integrating Mozilla Firefox with your favorite Google Services (like Gmail, Reader and Maps)? It's easy! So easy, in fact, that this home-computing how-to from the folks at TekZilla can present a complete overview of the process in just over two minutes. F ...more
MY MULTIPLY.COM SITE IS: HTTP://WWW.STANDP.MULTIPLY.COM/ I HAVE QUITE A FEW PICS IN MY PHOTOS SECTION, SOME BLOG ENTRIES, BUT I HAVE NOT DID ANYTHING IN MY MULTIPLY.COM WEB PAGE IN MANY MANY MONTHS, THE ONLY THING I PLAN ON DOING TO ADD TO IT IS TO FINISH SCANNING THE REST O ...more
A successful startup needs more than a good idea. To get your startup off the ground, you need to know how to make a plan, fund it, and market it. Trying to learn how to do all of that on your own is impractical and unnecessary. Startups.com Unlimited: Lifetime Subscription i ...more
In this clip, you'll learn how to get started using Secure Computing's Secure Web Protection proxy service. It's easy! So easy, in fact, that this helpful how-to can present a complete overview of the app in just over five minutes. For more information, including detailed, ste ...more
If you own your own business, no matter how efficient it is, you probably field complaints from customers. Dealing with these complaints, and using the information therein to improve your company, can be stressful and challenging. This video features a business expert outlinin ...more
SQL Server Reporting Services allows you to design and deploy nicely formatted and interactive reports representative of your data. Suitable for print or online distribution, these reports and it allows you to get professional results very quickly. This video demonstrates how ...more
Healthcare providers have unique desktop environments that range from "Workstations on Wheels" to nursing stations in high-traffic areas, to patient registration kiosks. Providers face considerable challenges managing and updating the desktop software and hardware while keepin ...more
When you bundle all three services you are able to save a lot of money, but we are told this is only for the first year and then rates go back up again. -85% of bundle users say they would like to do this again if given the chance. -To save you can switch carriers or negotiate ...more
I have always wanted to mess with people's heads, at those self-service registers. They have computerized voices, so add a hidden speaker, and then talk to each individual shopper and freak them out with personalized insults about their clothes, purchases, etc.
New to eBay? Don't worry, setting up an account and buying and selling doesn't take that much effort at all. Everyone who has an Internet connection has at one point come across eBay, to find the perfect gift for their loved ones, to find the cheapest deals on plasma televisio ...more
Colombian authorities are probing whether any of the women involved in the prostitution scandal that’s cost six Secret Service agents their jobs were underage, according to a new report. Investigators from the Colombian attorney general’s office have talked to employees of th ...more
Afghan officials and witnesses say a U.S. service member walked off his base and shot and killed at least 16 Afghan civilians in Kandahar province Sunday. The shooting is the latest in a string of incidents to further strain Washington and Kabul’s already tense relationship. A ...more
You've probably connected your Android device to dozens of Wi-Fi networks since you've had it, and your phone or tablet remembers each of them. Whether it's a hotspot at home, school, work, the gym, a coffee shop, a relative's apartment — or even from a friend's phone — each t ...more
A spare key is one of those things that never seems like a huge deal until you need it. If you've ever lost your keys, had them stolen, or locked yourself out of your house or car, you know how difficult and embarrassing it can be trying to get your door open. So, how would y ...more
There are quite a few flaws with Apple's mobile products, and one that drives me crazy is their reliance upon iTunes for all your music syncing needs. If you want a song on your iPhone, you pretty much have to use iTunes to get it on there. Either that or buy it directly from ...more
When browsing the web, I enjoy my privacy. It's reassuring that I can peruse the internet without the worry of having my activity tracked back to me, allowing me to leave fun, anonymous comments when I get the urge to troll. Anonymity can also be important when sending a mess ...more
Downloading YouTube videos for offline use to watch later has always been a problematic endeavor. Dedicated third-party apps don't last long in the App Store, web-based converters aren't very functional on mobile, and rogue apps outside the App Store are tricky to sideload and ...more
Apple Pay has been available to use in stores, as well as in select apps and websites, ever since its first appearance in iOS 8.1. Now, with iOS 12, there are currently 13 different iPhone models that support Apple Pay functionality without the use of an Apple Watch, and the l ...more
If you somehow forgot the pattern, PIN, or password that locks your Android device, you might think you're out of luck and are destined to be locked out forever. These security methods are hard to crack by design, but in many cases, it's not entirely impossible to break into a ...more
Do you ever wonder how all these celebrities continue to have their private photos spread all over the internet? While celebrities' phones and computers are forever vulnerable to attacks, the common folk must also be wary. No matter how careful you think you were went you sent ...more
Unless you have unlimited cellular data, you probably connect your iPhone to every Wi-Fi network you come across. It could be a local coffee shop, public library, or just a friend's place. Wherever it is, you'll need to ask for the access point's password if it's a secured net ...more
Besides obvious features like a touchscreen and biometric sensors, the modern smartphone comes with an array of state-of-the-art hardware in the form of various sensors that help your device sense the environment around it. And if you have a Samsung handset, chances are, you h ...more
When you think of an online music service nowadays, Spotify is probably near the first that come to mind, and for good reason. Being able to create, share, and take all of your playlists anywhere, across all of your devices, is something that I couldn't live without. Unfortuna ...more
Why unlock your Samsung Galaxy S3 to use with a different SIM card? One possible reason is that you love your phone, but not your cellular provider because of the poor service or an unreliable connection. If you purchased a Samsung GS3 with AT&T, T-Mobile, etc. on a contract, ...more
Unruly customers. Crazy exes. Horrible bosses. When you need proof of insanity or just want it for your records, recording a phone call is a must. Problem is, it's not the easiest thing to do on an iPhone — but it's completely possible. Even though there are plenty of legit r ...more
While iOS 11 is ready to take over your iPad, iPhone, and iPod touch, let's take a step back and check out all of the new features that iOS 10 brought to the public when it was released to everyone in Sept. 2016. Some of the updates from iOS 9 to iOS 10 were huge, as you'll s ...more
Smartphones are inherently bad for privacy. You've basically got a tracking device in your pocket, pinging off cell towers and locking onto GPS satellites. All the while, tracking cookies, advertising IDs, and usage stats follow you around the internet. So no, there's no such ...more
If you're in the market for a non-root ad-blocker, developer Julian Klode has an app that you'll definitely want to check out. It uses Android's VPN system in a similar manner to alternative apps like NetGuard and AdGuard, but it's got a new twist that should save lots of batt ...more
Caller ID is great to have, but there are certain situations where you don't want the person you're calling to have your number. People who sometimes use their personal phones for work may not want clients knowing where to reach them outside of work, and anytime you're dealing ...more
The iPod changed the music and electronics industries when it was first introduced way back in 2001. It is credited with ushering in the age of "connected devices," and has held a huge market share of around 70% for years. At the height of its popularity, the iPod made up almo ...more
Whether you drop your iPhone into a toilet or your dog's water bowl or regularly take it into the shower or pool, water will likely become nestled inside its speaker grilles. Water exposure causes audio playback through the speakers to soften and sound muffled, and getting tha ...more
School internet filters serve a valid purpose—they keep students from wandering off into the deep corners of the web while still allowing at least some internet access. But a lot of these restrictions are completely ridiculous, to the point where some school districts block ac ...more
Before attacking any website, a hacker or penetration tester will first compile a list of target surfaces. After they've used some good recon and found the right places to point their scope at, they'll use a web server scanning tool such as Nikto for hunting down vulnerabiliti ...more
Welcome back, my neophyte hackers! I have already done a few tutorials on password cracking, including ones for Linux and Windows, WEP and WPA2, and even online passwords using THC Hydra. Now, I thought it might be worthwhile to begin a series on password cracking in general. ...more
Depending on who you ask, internet connectivity should be a basic human right. With Google recently embarking on a project to provide internet capabilities to remote corners of the world using balloons and satellites while Facebook attempts to do the same with unmanned drones, ...more
Throwaway phones aren't just for seedy criminals and spies—they can be useful for many everyday situations. For example, you don't necessarily want to give your real phone number out to strangers when you're buying or selling something on Craigslist, managing an Airbnb listin ...more
Cracking the password for WPA2 networks has been roughly the same for many years, but a newer attack requires less interaction and info than previous techniques and has the added advantage of being able to target access points with no one connected. The latest attack against t ...more
With a root bounty of over $18,000 up for the taking, developers were highly motivated to get the AT&T and Verizon Wireless variants of the Samsung Galaxy S5 rooted. Legendary hacker George Hotz, aka Geohot, has won the race and can now step up to claim his prize. Hotz is not ...more
Your IP (Internet Protocol) address is your unique ID on the internet. It's synonymous with your home address. Anyone in the world can contact your computer through its IP address, and send a retrieve information with it. I'm sure at one time or another you've heard that hack ...more
The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, ...more