Execute Search Results

How To: Replace the LCD Screen on an LG KF600 Cell Phone

Introduction In this article you will find instructions to replace a broken LCD screen of a LG KF600 phone. To execute these steps a new replacement LCD should be bought beforehand. Stores that sell replacement KF600 LCD screen can be found on the Internet. These instructions can also be used for other type LG phones that are part of the same family or have the same internal structure.

How To: Snag Prime Seats at an NBA Game

There is no fan experience in professional sports quite like watching an NBA game live. Partly, this can be attributed to the combination of fluid teamwork and jaw-dropping athleticism the players exude in the form of size, speed, jumping ability, grace, and strength. What truly differentiates the NBA from the spectators' perspective, though, is the figurative nakedness of the players. While the NFL buries its athletes beneath pads and masks, the NBA presents its talent in shorts and a tank top.

How To: Recover Lost Files and Images

You've had a massive hard disk failure.. ...in your PC or laptop and like a large number of people who think it will never happen to them...you did not have a backup of those 2000+ family pictures, those hundred of important Word documents, those family videos that you downloaded from the camera then erased from the cameras disk...the inevitable "I'm Screwed!'

How To: Bow hunt with the best bio-mechanical stance

Learn how to get your body into the best bio-mechanical position to execute the shot. This tip from professional archer and hunter Larry Wise teaches you how to bow hunt with the best bio-mechanical stance. He shows you the stance -- the full draw position -- to execute the shot with back tension when you bowhunt.

How To: Engage in a Guerrilla Marketing War

Warfare strategies have become an inspiration to different marketing professionals, many of them drawing influence from Sun Tzu’s Art of War. This ancient Chinese text provided treaties on how to effectively manage resources, tactical positioning, and timing attacks. It also states that “..if you know your enemies and know yourself, you can win a hundred battles without a single loss”, a basic concept in which you have to always watch your competitor to anticipate his next move.

How To: Do a Single Circle to Wave (Facing Lines) square dance

Square dancing, a fun American pastime! Learn square dance steps with this instructional animation. Fun fact about square dancing: 19 U.S. States deem it their official dance. Square dance is a folk dance with roots in Europe, eventually spreading to the states & becoming more of an iconic dance there. Square dancing consists of 4 couples arranged in a square formation. This square dance lesson is clear and to the point. Search "square dance instructional animation" on Wonderhowto for more sq...

How To: Do a misty flip revert with your kiteboard

Planning on going kiteboarding this weekend? Take a look at this instructional video and learn how to perform the impressive looking misty flip revert on your kiteboard. To execute this trick, you'll first want to pop a back side forward and grab your front hand heelside. Then rotate the kiteboard 180 degrees while flipping it. Lastly, just switch your feet and land in the other direction. Do a misty flip revert with your kiteboard.

How To: Plan a shot in pool

This video demonstrates good technique for planning and executing a pool shot, beginning with the 90 degree rule or the 30 degree rule. First visualize the aiming and impact lines, then the tangent line where the cue ball will go. Decide how fast to shoot depending on how far the ball is from the pocket. Select your hand position then execute the stroke, keeping your head down. Plan a shot in pool.

How To: How Cross-Site Scripting (XSS) Attacks Sneak into Unprotected Websites (Plus: How to Block Them)

XSS stands for cross-site scripting, which is a form of web-based exploitation that uses client-side vulnerabilities in a web page to execute malicious JavaScript codes. JavaScript is referred to as "cross-site" because it usually involves an external website containing the malicious code. That code is most commonly used to steal cookies with a website that the attacker created and hosted on another server. The cookies can then be used to escalate privileges and gain root access to someone's ...

How To: Hack Together an Accelerometer-Aware Mobile Website by Accessing Motion Sensors in JavaScript

Christian Cantrell, Adobe's Air Product Manager and Evangelist, has released a video to demo websites that take advantage of the motion sensors in a mobile phone, tablet, or laptop via JavaScript. Now, let's take a look through the code and break down the core pieces that you'll need in order to build your own sites that can determine the 2-axis tilt, 3-axis gyroscope, and compass direction of the mobile device it's being displayed on.

How To: Detect Facebook Spam

Spam is everywhere and Facebook is no exception. In fact, spammers are constantly stepping up their game by tricking unsuspecting Facebook users to participate in quizzes, games, apps, or "new features" that are actually dangerous computer viruses, spyware, or other trojan horses in disguise. Their attempts even trick people into unknowingly becoming spammers themselves.

News: Artist to Schlep Mammoth Chunk of Ice from Greenland to NYC

It's an ambitious How-To project to say the least, or more specifically, an over-the-top political art installation by San Francisco artist Brian Goggin. You may have previously heard of Goggin for his "Defenestration" project—an installation of "frozen" furniture, being tossed mid-air from a San Francisco apartment building. But Goggin's latest project sounds significantly more challenging to execute, considering the elaborate game plan involved:

News: 1.3 Million Dollar Surgical Robot Folds Paper Airplanes, Gives Manicures

Here's a two-in-one "tutorial" for you today; how to fold a paper airplane, and how to execute a belated St. Patrick's Day manicure. Just follow along and do as the da Vinci does—our adroit instructor is a surgical robot, with a hefty price tag of approximately 1.3 million dollars, plus several hundred thousand dollars in annual maintenance fees. In truth, the da Vinci doesn't have the brain power to dictate the folding of a simple origami plane, nor does it know how to paint orange and green...

HowTo: Make Kitty Crack

As a non-cat owner, catnip is a mystery to me. So, people essentially... drug... their cats? Weird. Google catnip, and you will find a whole slew of incredible images related to the topic...

News: DIY RC Helicopter Rig Captures Amazing Canon 7D/5D Aerial Footage

One of the greatest innovations in the DSLR revolution is not only being able to execute shots you never dreamed possible, but you'll find it's affordable, too. I can't think of a better example than this remote controlled DSLR helicopter rig, designed specifically for the Canon 7D and 5D. Advertised as "high definition, low altitude photography and videography," HeliVideo's founder, Eric Austin combines his experience and love of remote controlled helicopters with his knowledge as a videogra...

How To: Do a v-up ab exercise

The V-up is one of the more challenging ab exercises. While it may appear simple, there are several factors that make this exercise difficult to execute properly. Some of these factors include timing of the movement, counterbalancing, hip positioning, flexibility, and abdominal strength.

News: Fake Superhero Strength with Scam School

Congratulations to Brian Brushwood and Scam School for winning the 2008 WonderHowTo Magic Award! We're huge fans of the Scam School and with the votes, clearly you are too. Scam School and the Superhero Trick are the brainchild of spiky-haired magician Brian Brushwood. Brian is the only WonderHowTo Award winner with a self-produced action figure!

News: Easy Skype iPhone Exploit Exposes Your Phone Book & More

Like the recent XSS 0day exploit found in the Mac and Windows versions of Skype, a similar one has been found in the Skype app for iPhone. The vulnerability allows an attacker to send a message that contains malicious JavaScript code in the "Name" parameter. This code can steal your phonebook, crash the app, and potentially do a lot worse. The URI scheme is improperly identified for the web-kit browser. Instead of going to a blank browser page, it defaults to "file://". The code could steal a...