Analysis Displaying Search Results

How To: Eject devices from the use of the terminal for a Mac

In this tutorial, we learn how to eject devices from the use of the terminal for Mac. First, go to the terminal of your computer where you will see a notepad sort of page. Next, type in "df" and then press return. You will now see a list displaying processes on your computer. On the bottom will be your public zoning device, which is your USB device. Next, type in "hdiutil eject -force (the code under "mounted on)- volumes-publiczone". This is not case sensitive, but don't forget or add in any...

How To: Make egg carton flowers with your kids

Some of the best kids activities are done right in your own home, recycling everyday items. For instance, an egg carton. What could you possibly make out of an old egg carton? This video will show you exactly what you could do! See how to make egg carton flowers. These decorative flowers can proudly be displayed anywhere. All you and your kid will need are:

How To: Attract more viewers to your Deviant Art account

The most important part of art is making sure others see it and appreciate the message. In this tutorial, learn how to attract more viewers to your artwork, as displayed on the website, Deviant Art. This is a great way to get your vision out there and make your voice heard. You don't have to wait until you can get your pieces in a museum - get started gaining fans today.

How To: Shut down your BlackBerry

In this how-to video, you will learn how to shut down your Blackberry device quickly and easily. If you have uninstalled or installed a new program, this may be useful for you. You will have to find the power off tool in the display of your Blackberry. You can place this option in the tools section. Once you highlight it and press the track ball, it will begin the process of turning the device off. This allows you to shutdown all processes on the device and completely turn off. This video sho...

How To: Open ports in Windows 7

This video tells us the method to open ports in Windows 7. Click on myu icon and go to 'Preferences'. Copy the port number from the resulting window. Go to 'Start', 'Control Panel' and 'System and Security'. Go to 'Windows Firewall' and 'Advanced Settings'. Go to 'Inbound Rules' and 'New Rule'. Click on 'Port' and select 'TCP' and 'Specific Local Port'. Type the port number in the text box. Click 'Next' and 'Allow Connection'. Press 'Next' twice and put the name in the space provided for it. ...

How To: Mount a fish finder on your kayak

In this Outdoor Recreation video tutorial you will learn how to mount a fish finder on your kayak. There are many ways of doing this. All the methods work. It’s just a matter of personal choice where you want to mount it. Some boats are designed for a through hole transducer and have a space for it to mount it in a hole. Take a piece of foam, trace out the transducer and cut out the foam. Now open the front hatch of the boat and glue down the foam on the flat surface of the boat. Once that ...

How To: Convert percents into fractions

Percents are handy for displaying statistics or labeling objects such as sale items in a store, or ingredient labels. However, in a math equation, a percent is a bit difficult to use. Therefore, you will need to convert your percents into an easier type of number form.

How To: Reseat the hard drive in an iPod classic

First, get out a Swiss Army Knife and clean your hands. Then, take out the main blade. Next, on the right hand side of the IPod, stick the blade through between the gap to open the casing of the IPod. Then, turn the ipod upside down, so that the display side is facing the ground. Cautiously open the case, being careful not to damage the attachment in the top corner. Once the case is open, carefully detach the the hard drive from the bar "thing" connected to the top of the hard drive. Next, ta...

How To: Set up a Remote Desktop connection on a Windows PC

This video illustrates the method to Set up a Remote Desktop connection on a Windows PC. This process is composed of the following steps: Step 1Install "TeamViwer" software on the PC's which would be involved in this process.Step 2Create a connection between the computer you want to access remotely and the one which would be used to gain remote access. To create a connection , you need to connect them through Wi-Fi, LAN or through the internet.Step 3Open the TeamViewer software from the compu...

How To: Update your iPhone and iPod Touch firmware 3.0

In this Electronics video tutorial you will learn how to update your iPhone and iPod Touch firmware 3.0. You will need iTunes 8.2 and the firmware from Deposit Files. Go to the website and download the firmware. This will take some time. Use Firefox browser for the download. Now make sure your device is clean, i.e., it is not jailbroken and connect it to the computer. Then open up iTunes on the device for this hold down ‘power’ and ‘home’ until the device switches off and then powers on. Once...

How To: Get clear skin with a daily cleansing routine

After struggling for years with acne, this skincare system that is displayed got rid of the hostess's acne problem effectively. In the morning, she uses Sea Breeze Actives deep clean astringent which has 1% salicylic acid in it, making sure that you use one cotton ball for each individual part of your face. Afterwards, she uses a skin lotion that has salicylic acid in it. These products will prevent your face from getting too oily during the day. At night, she uses the Proactiv cleanser, whic...

How To: Here's Why You Need to Add Python to Your Hacking & Programming Arsenal

Choosing which programming language to learn next can be a truly daunting task. That's the case regardless of whether you're a Null Byter just beginning a career in development and cybersecurity or you're a seasoned ethical hacking and penetration tester with years of extensive coding experience under your belt. On that note, we recommend Python for anyone who hasn't mastered it yet.

How To: Use Websploit to Scan Websites for Hidden Directories

Websites are often misconfigured in ways that allow an attacker to view directories that are not ordinarily meant to be seen. These directories can contain sensitive information such as private credentials or configuration files that can be used to devise an attack against the server. With a tool called Websploit, hackers can scan targets for these hidden directories without difficulty.