Access Educational Search Results

How To: Disassemble an Acer AspireRevo nettop PC

In this how-to video, you will learn how to disassemble an Acer Aspire Revo. First, unscrew the screw on the side of the laptop. From here, you must pull the top cover with the logo apart. This will be tough, but eventually it will be come off. A prying tool may be useful for this task. Now you will have access to the hard drive, RAM, CPU fan, processor, and wireless card. Now you are ready to perform any upgrades or repairs on your Acer Aspire. This video shows you the essential steps in ord...

How To: Configure a router for Wifi

Llewyn demonstrates how to configure your router for Wifi. Access the router by opening up your internet browser and typing in your router's IP address. That will bring up the router configuration page. Now, click on the wireless tab. You can set the wireless network mode to accommodate your computers. As a precaution, set the mode to mixed for greater flexibility. Set your wireless SSD broadcast to enable which will enable your wireless card to actually see the webpage and the internet. You ...

How To: Create an automator workflow to upload to Flickr

Learn how to create an automator workload that will upload pictures to your Flickr account in this video tutorial. Simply Google "automator Flickr." Upload it to Flickr to allow access to your Flickr account. This means you will have to sign into Flickr and allow for the application to have access to your account. Every time you use the application, you will have to give the photo a title as well as tags. You will then save the photo as an application with whatever title you want. Anytime you...

How To: "Grab" flash files from websites

In this video tutorial, viewers learn how to grab flash files (.swf) from websites. Begin by going to the website and locates the flash file that you want. Right-click on the page and select "View Page Source". Go to the Media tab and copy the URL that ends with .swf. Paste it into your address bar and go to the site. Click on File and select Save Page As. Choose the location, name the file and select Save. The file will download and you will be able to access it whenever you want. This video...

How To: Password protect and hide your folders on Mac OS X

Watch this video for a helpful tip on how to use secret folder application and protect folders in your MAC PC by hiding it. you could download secret folder application from version tracker.com for free go to the Website and click download button to download the application on your Mac PC open the secret folder application. click on the required password button, put your desired password and re enter to confirm. to access your file, click the plus button at the lower left. choose the desired ...

How To: Set up the internet on your PS3

Learn how to setup internet connection on your play station 3 in simple steps. First take any wireless enabled router and to find if its wireless check if the router has an aerial. Now go to 'Settings' in your PS3 and select the network settings option. Enable the internet connection, go to connection settings, select custom method and then select the wireless option. Now scan for any access points, go through and set all the settings according to your router. Finally save the settings and te...

How To: Jacmel crochet a granny square

In Access 2010 you can now create a navigation form (like a home page) for your database without writing a single piece of code or logic! Great for busy people who need to organize their database quickly, but who don't have code writing skills. It's just drag and drop. There are predefined layouts which help you design the form and then simply drag the information you want into the form. Reports can be added and accessed quickly from the navigation form so you can analyze the data simply and ...

How To: Take apart your G1 HTC T-Mobile phone for repair

In this video we learn how to disassemble a T-Mobile G1 HTC phone for repair. First you want to make sure to wear an ESD wrist strap and make sure it's secure around your wrist. Then remove the battery from the device. Next unfasten the screws from the back of the housing on the G1. Then separate the housing from the device and then the speaker from the housing. Next unplug the UMTS cable and the GPS coaxial cable. Then remove the UMTS board and GPS boards from the device. Then disconnect the...

How To: Determine if someone's lying via Visual Accessing Cues

This video demonstrates how you can tell if someone is lying using visual accessing cues. This is a sample video of Kelley Moore teaching for a breakthrough collaborative application. She uses basic psychology terms to aid in understanding when someone lies. A sample visual cue for lying is to notice the eyes. If someone is lying, their eyes would twitch or unconsciously shift to the left side. If you follow the steps in this video, you'll be able to notice when someone is lying to you.

How To: Get around site blockers at school to view MySpace

You want to use the websites you want to use, regardless of any school blocks or other hindrances, so how? This video tells us by using the IP addresses of your favorite sites. To find this IP address, at your home, or an other unblocked location, in your start menu, you must access Programs, then Accessories, then Command Prompt. When the window pops up, then type in "Ping http://www.myspace.com" without the quotations, for instance. Write down, then, the string of numbers that appears, whic...

How To: Create and start a group on Facebook

This video is about creating a group on Facebook. Groups on Facebook join friends and people with similar interests. Go to the dialog box and choose groups, create new. You then bring up the form. Choose a name and describe the name. Scroll down and choose the group type. Click create group. You can also add a photo of the group. Scroll down and choose enable photo, video or links. Then you decide who has the responsibility for making changes to the group-members or an administrator. Decide w...

How To: Set up an Airport Extreme for outside computer access

This simple video tutorial explains how to use Airport Utility to configure your Airport Extreme so you can access your Apple computer remotely for file and screen sharing. It explains how to setup DHCP IP reservations and port forwarding using Manual Setup option of the Airport Utility. Considering that the tutorial becomes a little bit technical during the second part, this tutorial is aimed at users who already have at least some knowledge and/or experience setting up a network. Absolute b...

How To: Get on a site that's been blocked by your employer

Don’t you just hate it when you try to go on a website while you’re at work—and find out your boss has blocked it? Here’s how to thwart The Man. With these tips, you'll be able to check your facebook or myspace at work (or whatever sites your employer may be blocked). All you need is access to google. Did you know? According to one survey, 78% of employers block employee access to pornography, 47% block gambling sites, 20% block shopping and auction sites, and 4% block news sites.

How To: Use the ActiveX Opt-In feature in Internet Explorer 7

Web browsers such as Windows Internet Explorer 7 have become an important part of the computing experience for business and home users around the world. With the popularity of web browsers for accessing information, running programs, and even accessing corporate resources, the browser has become a target for viruses, malware, and phishing schemes that present real dangers to Internet users. Microsoft Internet Explorer 7 has several new features that make using the web easier and safer than ev...

How To: Use the protected browsing mode in Internet Explorer 7

Web browsers such as Windows Internet Explorer 7 have become an important part of the computing experience for business and home users around the world. With the popularity of web browsers for accessing information, running programs, and even accessing corporate resources, the browser has become a target for viruses, malware, and phishing schemes that present real dangers to Internet users. Microsoft Internet Explorer 7 has several new features that make using the web easier and safer than ev...

How To: Build a rolling tool cabinet

So many bench-top style tools are available today it's easy to accumulate several, including table saws, jointers, sanders, scroll saws, planers and others. With either purchased or shop-made individual stands, the tools can take up a lot of room. In this video tutorial, you'll learn to build a roll-around tool cabinet that can easily be rolled out for access to a variety of tools placed on top. It features a large bench top with locking rollers, and a huge storage cabinet beneath, which prov...

How To: Detect browser capabilities in ASP.Net web pages

In this video tutorial, Chris Pels will show how to determine what capabilities a user’s browser has when viewing pages in an ASP.NET web site. First, learn how to access an instance of the HttpBrowserCapabilities object from the ASP.NET Request object associated with the web page request. Next, see the different information available in the HttpBrowserCapabilities object such as the type of browser and whether the user’s browser supports JavaScript and Cookies. Then see an example of how to ...

How To: Bypass your router to access your server

This video discusses how to bypass your router to access your server. In the search window type in CMD to open up a command prompt. Then type in ipconfig to bring up the ip configuration. You want to look for the ip address for the default gateway and the one for your computer. They should both start with 192.168. Once you find them open up internet explorer and type in the ip address for your default gateway and it should then prompt you for a user name and password. Log in and look for a po...

How To: Change the accessibility options in Windows 7

This video teaches how to change Windows 7 accessibility options. Choose Start, Control panel. This opens the Control Panel window. Choose Ease of Access in the control panel window. This opens Ease of Access window. Inside the Ease of Access window, there are various links that allows you to set various accessibility options in windows 7. You can use these settings for options like "Optimizing Visual Display", "Replace sounds with visual cues" and you also have settings to choose how the way...

How To: Gain access to the water pump on a Saturn S-Series car

One day, your car may break down and you won't be able to afford to hire a mechanic, so what do you do... you look on the web for some how-to vehicle repair videos and become your own car mechanic, that's what. You don't need any advanced training to perform repairs and simple maintenance on your automobile, but you may need a few tools. Invest in the basic tools and you'll be prepared for just about any car malfunction you can think of. These tutorials will help get you on your way, as long ...

How To: Browse Privately & Securely with This VPN

If you're looking to improve your browsing experience, then a VPN is the right way to go. If you're tired of censored or geographically blocked sites and wary of companies selling your data, then a good VPN can be your answer to a problem that limits every aspect of your experience online.

How To: Android 10 Drastically Updated Location Permissions — Check Your Settings ASAP

With Android 10, there are now three options when an app asks to access your location: Allow, Deny, and Allow While In Use. That last one prevents apps from seeing your location unless you're actively using them, and it's the default now. But when you first update, most of your apps will still be allowed to access your location in the background — at least, until you do something about it.

How To: Open Previous Drafts Faster in Your iPhone's Mail App — From Any Mailbox or Folder

All of your partially written, unsent emails live in your "Drafts" folders, in limbo until the day they are sent off or deleted. In Apple's Mail for iPhone, you can access all drafts from all accounts in a combined "All Drafts" folder from the app's main Mailboxes list — but only if you added it manually. But there's an even better way to access all of your drafts in Apple Mail in iOS; it's just not obvious.

How To: All the Privacy & Security Settings You Should Check on Your OnePlus

One of the best things about Android is the ability to customize every aspect of your device to make it your own. However, unless you have prior knowledge or experience with every single setting available to you, you might have missed a few critical features without even knowing it. Some settings are easy to find, while others might be tucked away in another menu of their own.

How To: Set Up Instagram Recovery Codes So You Can Always Access Your Account with 2FA Enabled

Two-factor authentication (also known as 2FA) adds a necessary additional layer of security to your username and password in many important apps. On Instagram, 2FA requires you to confirm it's you attempting to log in, with a special code sent to you via text message. Enter the code and you're in ... but what happens when you need to log in and don't have access to your phone?

How To: Root Apps Not Working with Magisk? Here's What to Do

It's the icing on top of your cake (or whipped cream on top of your Android Pie) of despair. You may have not had the easiest time rooting your device, but you feel like you overcame all of the obstacles. Only now to discover that those very apps and mods you were rooting for still won't work — and the signs point to a lack of root access. Don't lose hope, because we have some tricks up our sleeve.

How To: Use SSH Local Port Forwarding to Pivot into Restricted Networks

SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port forwarding, secure file transfer, and more. Using SSH port forwarding on a compromised host with access to a restricted network can allow an attacker to access hosts within the restricted network or pivot into the network.

How To: Create an Evil Access Point with MitmAP

The threat of an evil access point has been around for a long time, and with the rise of open public Wi-Fi, that threat is often overshadowed by how comfortable we are using third-party Wi-Fi hotspots at coffee shops and public spaces. While we've shown an evil twin attack using the Aircrack-ng suite of tools, MitmAP is a Python tool to configure custom APs for many types of wireless attacks.

How To: Change These Settings Now to Protect Your Data in Case Your Phone Is Stolen

As smartphone users, we live in dangerous times. The value of phones continues to rise, making them prime targets for thieves. In 2015, the FCC estimated that one million phones are stolen each year, and with several devices starting to hit the $1,000 mark now, these numbers are sure to rise. But what do you do if you fall victim to phone theft?