Anti Incarceration Policies Search Results

How To: Use SELinux Targeted Policy to Secure Your Hosts

Hackers often rely on lazy system admins and unpatched vulnerabilities to get access to a host. Keeping intruders off of our machines requires us to update daily, only run the services we need, and read the code, among other things, but we can still make mistakes. Luckily for us, we can limit the damage caused by those mistakes by running SELinux.

How To: Tether iPhone 3G to use as a wireless modem

This is a video demonstration on how to tether your iPhone 3G to a Mac laptop to use the 3G network for surfing the web on the laptop. This is against AT&T's policy so try at your own risk. This is in place of the NetShare app that keeps getting removed by Apple or ATT. This let's you connect your computer to the 3G wireless network by using a proxy on your jailbroken iPhone.

How To: Disable the Lock Screen on Windows 10

If your PC setup includes a mouse and keyboard, you'll be happy to know that most of the touchscreen-first features of Windows 8 have gone by the wayside in Windows 10. Where it once required awkward gestures to access key features, Windows now recognizes when you're using a traditional desktop or laptop, then responds by making sure that all features can be easily discovered with clickable buttons and menu entries.

News: Google+ Updates Name Policy—Still No Pseudonyms

As Google+ became available to more people, it started running into issues of accounts being suspended due to names that did not sound "real". According to Google+'s community standards, names that users "commonly go by" were encouraged, but not pseudonyms. Those who were using pseudonyms in their Google+ profiles quickly found themselves suspended from using Google+.

How To: Configure F5's FirePass v7 SSL Endpoint Security

Learn how to configure the features in F5's FirePass v7 SSL VPN Endpoint Security. Peter Silva shows some of the new Endpoint Security features in the recent FirePass v7 release. Watch how to create policies, enforce host checks and other protective measures for your Remote Access deployments. For more information, and to get started configuring your own installation of FirePass v7, take a look.

How To: Use an ISA server

So what exactly is ISA Server? ISA Server, which stands for Internet Security and Acceleration Server, is Microsoft's software-based firewall, proxy, and web caching service/product. Now what does all of that mean? This video helps explain it!

How To: Use the BD Genie Safety Lancet blood sampler device

Check out this video tutorial to see how to use the BD Genie Safety Lancet blood sampler device. BD Genie Lancets are high quality, safety-engineered, single-use capillary blood sampling devices. They offer a permanently retractable blade or needle feature that minimizes the possibility of injury or reuse. BD offers a full range of blade depth and needle gauges for sufficient blood volume in multiple sample requirements. All Genie's can be used in conjunction with BD Microtainer Tubes.

How To: What You Need to Know Before Voting on Facebook's Proposed Policy Changes This Week

A few weeks ago, Facebook published a blog post called "Proposed Updates to our Governing Documents," which outlines a few changes in their policies and user voting system. These changes would essentially take away users' right to vote on future changes to Facebook's data use policy while also taking away Facebook's responsibility to alert users of those changes. If the new policy is enacted, the vote will be replaced with "a system that leads to more meaningful feedback and engagement," what...

How To: Rural surveillance

If you are law enforcement or find yourself in an emergency situation you may need to know how to properly conduct surveillance in a rural area. You will have to gather information without being scene and will need different techniques when out in the wilderness.

How To: Define an antiderivative in calculus

The relationship and the definition of derivatives and anti-derivatives is described in this video. First, consider a function F(x)=x^3-5x+2 and another with small 'f', f(x)=3x-5. f(x) here is the derivative of F(x). However, on the contrary, F(x) is said to be the anti-derivative of f(x). There is a catch though; even though F(x) has only one derivative in the form of f(x), f(x) here has more than one anti-derivative. This is because f(x)'s anti-derivatives are of the form F(x)=x^3-5x+c, whe...

How To: Define an indefinite integral in calculus

In this video tutorial, viewers learn how to define an indefinite integral in calculus. Finding the anti-derivatives of a function is called anti-differentiation. The f(x) is the derivative of F(x), while F(x) is the anti-derivative of f(x). If F(x) is the anti-derivative of f(x), then F(x) + c are all anti-derivatives of f(x). This video is very descriptive and clearly explains all the functions of this mathematical function. This video will benefit those viewers who are students, and are in...

How To: Wear the new NWU (Navy working uniform)

In this video tutorial viewers learn how to wear the National Working Uniform. This uniform has a strict policy and all must follow the uniform rules. The basic components of the uniform are: an eight point cap, blue cotton undershirt, shirt, trousers, belt with closed-faced buckle, black boot socks, blousing straps, black 9" steel-toed leather boots, embroider rank insignia and service & name tapes. This video is very detailed and clearly explains all the uniform expectations. This video wil...

How To: Remove a rogue anti-virus software from your PC

Trojans, viruses, and malware can be more than a simple nuisance to your computer--they can destroy data and ruin your system. This video tutorial shows how to get rid of malicious software on your computer. When combating a virus, it's best to use multiple applications to insure system extraction.

How To: Block a website using a Linksys Router

In this tutorial, we learn how to block a website using a Linksys Router. First, go to your web browser and type in "192.168.1.1" into the address bar. After this, you will need to enter in your username and password to the pop up window. From here, go to the tab that says "access restrictions" and look for where it says "policy name". Type in 'blocked website' to the bar and then click 'enable'. From here, go down to the bottom of the page and enter in the URL of the website you want to bloc...

How To: Easily open your NAT on a ZyXel router

In this Computers & Programming video tutorial you will learn how to easily open your NAT on a ZyXel router. There are three steps involved in doing this. Open your web browser and type in the router IP address which is normally http://192.168.1.1. Then you will get the log in page. The password is either 1234 or admin. It will be written on the packaging of the router. On the next page click on UPNP, then check all three boxes and click 'apply'. Then you click on NAT and set the start and en...

Become a judge for Magic: The Gathering

In this video tutorial, viewers learn how to become a judge for the card game, Magic: The Gathering. The best way to join is to contact a level 2 judge. Judges must put rules in context. If confused or unsure, use online forums for a guide. Interact with the judge community. You don't have to be a certified judge to run a local event. The tournament policies and procedures can be found in the Universal Tournament Rules, Floor Rules or PCI Penalty guidelines. This video will benefit those view...

How To: Apply anti-aliasing to text when programming in Java

Want to program your own Java games and applications but don't know beans about object-oriented programming? Never you fear. This free video tutorial from TheNewBoston will have you coding your own Java apps in no time flat. Specifically, this lesson discusses how to anti-alias text when writing code in the Java programming language. For more information, including detailed, step-by-step instructions, watch this helpful programmer's guide.

How To: Style your hair like Sarah Palin

Although you may not agree with Sarah Palin's policies, there is one thing we all can agree on. Sarah Palin's hair looks great This tutorial teaches you how to do an "updo" Sarah Palin style. This is a quick and easy way to put your hair up without having to use any product, teasing or backcombing. Gather you hair into a pony tail, twist your hair, loop it upwards and clip it in place with a good size barette. Let the ends show at the top of your head. Then, gently loosen sections of your hai...

Prev Page