Click to Access This Comprehensive Guide Search Results

How To: Unzip a zipped file using the 7-Zip extraction tool

In this video tutorial, viewers learn how to unzip a zipped file using the 7-Zip extraction tool. Begin by going to the website and click on the Download link. Wait for the screen to load and click on Save File. Once downloaded, double-click on the file and follow the instructions to install it. Now simply right-click the zipped file. Go to 7-Zip and select either Extract files or Extract Here. The files will be extracted into a new folder that contains all the content...

How To: Eject and recover a stuck DVD on a Mac

In this video tutorial, viewers learn how to eject and recover a stuck CD or DVD on a Mac computer. There are several ways to eject a disc. The first method is to click on File and select Eject. The second method is to press the Command and E buttons on the keyboard. The third method is to click on the disc and drag it to the eject icon in the dock. The fourth method is to access Disc Utility in the Utility folder. Then click on the disc drive and click on the eject button. This video will be...

How To: Train a guide dog

Guide dogs are trained to help the visually impaired or people who are completely blind. Learn how guide dogs are trained from a training expert in this free educational video series.

How To: Illuminate a regular computer keyboard

Light up your keyboard with this illuminating tutorial from Make Magazine's Kipkay. To get started on this hack, which should take roughly a half an hour and cost no more than $5, you'll need the following: (1) a regular computer keyboard (most any model will do), (2) a screwdriver, (3) a drill, (4) telephone wire, (5) heat shrink tubing, and (6) two 5 mm high-brightness, white LEDs. For comprehensive, step-by-step instructions on building your own light-up keyboard, simply watch this hacker'...

How To: Insert a proper PICC line into your patient

PICC stands for a peripherally inserted central catheter, and is usually inserted somewhere in your patient's uppper arm, giving access to the larger veins in the chest region. PICC lines are often desirable because they are the least risky way of giving central access to the veins near the heart, especially when your patient will need to have one for an extended period of time. This tutorial shows you everything you'll need to know about how to properly and safely insert a PICC line into you...

How To: Use hotkeys to navigate 3DS Max for beginners

For 3D artists new to 3DS Max, learning your way around this massive piece of software can take a long time. It need not do. This video will teach you how to use some of the many hotkeys in the program to navigate it like a pro, easily accessing all of the most popular tools and allowing you to save a lot of time modeling. Now that you know what buttons to press to access functions, watch some of our other 3DS Max tutorials for more advanced functions.

How To: Care for acne prone combination skin types

In her video, Carol describes her skin care regimen, which she claims has been very effective in treating her acne and improving her skin. This regimen is for acne-prone / combination skin types and involves the use of multiple products, including cleansers, scrubs, masques, washes and moisturizers. Carol takes us through her morning, evening and weekly cleansing routines, explaining which of various products she uses for each such routine. She also discusses each product, explaining its stre...

How To: Share iCloud Drive Folders to Collaborators or as ZIP Files to Anyone from Your iPhone

In the iOS 13.4 update, Apple added folder-sharing capabilities in the Files app. That means you can share multiple documents at the same time instead of doing it one by one. But that's not all — you can share folders with numerous contacts and even enforce access and permission settings.

How To: Get Root Filesystem Access via Samba Symlink Traversal

Samba can be configured to allow any user with write access the ability to create a link to the root filesystem. Once an attacker has this level of access, it's only a matter of time before the system gets owned. Although this configuration isn't that common in the wild, it does happen, and Metasploit has a module to easily exploit this security flaw.

How To: Check Your MacOS Computer for Malware & Keyloggers

While you might suspect your MacOS computer has been infected with malware, it can be difficult to know for sure. One way to spot malicious programs is to look for suspicious behavior — like programs listening in on our keyboard input or launching themselves every time we boot. Thanks to free MacOS tools called ReiKey and KnockKnock, we can detect suspicious programs to discover keyloggers and other persistent malware lurking on our system.

How To: Customize Camera, Microphone & Location Permissions for Specific Websites in iOS 13's Safari

In iOS 13, Safari has become even more powerful, especially when it comes to privacy. The browser will warn you when you create a weak password for a new account. Your history and synced tabs in iCloud are end-to-end encrypted now. And there are per-site settings that let you choose which domains can and can't have permission to use particular device hardware or sensors.

How To: Stop Third-Party Apps You Never Authorized or No Longer Use from Accessing Your Instagram Account

Unless you're completely new to Instagram, it's likely that you've linked your account with a third-party service at some point and forgotten about it. Those services still have access to data such as your media and profile information, so it's important that you not only know how to find these "authorized" apps, but that you know how to revoke their permissions.

How To: Prevent & Stop Apps from Using Your iPhone's Microphone & Enhance Your Privacy

Any app on your iPhone could potentially listen in on your conversations and use that information to target you with tailored ads. Although most companies, including Facebook and Apple, have come out and vehemently denied these claims of spying on consumers, who's to say they're telling the truth? The only way to be sure you're safe is to take matters into your own hands.

How To: Stop Apps from Accessing Your Google Account

Many apps and services that are available for Android can only work if they have access to your Google account. While you're setting up one of these apps, you'll see a popup that says something like "This app would like to access your Google account," and the options are "Accept" or "Cancel." Of course we tap "Accept" here to ensure that the app will work properly, but what are the long-term repercussions of doing that?

How To: Disable Every Single App from Accessing Your Facebook Profile

Apps are now very much integrated with social media, especially with your Facebook profile. Pretty much every app these days lets you log in using Facebook, while some actually force you to, giving you no other option. But, the most annoying part is that these apps leave notifications all over your Facebook timeline, cluttering the hell out of it. So, how can you completely banish all of these apps from being able to access your Facebook?

News: Surf Bocas 101

In a nutshell Bocas del Toro is an arcipelago on the Carribean coast of Panama. It's located about 20 mi south of the Costa Rican border and you can get there from both San Jose and Panama City. The main islands are Colon, Bastimentos, and Carenero, but there are over 100 islands you can explore by boat.

How To: Hide your IP address using IP Hider 4.0

IP Hider masks the real IP of a user, allowing him to browse all kind of pages without ever worrying that the ISPs or any other marketing tool is monitoring your surfing habits or spammers are attacking your computer. The simplest way to do this is to have traffic redirected through anonymous proxies.

How To: Quickly find your MAC address

In this tutorial, we learn how to quickly find your MAC address. This is the address that identifies your computer on a network. When you go to a campus, you will need to register your computer with a resnet so you can access the internet. To find the address, you will head to the Apple menu, then click 'about this MAC'. Click on the 'more' button and then click on 'network' and 'built in Ethernet'. This is the MAC address that you will need to register your computer, you may have a few of th...

How To: Bypass WebSense at school using http tunnel

In this video, we learn how to bypass WebSense at school using an http tunnel. First, open up Internet Explorer, then type in http tunnel and go to the website. Download the first link to your computer. Next, start the program and click on "free service". Now, open up the browser again and go to "internet options". Once you are on this, go to "connection", then "lan setting". Check to use a proxy server, then click "advanced", then enter in "http 127.0.01 port 1080". Click "ok", then exit out...

How To: Find your IP address in Windows 7 and Vista

In this video tutorial, viewers learn how to find their I.P address in Windows 7 and Vista. Begin by clicking on the Start menu. Then type "cmd" into the search bar and press Enter. When the command prompt window opens, type in "ipconfig" and press the Enter button. Now search through the list and find a line that says "I.P address" or "IPv4 address". The numbers will be divided by periods. Another way is to open Control Panel and select Network and Sharing Center. Then click on your local ar...

How To: Make CD and DVD images in Ubuntu Linux

In this video tutorial, viewers learn how to make CD and DVD images in Ubuntu. This task is very easy, fast and simple to do. Begin by right-clicking on the disc icon of the computer and select Copy Disc. When the CD/DVD Options window opens, click on Properties. Now name the disc, select a save folder and choose ISO image for the image type. When finished configuring, click on Apply and wait for the disc to finish copying. This video will benefit those viewers who use a Ubuntu computer, and ...

How To: Rip a DVD movie with Handbrake

In this video tutorial, viewers learn how to rip a DVD with the program, Handbrake. Begin by opening the video in the program by clicking on Source and locating the DVD drive. Handbrake will start scanning the all the titles of the DVD. When finished, it will automatically select the correct title for the movie. Under Destination, click on Browse to select your saving destination. You are also able to change the name of the file. Now select the video format and aspect ratio. When finished, cl...

How To: Create a System Restore point in Windows XP

In this video tutorial, viewers learn how to create a System Restore point on a Windows XP computer. Begin by clicking on the Start menu and go to All Programs. Open the Accessories menu and select System Tools. Go down the menu and select System Restore. Check Create a Restoring Point and click Next. Now type in a description for the restoring point and click Create. You will then create a restoring point for you to access whenever you want to restore back to that point. This video will bene...