Export Bar Search Results

How To: Lock your screen In Mac OS X

This video is about how to lock the screen in Mac OS X. 1. Opening the Keychain Access utility: Open up the Utilities folder. You can get to this by either hitting Command+Shift+U with the desktop (Finder) selected, or by opening Finder, browsing to the Applications folder, then double clicking on the Utilities folder.

How To: Get free custom-sized computer backgrounds from Desktop Nexus

Your desktop background image is feeling a little dull lately, huh? Fix that with some great background images for any sized computer screen. All you have to do is go to the website Desktop Nexus and find the one that fits your personality. This video shows you where to go and how to find your favorite backgrounds. All you do is search via the search bar on the site or browse around for cool backgrounds. Click "Enlarge" and it will scan you computer for the correct resolution, for the perfect...

How To: Take apart an Xbox 360 wireless controller for repair

In this tutorial, we learn how to take apart an Xbox 360 wireless controller for repair. First, grab your controller and grab a few different sizes of screwdrivers. After this, turn your controller over and start to remove all the different screws from their spots and place them onto a table where they won't fall. now, take the bar code off and take off the final screw that is on the inside. After this, you will be able to take apart your controller and fix whatever issue you are having with ...

How To: Create a new Windows partition with GParted software

In this tutorial, we learn how to create a new Windows partition with GParted software. First, insert your boot CD into your computer, then turn your computer off and it will automatically boot. Next, hit enter to select the first option, then wait for the scan to complete. When done, select your type of keyboard, then hit enter. After this, select your language and then continue to wait for the boot to continue. Once loaded, you will see the main partition. To split this, select it and click...

How To: Create a column line graph in Microsoft Excel 2007

In this software video tutorial you will learn how to create a column line graph in Microsoft Excel 2007. First you type in the data in to the work sheet. Then highlight the data and click 'insert' on the menu bar. Here you select the 'column' option and go down and click on the type of column that you want. And the graph is automatically presented. Now click on 'move chart' and select a sheet where you want the graph to be moved to and click OK. To change any field in the chart in to a line ...

How To: Make your own donuts from biscuit dough

In this video tutorial, viewers learn how to make donuts from biscuit dough. The biscuit dough should be jumbo sized. Then make a hole in the center of the dough. To make a hole, simple place a circular object into the center of the dough and press down on it to cut the hole out. Now fry the dough, making sure that the oil is hot enough. Make sure not to over fry the dough. Then add 1/4 cup milk and mix it with the dough. Now mix and melt a bar of chocolate. Now dip the donuts into the chocol...

How To: Use the step boards on a 2010 Lincoln Navigator

On the 2010 Lincoln Navigator there's a handy feature called the deployable running boards, which are essentially step bars that automatically deploy when the car door is opened, to help you step inside your vehicle. This video demonstrates how they work, and how you can shut them on or off, because not everybody will find these useful — tall people definitely won't.

How To: Find computer's IP address

In this tutorial, we learn how to find your computer's IP address. An IP address is used to know the exact location of someone using a computer with internet access is located at. First, turn your computer on and go to your main desktop. Then, click on "start", (which is located on the lower left hand side of the tool bar at the bottom), then click "run" and once that opens up, type "cmd" into the white empty space. Hit "ok" and when this comes up, type in "IPConfig" and hit "enter". Your com...

How To: Record songs from the Internet without a microphone

In this video tutorial, viewers learn how to record songs on the Internet without a microphone. Begin by putting the sound control icon into the application bar. Then go to Volume Control and click on Properties. Click on Recording and then select all the recording options. Now close the window. Then select the mixage on the volume control, but do not close it. Then open the sound recorder in the Start menu and find the song that you want to record on the Internet. Play the song and click on ...

How To: Take apart your whole Xbox 360 controller

To take apart the controller you will need a Torx t8 screwdriver and a Philips head screw driver. There are 6 obvious screws on the back of the controller and there is one hidden and one behind the bar-code in the battery compartment on the back. Remove all of the screws, push down on the right and left triggers and pull the controller apart. Pull the board apart and don't worry you won't break anything unless you are really rough. Remove the rest of the buttons, they come out just by pulling...

How To: Play "Wagon Wheel" by Old Crow Medicine Show on guitar

All of us guitar players love to play our favorite songs on our own guitars. Sometimes it is hard to learn how to play specific songs. It can also be difficult to locate a tutorial on how to play these songs! Old Crow Medicine Show's "Wagon Wheel" is a great song that is fun to play, especially for fans of Bob Dylan. By viewing this 5 minute video and with practice, you'll learn how to play "Wagon Wheel" like a professional! If it is hard for you to bar your frets, be sure to use a capo and l...

How To: Make a baseball diamond centerpiece for a party

This how-to video shows you how to make an infield base to anchor your baseball centerpiece for your Bar or Bat Mitzvah, theme wedding party, sports theme event, corporate event, etc. Indoor/outdoor grass carpeting covers the infield, baseball bases and baseball (or team color) ribbon add accents. Ideas of what your final centerpiece can look like as well as other enhancements, are also shown. Watch this how-to video to learn how to make your own baseball diamond centerpiece.

How To: Unlock Safari's Secret Dual-Search Engine Experience to Optimize Your Web Browsing

If you prefer to use Google or another search engine for everyday browsing in Safari but would also like a more secure browsing experience for all your secret searches, there's a simple way to switch between them quickly while also adding additional layers of security on top of your already clandestine browsing.

How To: Shut Down & Restart the iPhone 12, 12 Mini, 12 Pro, or 12 Pro Max

Except for the second-generation iPhone SE, all new iPhone models omit the Home button. In its place, the Side button takes charge, taking care of tasks like pulling up Siri, activating AssistiveTouch, and opening Apple Pay. If you swap your older Home button model for an iPhone 12, 12 mini, 12 Pro, or 12 Pro Max, you'll need to relearn simple actions like shutting down and restarting the device.

How To: Remove the 'Browse' & 'Listen Now' Tabs for Apple Music on Your iPhone to Keep the Focus on Your Library

The Music app for iPhone underwent a significant update back in iOS 8.4 when the Apple Music subscription service was incorporated into the user interface. It then had another transformation in iOS 10 that improved the UI for everyone. But things can still feel a little cluttered in Music, even in iOS 14, especially if you don't or never will subscribe to Apple Music.

How To: The Paranoid Mac Owner's Guide to Defeating Remote Snooping & Evil Maid Attacks

If you're worried about the security of your Mac, there are easy measures to prevent the most dangerous attacks. Named after the tactic of accessing an unattended computer in a hotel room, we can thwart "evil maid" attacks with Do Not Disturb and LuLu, free macOS tools by Objective-See that keep an eye on unattended computers and flag suspicious network connections that indicate a malware infection.

How To: Add Dissolves, Wipes, Fades & Other Video Transitions in Enlight Videoleap for iPhone

An edited video with lots of different clips needs great transitions to be successful. Transitions support your story and message, and without any, there's always a chance that your audience might lose track of what's going on and when. When editing in Enlight Videoleap for iOS, you can easily add cut, dissolve, iris, wipe, slide, and fade transitions to your video clips with just a few taps.

How To: Back Up Your iPhone Photos & Videos with Google Photos for Free

Since iCloud's introduction in 2011, you get only 5 GB of complimentary cloud storage with your Apple account. With iPhone backups, app data, iCloud Drive files, and even emails (if you have a Mac, Me, or iCloud email address), you'll quickly run out of space to back up photos and videos. Fortunately, Google offers 15 GB of free storage, making it easy to upload your Camera Roll for safekeeping.

How To: Leverage a Directory Traversal Vulnerability into Code Execution

Directory traversal, or path traversal, is an HTTP attack which allows attackers to access restricted directories by using the ../ characters to backtrack into files or directories outside the root folder. If a web app is vulnerable to this, an attacker can potentially access restricted files that contain info about all registered users on the system, their permissions, and encrypted passwords.

News: The 5 Best Free Twitter Clients for iPhone

Twitter's official iOS app is adequate if you're not much of a tweeter, but if you are, there's a lot of useful features that are missing. Luckily, there are plenty of free Twitter clients available that you can use on your iPhone. These third-party apps have features such as customizable interfaces, post scheduling, and different browser options for opening links, to name just a few.

How To: Use Maltego to Fingerprint an Entire Network Using Only a Domain Name

Hackers rely on good data to be able to pull off an attack, and reconnaissance is the stage of the hack in which they must learn as much as they can to devise a plan of action. Technical details are a critical component of this picture, and with OSINT tools like Maltego, a single domain name is everything you need to fingerprint the tech details of an organization from IP address to AS number.

How To: Use a "no CD" crack to play PC games without a disc

In this tutorial, we learn how to use a "no CD" crack to play PC games without a disc. First, go to www.gameburnworld.com and search for your game using the search bar. Once you find the game you want, click on the version that you want. After this, the game will start to download onto your computer using the software you choose. Once it's finished, install it and open up the executable file. Now, move this file and make a copy of it on your desktop. Now you can delete your original copy and ...