Deemed Reliable Search Results

How To: Use an FM modulator in your car

There are many different ways to connect an iPod to an in-car stereo, however, some work significantly better than others. In this tutorial, learn how to use an FM modulator to listen to your favorite tunes. This is different than an FM transmitter which is much less reliable. The modulator is the best method of connecting an MP3 player to a car stereo without an AUX input jack. Check out this clip to get started.

How To: Choose a web hosting company

In this video about choosing a web hosting company. The narrator begins by saying that web pages are hosted on servers; the files that make up a web site are hosted or stored on a server. The narrator recommends a service called Host Gator. He indicated they are reliable and provide reasonably priced web hosting services. He briefly discusses the process they charge for their different levels of hosting services. Next he shows the steps to hook your domain name to the host account. He demonst...

How To: Use AppVerifier to debug Windows Mobile applications

If you've programmed a few Windows Mobile applications, you might need to perform some troubleshooting and debug the program to weed out all the problems. You can do this with AppVerifier. Marty Larson demonstrates installing, configuring and using the "AppVerifier" Application Verifier tool to debug Windows Mobile applications.

How To: Make a teepee from an inexpensive tarp

Ever wanted to build a backyard teepee? Here's your chance! In this two-part tutorial, learn how to contruct an inexpensive teepee out of a tarp. Easy to set-up, this teepee is roomy and fun to play in no matter what age you are! If in the wilderness, use this teepee for reliable shelter from cold or warm weather.

How To: Tie a double overhand loop fishing knot

The Double Overhand Loop is a very quick and easy way to tie a loop at the end of the line. It is not a very strong knot but it is fine for attaching a sinker. For most other applications other stronger knots are better options. The double overhand loop retains around 55 percent of the line original breaking strength. A simple and yet reliable fishing knot. Watch this video knot-tying tutorial and learn how to tie a double overhand loop fishing knot.

Hack Like a Pro: How to Perform Stealthy Reconnaissance on a Protected Network

Welcome back, my fledgling hackers! One of the first issues any hacker has to address is reconnaissance. Before we even begin to hack, we need to know quite a bit about the target systems. We should know their IP address, what ports are open, what services are running, and what operating system the target is using. Only after gathering this information can we begin to plan our attack. Most hackers spend far more time doing reconnaissance than exploiting.

How To: Measure pH levels with paper and meters

If you want to know the best way to get an accurate pH measurement, this shows the lab equipment needed and the processes used. When doing chemical reactions, sometimes the acidity or the basicity is important. This is usually defined as pH and measuring it can be very useful for getting the reaction right. There are a few ways to measure pH, and the simplest, cheapest, most reliable method is paper. But that's not all. See a whole lot of ways in this two-part video.

How To: Cold smoke sweet hickory country breakfast sausage

This is a two-part video tutorial on cold smoking country style pork sausage. IN part one, the recipe for this sausage is provided. Most of this video's concentration lies on ways the residential sausage maker can reduce his or her hazard exposure. From the video maker: "It is not meant to be taken as more than an introduction to the concepts of where some pathogens may come from and how they might be limited." Part two investigates these hazards, but is deemed: "not a substitution for a HACC...

How To: Join a data center for your Mac Mini server

How to Use Your Mac as a Server: Turn your Mac Mini into a server! Yes, that's right, with a little know-how and a little spunk, you can turn an inexpensive Mac Mini computer into a server to provide services over you network. You won't even need the Mac OS X Server, just the Mac OS X Client, so there is no extra software to buy, just the Mac Mini and it's operating system.

Walkthrough The Saboteur: Act 2, M3: Whisper or a Roar

Check out this mission on The Saboteur for the Xbox 360. The third mission in Act 2: A Whisper or a Roar is where Santos is looking for help again. When you get to the convoy, Sean points out that there are two very different ways to complete this mission. You can get a disguise, sneak up close to the convoy, and plant some dynamite, which would be the conventional route.

How To: Find the capital to start your own clothing line

The video presents "How to start your own Clothing Line Business". The steps include getting the financing, designing the prototype outfit/s, producing the line of clothing, promotion and sales. A good way of financing for a small business such as this is to sell your idea to family, friends and even colleagues. Research and prepare the business plan for your clothing line and be passionate about it in your presentation to convince them to fund your business. The next step is to get the produ...

How To: Use MIDI in Logic Pro 9

This Lynda tutorial teaches how to use the Logic pro, a songwriting application. Midi sequencing and quantizing is the main focus of this video. Midi is a short name for Musical instrumental digital interface. Midi is not sound. It is a low resolution computer protocol, developed in early 80’s to enable computer to communicate each other. Midi is fast, simple and reliable. It has a intensity stream. In this project, Scot Hirsch explained how a midi file is manipulated in Logic pro. Midi file ...

How To: Train a dog not to pull with loose leash walking

This how-to video quickly outlines exercises to get your dog walking on a loose leash by your side. Put very basically, teach the dog what you want them to do! And secondly, stop reinforcing them when they pull! A clicker training method is used, but if you do not have one, you can always use a verbal marker like yes. However you will get much faster and reliable results by using the clicker. If you hold the clicker in the same hand as the leash, and keep the treats in the other hand, you wil...

How To: Exploit EternalBlue on Windows Server with Metasploit

Particular vulnerabilities and exploits come along and make headlines with their catchy names and impressive potential for damage. EternalBlue is one of those exploits. Originally tied to the NSA, this zero-day exploited a flaw in the SMB protocol, affecting many Windows machines and wreaking havoc everywhere. Here, we will use EternalBlue to exploit SMB via Metasploit.

How To: Ship a car when moving

You've boxed up and shipped all your other possessions for the big move and all you're left with is the little issue of how your getting your car there. There are companies out there that will ship your car to you, just make sure your car is prepped for the journey.

How To: The Genius Way to Track Down the TikTok Song Stuck in Your Head

Songs new and old are given a fresh purpose through the TikTok meme machine, but it can be tricky to figure out where a track originally comes from. Sure, you can tap the name of the song to see the source on TikTok, but if it were a snippet uploaded by someone other than the track's creator, the song title likely wouldn't be listed. Luckily, there is an easy way to figure it out.