Contractors' Accreditations Search Results

How To: Use a cordless nailer

In this how-to video series, learn how to use a cordless nailer from certified building contractor Matthew Christian. Matthew will demonstrate how to load nails in a cordless nailer, how to unjam a cordless nailer, how to change air cartridges and air filters in a cordless nailer, how to properly handle a cordless nailer, how to change the battery in a cordless nailer, how to charge cordless nailer batteries, how to oil cordless nailers, how to flush a cordless nailer.

How To: Install shelves using drywall anchors

In this series of DIY video clips, expert contractor Dominic Capone demonstrates the simple process of how to install a shelving unit to drywall using anchors. These basic tips can be easily adapted to construct a closet, pantry or entertainment center. With the proper anchors, tools and instruction from these free video clips, you’ll be able to hang just about anything on drywall.

How To: Prevent & Stop Apps from Using Your iPhone's Microphone & Enhance Your Privacy

Any app on your iPhone could potentially listen in on your conversations and use that information to target you with tailored ads. Although most companies, including Facebook and Apple, have come out and vehemently denied these claims of spying on consumers, who's to say they're telling the truth? The only way to be sure you're safe is to take matters into your own hands.

How To: Become a Hacker

Many of our members here at Null Byte are aspiring hackers looking to gain skills and credentials to enter the most-valued profession of the 21st century. Hackers are being hired by IT security firms, antivirus developers, national military and espionage organizations, private detectives, and many other organizations.

How To: Use Google's Advanced Protection Program to Secure Your Account from Phishing

It's easy to have your password stolen. Important people like executives, government workers, journalists, and activists face sophisticated phishing attacks to compromise their online accounts, often targeting Google account credentials. To reduce this risk, Google created the Advanced Protection Program, which uses U2F security keys to control account access and make stolen passwords worthless.

How To: Get Rid of All that Space Junk

How about a laser? One that is strong enough to nudge debris out of earth orbit. That's what NASA contractor James Mason wants to do, and his lab simulations suggest that the idea is possible. Mason wants to use a 5kW ground-based laser and a ground-based 1.5 meter telescope to spot potentially hazardous space waste and shove it off, by about 200 meters per day of lasering. It's kind-of like air traffic control for near earth orbit.

News: Colombian Coke Transporter Seized

This weekend in a jungle estuary, the DEA and local Ecuadorian police seized a prototype narco sub that may be the most sophisticated one yet. Complete with air conditioning and periscope, this 100 foot creation would have carried a more cocaine tonnage than any previously captured narco sub. To give you a perspective on the resourcefulness of these outlaws, consider this. A U.S. Navy Virginia Class attack submarine will run around $2.8 billion. But a drug lord in Cartagena would make you one...

News: The Other Side of Fashion

The United States is a hierarchical country where the weak ones are at the bottom and the powerful ones are at the top. Garment workers are at the bottom of the list although they are the most important. Without them there would be no fashion industry. They sew and cut the garments that people buy, the raiment that models wear on the runways. After the garments are sewn, factory owners send the garments to contractors to get make the clothing. Contractors make sure the garment workers sew the...