Adwords Program Search Results

How To: Use Vonage anonymous call blocking feature

If you are looking for a way to prevent telemarketers and nothing else is working, consider signing up for Vonage's call blocking feature. In this tutorial, brought to you straight from the professionals at Vonage, learn how to set your phone to block any incoming call without a number attached to it.

How To: Restart Windows OS without rebooting your computer

This how to video shows you how to restart Windows without rebooting the computer. Press control, alt, and delete on the keyboard at the same time. Your task manager program will open. Select processes and click image name to sort it. Select explorer.exe and press end process. Click yes in the warning dialog. Your start menu will disappear. This is usually bad considering you cannot do anything when this happens. Go to file and select new task. Click browse and click on any folder and right c...

How To: Sync iTunes on your Droid

If you're like most people, the only music program you want to deal with is iTunes. But you can't use your iTunes music unless you have an iPhone, right? Wrong! Don't go around thinking you need an iPhone to use iTunes on your mobile device. You can sync up iTunes with your Motorola Droid too! This video tutorial will show you how to sync iTunes on your Droid.

How To: Upgrade from Windows XP to Windows 7 with CNET

In this Computers & Programming video tutorial you will learn how to upgrade from Windows XP to Windows 7 with CNET. You need to do these 3 things. 1st - run the Windows 7 upgrade advisor to know if your computer can handle any version of Windows 7. 2nd – check the Windows 7 compatibility center to know if you need to upgrade your drivers or apps. 3rd – make a copy of your hard drive. Down load and run the ‘windows easy transfer’ wizard. This will back up all your files and settings to an ext...

How To: Export LinkedIn contacts to an address book

In this Computers & Programming video tutorial you are going to learn how to export LinkedIn contacts to an address book. LinkedIn is great for keeping your contacts in your professional network. To export your contacts go to home page and click on ‘contacts’. Now your full network of contacts will be displayed. On the right hand bottom, click on ‘export contacts’. On the next page select where you want to export the contacts, type in the security code and hit ‘export’ and all the contacts wi...

How To: Add photos to Facebook using Picasa

In this Computers & Programming video tutorial you will learn how to add photos to Facebook using Picasa. The video is from Help Me Rick. Log into Facebook, go down to the lower left corner and click ‘Applications’. Click ‘Find More’ and in the search applications box, type in ‘Picasa’. You will get a list of Picasa applications. Select the Picasa by Alan Lundeen. Here you click ‘go to applications’ -> install now -> OK -> Yes -> Facebook -> Add -> OK. Now you will get a Facebook icon on the ...

How To: Get women by avoiding the 'weirdo zone'

In this video from Inner Confidence, they demonstrate how to not get too into a women's personal space. A way to not approach a woman is to approach her head on. It is much less intrusive if you approach her from the side. The girl in the video says that a man's attractiveness depends on his groundedness. Some guys to not realize they are socially awkward. When guys take this program they are more relaxed and the know what to say. She says a big turn off is a guy who is really feminine. A qua...

How To: Edit audio sequences using Audacity for Mac

Learn how to edit audio files using Audacity of the MAC. 1 Create an audio file by using the built in recording function in Audacity. Save the file prior to starting your editing. 2 Open the file that you created earlier and test the file by playing it. 3 You can copy, cut and paste different parts of the file by highlighting the section in your file and then right clicking (or option clicking) and choosing what you want to do from the pop up file. 4 You can also add effects by highlighting a...

How To: Unlock your AppleTV

Mike Agerbo explains the benefits from listening to one's music through AppleTV, however it seems that one cannot listen to any music or other audio files unless he/she is using iTunes media. Agerbo explains how you can use Apple TV with other types of media, using a program called ATV Flash. Agerbo believes ATV Flash to be an easy and inexpensive tool to upgrade one's Apple Television so it can use the USB port and download and use other media content. One can also create a Boxee account to ...

How To: Choose what stays in the system tray

Vanessa from Tekzilla Daily gives us a very helpful video guide on how to edit or tweak icons in the system tray on Windows 7. Typing "notification area" in the search box of the Start Menu calls up the Notification Area control panel. This control panel shows the different processes and programs that are on the system tray. It is where you can edit the settings for each process or icon, with options of "always appear, never appear or show up only when needed". You can also control the basic ...

How To: Find the IP address and subnet mask of your computer

It's good to know the IP address of your computer. With this information, you can track your computers usage online, and will also know how to change it if you want to surf unnoticed. This tutorial will show you exactly how to find the IP address of your PC, so you will never be lost again. There are a number of programs that require your IP address, for example if you are setting up an external device like an XBox live to your Internet connection, you will need to make sure the IP address is...

How To: Create swirling rainbows in Illustrator CS3

This is all about vector, swirling rainbows. Have you ever seen those looping, swooshing, swirling rainbow graphics used in all kinds of graphics ranging from logos, and sketches, to grungy and retro illustrations? Well, you are going to create one of them in Illustrator. Watch this Illustrator video tutorial to create vectored rainbows. Also, learn how to export it to a program, such as Photoshop, as a smart object, to utilize it as a smart object so we can both retain vector scalability whi...

How To: Operate the Nikon D90 Digital Camera

Watch this instructional video brought to you by Richard Berry to learn how to operate the Nikon D90. This Nikon D90 video tutorial demonstrates how to use the control dial (auto mode, scene modes, program [P], shutter priority [S], aperture priority [A], and manual [M]); read the display and viewfinder; adjust the aperture, shutter speed, focus, spot meter, matrix, exposure compensation, etc.; use the back command dial; and more. Use this Nikon D90 tutorial to familiarize yourself with your ...

How To: Build your own HD DVR

Want to break free from the confines of DVR land? If you're tired of spending all the money to download program listings from your DVR, then it's time for a change. If you don't want to mess with DRM files anymore, but want to backup your system, then MythTV is the way to go. You'll need to build your own PVR (personal video recorder) with thanks to MythTV, and it will end up costing you less than $500. Well worth the investment. The MythTv software is free and open source, so you just need t...

How To: Make a keylogger

This video tutorial instructs you on what a key logger is and how to make a key logger which records your computers key strokes for later review. There are software or hardware based key loggers that intercept the connection between the keyboard and computer. Hardware key loggers consists of a micro controller for data logging. Software key logger is a script that runs in the background then processes and saves the key strokes to a text file. To make a key logger you'll need to know a program...

How To: Change your IP or MAC address

The video is about how to change the IP address. MAC address is the unique identifier a site of the most network adapters. MAC address is used to determine what IP address the computer will have and one way to change the IP address is by changing the MAC address. The method is only applicable for the windows systems and for the MAC systems you need to look at the link provided. In Windows in the start menu, type cmd in the run/search box, which will launch the command window. Type ipconfig/al...

How To: Jump into deep water and swim as a Boy Scout

Second Class Boy Scouts work on building their outdoor survival and camping skills. Compass work, nature observation, camp tools, and swimming are areas where new skills are mastered and demonstrated. A second class scout, having completed all the requirements, should be able to lead a hike, care for his own equipment, set up a campsite, and perform basic first aid.

How To: Complete an orienteering course as a Boy Scout

As a Boy Scout, when the First Class rank is attained, a scout has learned all the basic camping and outdoors skills of a scout. He can fend for himself in the wild, lead others on a hike or campout, set up a camp site, plan and properly prepare meals, and provide first aid for most situations he may encounter. A First Class scout is prepared.

How To: Code a Simple Java App to Kill Any Process After a Specified Time

I may be a bit weird, but I enjoy listening to music at night as I fall asleep. Sure, you could create a playlist of songs so that it stopped after all the songs finished playing, but I have a rather extensive database of music and I enjoy listening to them randomly. Also, I like to ensure it terminates after a specific amount of time (I don't want it playing all night). Or sometimes I use it when I am cooking so that when the music stops, I know I need to check on my food, etc.

How To: Hack WPA WiFi Passwords by Cracking the WPS PIN

A flaw in WPS, or WiFi Protected Setup, known about for over a year by TNS, was finally exploited with proof of concept code. Both TNS, the discoverers of the exploit and Stefan at .braindump have created their respective "reaver" and "wpscrack" programs to exploit the WPS vulnerability. From this exploit, the WPA password can be recovered almost instantly in plain-text once the attack on the access point WPS is initiated, which normally takes 2-10 hours (depending on which program you use).

How To: A Hacker's Guide to Programming Microcontrollers

While hackers know and love the Raspberry Pi, many don't know of its cheaper cousin, the microcontroller. Unlike a Pi, which can be used more or less like a regular computer, microcontrollers like the Wi-Fi connected ESP8266 require some necessary programming skill to master. In this guide, we'll build an Arduino program from scratch and explain the code structure in a way anyone can understand.