Data Keluaran Search Results

How To: Use Google's Advanced Protection Program to Secure Your Account from Phishing

It's easy to have your password stolen. Important people like executives, government workers, journalists, and activists face sophisticated phishing attacks to compromise their online accounts, often targeting Google account credentials. To reduce this risk, Google created the Advanced Protection Program, which uses U2F security keys to control account access and make stolen passwords worthless.

How To: The 5 Best Phones for Video Chat

Video chatting has become an important factor in the overall smartphone experience. Even just a few years ago, 37% of teens were making video calls on a regular basis, and that number has surely grown. 85% of households with infants have used video chat apps to call relatives in other cities, and it's been shown that toddlers can create bonds and learn from visual cues in video calls.

How To: Writing 64-Bit Shellcode - Part 1 (Beginner Assembly)

In this simple tutorial you will be shown step-by-step how to write local shellcode for use on 64-Bit Linux systems. Shellcode is simple code, usually written in assembly that is used as payload in exploits such as buffer overflow attacks. Payloads are the arrow head of an exploit: though the rest of the arrow is important for the delivery of the attack, the arrow head deals the killing blow. In reality, payloads are slightly less exciting yet far more interesting and intelligent than medieva...

How To: Flash LiteOn DG-16D2S XBox 360 disc drive firmware

So you've watched this video, done your research, and decided that you want to flash the firmware on your XBox 360 with a LiteOn DG-16D2S rev. 7485 disc drive. Good for you! This video will walk you through the whole process. Be very careful, as messing up in small ways at any point can ruin the results which, when done properly, are really awesome.

How To: Use the SUMPRODUCT function in Microsoft Excel

Are you looking for a way to make your Microsoft Excel formulas more efficient? If so, you're in the right place. With this free video lesson from everyone's favorite digital spreadsheet guru, YouTube's ExcelsFun, the very first installment in his "Excel Formula Efficiency" series, you'll learn about the basics of Excel's SUMPRODUCT function — why some people use double negative and why other use times one.

How To: Use the Ribbon and Backstage view in MS Outlook 2010

After you launch Outlook 2010 in your computer, you will see the Ribbon strip immediately in the main window. The button for writing a new e-mail is separated from a button for creating new items in the calendar, contact list or task manager. An independent Quick Steps section offers functions allowing you to move a message into different folders, to save it into a calendar as a meeting reminder, to quickly forward it to a chosen person or to more people and to forward it with a FYI note. If ...

How To: Build APRS on the cheap

Long-time packeteer Bob Bruninga, WB4APR, developed the Automatic Packet Reporting System (APRS), which allows packet radio to track real-time events. It deviates markedly from the usual message- and text-transfer activity. Instead, APRS concentrates on the graphic display of station and object locations and movements.

How To: Tether the iPhone into a wireless router

One of the coolest feature of the 3G iPhone is the high speed, always on, Internet connection. Having a constant connection to the Internet is pretty much a must have for any dot com mogul. The main problem with the iPhone is the screen is too small to do any serious Web surfing. Yes, it’s great for Twitter or checking up on emails but blogging from it is an exercise in frustration. Fortunately, there is a way to extend that 3G connection onto your laptop by turning your iPhone into a wireles...

How To: Work with probabilities in Microsoft Office Excel

If you use Microsoft Excel on a regular basis, odds are you work with numbers. Put those numbers to work. Statistical analysis allows you to find patterns, trends and probabilities within your data. In this MS Excel tutorial from everyone's favorite Excel guru, YouTube's ExcelsFun, the 50th installment in his "Excel Statistics" series of free video lessons, you'll learn the basics of probability:

How To: Stain white paper to look antique

This video demonstrates how to stain a white sheet of paper and make it look antique. You'll need two tea bags (an extra one if the other tears open. Place the paper to be stain on a tissue or newspaper to avoid a mess. Take half a tumbler of hot water and dip a tea bag until the color becomes dark orange. Take out the tea bag and gently wipe all over the sheet of paper and also dab gently on the applied parts for a darker stain in some regions to look natural. Repeat this process by turning ...

How To: Create a password-protected sparse disk image in OS X

When you are sending any files over a network it is advised to encrypt it so that no can read it even if they get hold of it. You can encrypt files in Mac OS for this purpose. So first take any file or program that you want to encrypt. Open your hard disk and go to the applications. In the applications, under utilities open the Disk Utility program. Using this disk utility program you can create an encrypted disk image. Now this image will act as a disk image or other flash drive, but we can ...

How To: Create databases from templates with FileMaker Pro 10

In this Lynda video tutorial, learn how to use FileMaker Pro 10 software to create databases with pre-made templates. FileMaker offers these templates in a package called Starter Solutions. To access these options, click open FileMaker. Then, go to New Database under the File menu. Click the option "Create a database using a Starter Solution." The templates are grouped according to the nature of their use. Some are for the home, while some are for business. All you do is open the template you...

How To: Make a keylogger

This video tutorial instructs you on what a key logger is and how to make a key logger which records your computers key strokes for later review. There are software or hardware based key loggers that intercept the connection between the keyboard and computer. Hardware key loggers consists of a micro controller for data logging. Software key logger is a script that runs in the background then processes and saves the key strokes to a text file. To make a key logger you'll need to know a program...

How to Hack Like a Pro: Getting Started with Metasploit

This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing professionals. There are hundreds of tools out there, but I will focus and those that meet four key criteria:

News: 8 Tips for Creating Strong, Unbreakable Passwords

This weekend, hackers broke into the servers of the popular shoe shopping site Zappos, giving them access to the personal information of 24 million Zappos customers. The user data taken included names, email addresses, billing and shipping addresses, phone numbers, the last four digits of credit card numbers, and encrypted passwords. However, full credit card data was not lifted, and passwords were cryptographically scrambled.

How To: Delete apps from your iPhone or iPod Touch

This is a very simply process. Pick any app and press down on it. Soon an X will appear in the upper left hand corner. All Iphones have certain default apps, which cannot be removed. These apps will not get an X. The apps will start vibrating. Decide which apps you want to remove and touch the X. You will get a message saying that the certain app is being deleted, as is all of the apps data. The message will say "delete" or "cancel". Once you hit delete you will get a message, which will ask ...

How To: Unwrap in Blender

In order to unwrap and object and export it in Blender, you will need to import and object in blender, by go to "file". Click on "import". Click on "wavefront". Then, go to the parent directory. Select the object, by right clicking. Then, go into edit mode via the drop down menu, underneath the object. When your "normals" are visible and facing the right direction.

How To: Make a folder invisible and hide it for a computer prank

The My Computer section of most PC computers is an absolute mess, especially if you're trying to navigate someone else's computer. Why not take advantage of this fact by pulling this awesome prank on one of your data-loving friends? The video above will show you how to make a folder invisible and then hide it on their computer, making the chances of them finding it without knowing that you've pranked them slim to none. Just make sure you're there to watch you victim freak out afterwards! That...

How To: Burn Flash FLV video to a DVD with Replay Converter

Most of the videos that you'll find on the internet from sites like youtube are probably flv format. There is now a handy new tool that you can use to convert those flv files and burn them onto a DVD, it's called Replay Converter. As the start the program up you'll see a button that says 'add file'. Using this you can add files to the program's queue. Put a blank DVD into your DVD burner beforehand. Now with the files in the queue, tick the 'Burn to CD/DVD' option. You will have the option to...

How To: Find & extract duplicate records from a data set

This video is about finding duplicate entries in excel sheet. The example excel sheet contains different names. There are around 1000 different names in the sample excel sheet. CountIf(range,criteria) formula has been used to do the comparison and return of results in True or False mode. Type =CountIf( now move your left arrow key, this will generate the formula like =CountIf(A2. Now press Ctrl+Shift+Down arrow, this will select all the available values in the column. Now press F4 to lock it ...