Internet Enabled Device Search Results

How To: Convert FLV or MPEG to MP3 on your Mac

Latest video files come in different formats. Some of the programs and devices are compatible with only a few formats and this requires you to convert files between different formats frequently. Lot of streaming files on the internet are in FLV or MPEG format and to use them on your portable devices you may need to convert them into MP3. To do this you will be needing a application called VLC media player. VLC is the most powerful open source medial player which almost supports all of the vid...

How To: Tether and use your MetroPCS phone for internet access

This video will show you how to tether your Samsung Messager 2, (the MetroPCS phone) to your PC to use as a modem for internet access. This will allow you to use your cell phone as your internet connection point, meaning you'll connect to the net for the cost of your cell phone's data plan. You will need your Samsung USB cable, a PC with Windows 2000 or higher, all current drivers for your phone and PC, and you will also need to head here to get the Samsung PC Studio program. This is part 1 o...

How To: Tether your Motorola Droid 3G smartphone

In this clip, learn how to use PDA Net to tether your rooted Droid 3G smartphone to a WiFi network. By tethering your device, you will be able to use it as a portable, wireless modem for anything from other phones to computers to hand held gaming systems. Anything that is WiFi enabled can be tethered to your mobile network with this hack.

How To: Turn on Bluetooth on your Android phone

Enable Bluetooth on your Android smartphone. One of the salient advantages of a Google Android smartphone over, say, an Apple iPhone, is the inherent extendibility of the open-source Android mobile OS. There are a seemingly infinite number of settings to tweak and advanced features to discover and use. This free video tutorial will show you how to turn on Bluetooth on your Android device.

How To: Explore prosthetic options for the gym as an amputee

A below elbow arm amputee demonstrates the device he uses in the gym. He shows you how to use a prosthetic for working out at the gym when you've suffer a limb amputation. This video is very helpful in describing utilities available for enabling individuals with amputations to workout or get around and function in a gymnasium setting. This is a video that addresses adaptive equipment for handicapped or disabled people.

How To: Enable Offline Finding on Your Galaxy So You Can Locate Your Phone in Airplane Mode

Nowadays, even the dumbest thieves know that the first thing you should do after you steal a phone is turn on airplane mode. Not only does this make it harder for police to track the phone through cell tower triangulation, but it also disables security features the person you stole it from may have implemented — for instance, Samsung's Find My Mobile service.

How To: Use U2F Security Keys on Your Smartphone to Access Your Google Account with Advanced Protection

Security-minded users can reduce the risk of phishing by enabling Advanced Protection on important Google accounts, requiring a U2F security token to log in. Using these keys isn't intuitive on most popular smartphone platforms, and you can find yourself locked out if you don't plan ahead. You'll need to learn and practice using U2F keys on your device before enabling this layer of security.

How To: Change Your Android TV's Screensaver

Much like the Chromecast, Android TV devices such as the Nexus Player and Nvidia Shield TV have always had those beautiful background images as their default screensaver. However, unlike the Chromecast, these "Backdrop" images, as they're called, weren't always customizable on Android TV.

How To: Make a bootable ISO file/disc

The video is about making a ISO file or a disc.To enable this you must have ISO installed on your system.The video begins by opening the Image burn setup wizard file.Once you have opened it , keep clicking next until you are finished with the installation. Then you have to insert a blank CD into the drive. Once you have done that a window will pop open displaying options for the CD.Click on the mode option in the window and select ec mode and then click on the first option displayed which is ...

How To: Play Xbox 360 on iPhone 3GS

This video will show you how to play on your Xbox 360 using your iPhone 3GS. In order to do that just follow these steps: You will need to get a Slingbox Solo, a composite cable and the Slingbox Player installed on your device. Now you will need to plug in the composite cable into the Slingbox Solo and into the Xbox 360. Connect the Slingbox with the wireless router and with the internet modem. Now configure the network and connect with the iPhone. The last thing to do is to start the Xbox 36...

How To: Hack Google

Learn how to hack Google with this amazing video. This video will teach you how to hack Google by using advanced search operators and esoteric search terms to find “hidden” files and mp3s quickly and easily; you'll also learn how to use Google to hack unprotected Internet-controlled devices like webcams and security cameras. For more information on Google hacking, and how to get started using these hacks yourself, take a look at this instructional video!

How To: Remotely Silence Alarms, Messages, Calls, Notifications & Other Sounds on Your iPhone to Keep Others from Finding It

Imagine a scenario where you're nowhere near your iPhone, but it's on loud, and you really need to silence it. An alarm may be blaring, notifications could be spitting out sounds left and right, and calls may be ringing. Things can get annoying real quick for whoever's around it. Plus, all that attention makes it easy for someone to find and possibly steal your iPhone. Luckily, you can quiet it down.

How To: Transfer Your Authy Account to a New Phone

One of the main reasons Authy was able to top our list of the best two-factor authentications apps was its ability to transfer access to a new device. This feature ensures that whenever you get a new phone, you don't lose all your tokens. However, if the process is done incorrectly, you can leave your account vulnerable.