Alcohol Monitoring Search Results

How To: Customize Your USB Keyboard with a DIY Illuminated Base with Built-In Phone Stand

I've never really liked to type on a flat or low keyboard. Even the small flip-up stands underneath most keyboards were not good enough for me, as those little legs aren't usually more than 2 or 3 centimeters high. I'd like a minimum of 5 cm, so I decided to make this keyboard base for myself. Aside from giving me the right height and angle, this DIY keyboard base also features LEDs that light up my monitor, the table, and gives a nice background to my desktop. It's even got a built-in stand ...

How To: See If Anyone's Hacked into Your Dropbox, Facebook, or Gmail Accounts

Dropbox announced Tuesday that a recent security breach compromised a list that included the email addresses of certain Dropbox users. To avoid future complications, the service announced that it would be implementing two-factor authentication, and even more useful, a security page that lets you monitor all activity on your account. In light of this and other recent web security threats, you might also want to know that services like Gmail, Facebook, and Yahoo! Mail have similar pages where y...

How To: Make Glowing Green Candy

If there ever was a day to eat green candy, St. Patrick's Day would be it. But is there something better than the banality of green candy swarming the streets on St. Patty's Day? Yes—glowing green candy, and Instructables user BrittLiv wants us to show you how it's done.

How To: Eat for maximum energy

Candy bars are tasty but all they do is spike your blood-sugar momentarily leaving you with and energy crash. For high, sustained energy you will need a balanced diet full of complex carbohydrate and protein.

How To: Use the recovery position [signed] (British Red Cross)

Even those with hearing impairments need to know basic first aid procedures, because everyone, including deaf people, can save a life one day. People may collapse unexpectedly for a number of reasons, and people who faint periodically, or those who suffer frequent seizures or from epilepsy need help from others, so it's important that everyone know the proper first aid procedure for saving a collapsed victim casualty.

How To: Fix Blurry Photos in Photoshop

It's very easy to get a slightly blurry photograph due to a moving subject, camera shake, or just an incorrect auto-focus, but you don’t have to let that ruin an otherwise terrific picture. All it takes is a little finesse in Photoshop or another photo editing software. This guide covers sharpening a blurry image using Photoshop specifically.

How To: Use S-Video to view your computer screen on a TV

This video shows you how to easily use an S-Video cable to view you computer screen on a TV set. The first thing you have to do is buy an S-Video cable. Plug the 2 sides of the cable in TV and in PC or laptop. Turn your television to either AV1 or AV2. At this point, the computer screen should appear as well on TV as on the PC monitor or laptop monitor. Next, you can personalize your monitor or TV Resolution by right-clicking anywhere on the desktop and then clicking Personalize. In the poppe...

How To: Use MDK3 for Advanced Wi-Fi Jamming

You may have heard of a signal jammer before, which usually refers to a device that blasts out a strong enough radio signal to drown out the reception of nearby devices like cell phones. Purpose-built jammer hardware is outright illegal in many countries. Still, Wi-Fi is vulnerable to several different jamming attacks that can be done with Kali Linux and a wireless network adapter.

How To: Hack WPA & WPA2 Wi-Fi Passwords with a Pixie-Dust Attack Using Airgeddon

Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this tactic used to take up to 8 hours, the newer WPS Pixie-Dust attack can crack networks in seconds. To do this, a modern wireless attack framework called Airgeddon is used to find vulnerable networks, and then Bully is used to crack them.

How To: Change Your Own Oil — A Beginner's Guide

If you're one who enjoys a good DIY project, or if you're just tired of paying exorbitant labor fees to have your vehicle serviced every 5,000 miles, changing your own oil can be a rewarding endeavor. Even though cars and trucks are becoming increasingly over-engineered these days, manufacturers generally see to it that the basic maintenance items can still be taken care of in your driveway with a few common tools.

How To: Remove caulk

If you’re doing some spring cleaning and decide to throw in a little home improvement in as well you may want to remove old caulk. As we all know, old caulk is unattractive and will make areas look dirty or unfinished.

How To: Remove bike handlebar grips

With a few easy steps you can remove the handlebars from your bike to change the grips, for maintenance or for whatever other reason you might want handlebars off of a bike. Now you'll never have to suffer though old handlebar grips again.

How To: Create an old faded newspaper effect in Photoshop

The video is about how an old stalled photographic image with faded backgrounds to a normal image. A nice clean digital image is taken and is mixed with a texture of a paper and produces a final composite image of all effects combined. The procedure is not that difficult but it needs to be followed in a proper order. First the paper texture is taken as a base and then the clean digital image is dragged onto this texture. The blending mode is adjusted from normal to multiplied blending mode, w...

How To: Create a web advertisement video in After Effects CS4

Open After Effects. Create a new composition by selecting "Composition" and "New" from main menu. Use default NTSC DV preset. Keep 30-sec default duration unless you need more time for the video scene to edit. Import several video clips by selecting "File," then "Import" from menu. Navigate to video files you want. Import at least 3 different video files using Import File dialog box. Double click on 1st video file you want to add to your timeline. The file will now open in a video monitor win...

How To: Immobilize an ankle

Learn how to immobilize an ankle. The ankle is a complex joint, so when an injury occurs, and you can't get help right away, the first thing to do is keep it from moving – you'll prevent any more damage to the surrounding nerves and tissue.

How To: Buy and win eBay auctions

Help yourself win that must-have item with these tips. You Will Need: a computer with internet access, money, & patience. Create an account. Browse the categories to familiarize yourself with the site, especially if you don’t have a specific item in mind. If you know what you want, start searching by using broad terms and synonyms to yield the most results. Add quotes around your search terms or qualifiers, such as a specific color or size, to narrow the field. You can also post on the “Want ...

News: Apple Watch vs. Fitbit — What's the Best Bang for Your Buck?

In the case of Apple Watch v. Fitbit, the winner comes down to the judge at hand. Apple currently offers two smartwatches — the Series 5 and the Series 3 — while Fitbit offers three models — the Fitbit Versa 2, Fitbit Ionic, and Fitbit Versa Lite. Whatever your assumptions about these devices are, throw them out the window, as each has something unique to bring to the table.

How To: Intercept Security Camera Footage Using the New Hak5 Plunder Bug

In a previous guide, I demonstrated how to extract images from a security camera over Wi-Fi using Wireshark, provided you know the password. If you don't know the password, you can always get physical with the Hak5 Plunder Bug. Using this small LAN tap, we can intercept traffic like images from a Wi-Fi or IP security camera if we can get physical access to the Ethernet cable carrying the data.

How to Hack Wi-Fi: Cracking WPA2 Passwords Using the New PMKID Hashcat Attack

Cracking the password for WPA2 networks has been roughly the same for many years, but a newer attack requires less interaction and info than previous techniques and has the added advantage of being able to target access points with no one connected. The latest attack against the PMKID uses Hashcat to crack WPA passwords and allows hackers to find networks with weak passwords more easily.