Block Access Search Results

How To: Create a quick print button in your word processor

Interested in creating a quick print envelope button in your word processor? With this video tip, you'll learn how to create a quick print button for access to envelope printing in Microsoft Word 2007, previous versions of Microsoft Word and OpenOffice Writer. For more, and to learn how to set up your own quick print button, take a look!

How To: Send email with Evolution in Ubuntu Linux

Sending email with the Evolution client in Ubuntu Linux is much the same as with any other email program. In addition to offering step-by-step instructions for the setup and use of Evolution, this Ubuntu tutorial also will teach you how to access your address book when writing an email. For a detailed look at the Evolution email client, take a look!

How To: Use the Zoho Creator database application

While all Web 2.0 applications are by no means equal, certain among them can save you time, money, and frustration–one such web app is the Zoho Creator database utility, which is comparable to Access from the Microsoft Office suite. For more information, or to get started using the Zoho Creator online database application for yourself, take a look!

How To: Upgrade your truck's exhaust system

Still got stock? Many factory installed exhaust systems not only sound anemic, they actually are because they scrub power. The designers who are given the task of producing these pipes are often handcuffed by several different requirements that add up to one big compromise. Exhaust engineers are required to build systems that are quiet and that meet certain types of emission standards, but not all of the design concerns are driven by government regulations. Some are based on a perception of w...

How To: Handle a hockey stick

A hockey stick is used for scoring goals, passing and blocking passes in ice hockey. Learn how to use a hockey stick like an all-star from an experienced hockey coach in this free sports video series.

How To: Use basic composition in a single camera setup

This episode of Take Zer0 discusses the differences between the multi-camera format used in television, and the single-camera setup most often used in film production. Since it's likely that indie filmmakers have access to only one camera, we will explain and offer examples of how to efficiently shoot multiple takes with one camera to convey a single action.

How To: Hack a Pepsi Machine

Learn how to con a vending Pepsi machine and access a secret (but benign) debug menu with this hack how-to video. While this hack won't get you any free soda, you might, at the very least, impress your friends with it. For complete instructions for this simple, pushbutton hack, take a look at this instructional video!

How To: Install a T-One vehicle wiring harness on a Forester

If you are going to use your Subaru Forester to tow, carry a cargo carrier that has lights, or if you have accessories that need power, you are going to need to install a T-One vehicle wiring harness. This video will demonstrate the simple installation of the harness on a 2007 Subaru Forester and includes tips showing which panels need to be removed, where to access the needed plugs, and good locations for the wires and module box.

How To: Capture video on Final Cut Pro

Don Schechter demonstrates how to capture your footage from your camera to your computer and log it for easy access later on for Final Cut Pro. Logging clips allows you to organize your footage without having to waste hard drive space.

How To: Prevent Thieves from Turning On Your iPhone's Airplane Mode, So You Have a Better Chance to Track It Down

When an iPhone is lost or stolen, it's imperative to start tracking it via Find My as soon as possible, whether that's from a computer, tablet, or someone else's phone. However, if it's stolen, there's a good chance the thief or robber turns on Airplane Mode, blocking all communication with the iPhone. If this is a scary thought, you can prevent thieves from accessing Airplane Mode altogether.

How To: Block Those Annoying Cookie Consent Notices from Appearing on Websites in Safari

As a means to combat annoying and intrusive advertisements in Safari, Apple added native support for content blockers on the iPhone. Instead of being bombarded by notifications, banners, and pop-ups, content blockers prevent them from opening, which can also be said about those annoying cookie consent notices that many websites now have.

How To: Make Pokémon GO Work When You Have TWRP Installed

If you're a root user who has played Pokémon GO over the years, then you're probably familiar with the detection methods used to spoil your fun. The game's developer, Niantic, has publicly mentioned their ongoing battle with rooted Android phones and are unwilling to let up. They have a no-nonsense approach to try and keep you from playing, and they've stepped their game up once again.

How To: Share Wi-Fi Adapters Across a Network with Airserv-Ng

If you want to carry a variety of network adapters without looking suspicious, a perfect solution is accessing them through Airserv-ng. Tucked away in the Aircrack-ng suite, this tool allows a hacker to plug any number of network adapters into a Raspberry Pi and access them over a Wi-Fi or Ethernet connection.

How To: Missing Burst Mode? Here's How to Find It on iPhone 11, 11 Pro & 11 Pro Max

Burst mode on iPhone is a great way to ensure you capture the photo you truly want, especially when your subject is moving too fast. You'd be forgiven for thinking that Apple ditched the feature entirely on iPhone 11, 11 Pro, and 11 Pro Max, since a long-press of the shutter button now records video instead. However, burst mode is alive and well on your new iPhone — it's just hidden.

How To: Use Metasploit's Timestomp to Modify File Attributes & Avoid Detection

It is said that the best way to avoid detection when hacking is to leave no trace, and often that means not touching the filesystem at all. But realistically, in most cases, it's impossible not to interact with the filesystem in one way or another. The next best thing to do to throw off any investigators is to change the file attributes to hide activity. We can do this with Metasploit's Timestomp.