Actively Involved Search Results

How To: Solve a Rubik's Cube puzzle

Learn how to solve the infamous Rubik's Cube. Yes, that's right, watch this three-part video tutorial to see how you can solve Erno Rubik's Magic Cube, now known as the Classic 3x3 Rubiks Cube. Learn the notation and the algorithms involved.

How To: Make a beaded baby frog

This how to video shows you the step by step process of making a baby beaded frog. This is easy and fun activity to do with your kids. Beading is a great way to introduce your children to the creativity of arts and crafts. This is a good project for older children because it does involve small beads that can be swallowed. With this how to video you will be able to teach your children how to make a beaded frog.

How To: Apply acrylic nails

In this 5 part manicure tutorial you will learn how to apply acrylic nails. This process is quite involved and a bit difficult so it will take a lot of practice. Watch this 5 part how to video and you can apply acrylic nails in your own home.

How To: Solve the fifteen number puzzle

During the video tutorial, you'll learn how to simply solve the easy and fun fifteen number puzzle. You'll learn a couple different moves to help you solve the 15 puzzle, which are called the curl and the box and twist. The curl is easy, but the box and twist is a little more complicated.

How To: Do a Jitterbug dance routine

The Jitterbug is a popular swing dance, also known as the Lindy Hop and East Coast swing. This how to video demonstrates a Jitterbug dance sequence. These steps are quick and easy to learn. The routine involves the Texas Tommy step, the left side under-arm turn, the left side waist turn, the tuck turn and the right side under arm turn. Watch this dance tutorial and you will be doing the Jitterbug in no time.

How To: Solve simple interest algebra problems

In this math lesson we will learn how to solve problems involving simple interest. When you deposit money in a savings account, the bank pays you interest at a certain rate called interest rate. There are two types of interest: simple interest and compound interest. In this lesson we will talk about simple interest. We will use the following important formula:

How To: Walkthrough Shank on the PlayStation 3

If you like 2D side-scrolling video games, then Shank's your man. Shank is full of "beat 'em up" action and combat, perfect for any gamer addicted to the old style of play. Shank is available on both the Xbox Live Arcade (Xbox 360) and PlayStation Network (PS3). But this Mahalo walkthrough for Shank is for the PlayStation 3.

How To: This HomePod Setting Keeps Other People Out of Your Notes, Reminders & Calendar for Good

HomePod and HomePod mini are excellent smart speakers if you're entrenched in the Apple ecosystem. They even offer ways to protect your sensitive information from friends and visitors who try to ask Siri to spill your secrets. But there's an extra layer of privacy you can put in place to make sure nobody gains access to any important notes, reminders, and calendar events.

How To: Have You Pressed This Little Button in Your Galaxy's Volume Panel Yet?

With Samsung's One UI 3.0 update, the main on-screen volume slider has a little menu button on the top of it. Tapping this will expand the slider into a full-blown volume panel, complete with controls for all of the various types of sounds your Galaxy might make. Standard stuff, really, but there's more to it.

How To: Your iPhone Can Switch to Dark & Light Modes Automatically When the Sun Sets & Rises

Apple's Dark Mode in iOS 13 and later offers a cool, comfortable viewing experience on your iPhone. You may prefer the dark theme all day long, but if you like to use it only at night, it's not very convenient to switch it on and off daily. But there's a setting that lets you set it and forget it, so you never have to do it manually again.

How To: Spy on SSH Sessions with SSHPry2.0

SSH, or the secure shell, is a way of controlling a computer remotely from a command-line interface. While the information exchanged in the SSH session is encrypted, it's easy to spy on an SSH session if you have access to the computer that's being logged in to. Using a tool called SSHPry, we can spy on and inject commands into the SSH sessions of any other user logged in to on the same machine.

How To: Pixel 4 Bootlooping After Installing a Magisk Module? Here's How to Fix It Without TWRP

TWRP won't be ready for the Pixel 4 and 4 XL until months after release. But since you can already root with Magisk and tinker with the OS, you might find yourself in a situation where your phone won't boot, yet you don't have a custom recovery installed to fix it. Luckily, there's still a way around this.

How To: Use Google Search Operators to Find Elusive Information

Google is an incredibly useful database of indexed websites, but querying Google doesn't search for what you type literally. The algorithms behind Google's searches can lead to a lot of irrelevant results. Still, with the right operators, we can be more exact while searching for information that's time-sensitive or difficult to find.

How To: Manipulate User Credentials with a CSRF Attack

Web 2.0 technology has provided a convenient way to post videos online, keep up with old friends on social media, and even bank from the comfort of your web browser. But when applications are poorly designed or incorrectly configured, certain flaws can be exploited. One such flaw, known as CSRF, allows an attacker to use a legitimate user's session to execute unauthorized requests to the server.

How To: Protect Your Identity After the Equifax Cyberattack

Equifax reported on Sept. 7 that it discovered a breach on July 29 which affects roughly half of Americans, many of whom don't realize they have dealings with the company. Hackers got away with social security numbers, addresses, and driver's license numbers, foreshadowing a "nuclear explosion of identity theft." Let's explore what really happened and what you and those around you can do to protect yourselves.