Job Security Search Results

News: News Clips - July 4

» Homeland Security Report Lists ‘Liberty Lovers’ As Terrorists. A new study funded by the Department of Homeland Security characterizes Americans who are “suspicious of centralized federal authority,” and “reverent of individual liberty” as “extreme right-wing” terrorists. » British police get battlefield weapons.

How To: Perform a digital nose job in Photoshop

This Photoshop tutorial on performing a nose job using Photoshop contains detailed instructions on the use of Photoshop tools to, depending on taste, enhance the appearance of an individual. The person narrating the tutorial specifies the necessity of subtlety with the modification of the picture in order to remove any appearance of modification. The way described is essentially to select the general nose area, feather the selection by an optional amount, and set it in a separate layer. Then ...

How To: Use the overworked defender tactic in a game of chess

Ever here of the "overworked" defender" chess move? Of course you have, but that doesn't mean you know how to pull it off. See how to do it, right here. A chess piece is overworked when it has more than one defensive job (guarding pieces or squares) to do. Typically, the overworked piece is exploited by capturing one of the pieces it's defending or occupying a square it's defending. This forces it to leave one of its defensive jobs usually resulting in material loss or checkmate.

How To: Prepare a functional resume

This video resume-writing tutorial presents two case studies complete with challenges, strategies and sample functional resumes. Resumes are the key to getting into any job that you want. Watch and write a functional resume that will help get your foot in the door wherever you want to work.

How To: Build a handheld version of the TSA's microwave-based body scanner

With the TSA's full-body scanners occupying a great deal of airports nationwide, the debate remains as to whether air travelers should continue to be subject to immoral security techniques and possible health risks due to the x-ray scanning devices. The "advanced imaging technology" may help keep obvious weapons out of major airports, but scanning naked bodies seems more voyeuristic than crucial to national security. But while the argument continues, one woman is taking a stand… well, not rea...

How To: Observe good macro security practices when using Word for Mac 2011

Want to know how to keep safe when using macros in Word for Mac 2011? This video will show you how it's done. Whether you're new to Microsoft's popular word processing application, new to MS Word 2011 or even an expert merely looking to brush up on the fundamentals, you're sure to be well served by this quality video tutorial from the folks at Lynda. For detailed, step-by-step instructions, watch the video.

How To: Fill out the child tax credit worksheet

If you have children who are still your dependents and have been living in your household for at least half of the year, and have their own social security number, you can actually get a major tax credit with a simple worksheet. In this video you will learn the requirements for the tax credit and also how to fill out the worksheet and calculate your credit.

How To: Protect your Microsoft Windows PC against malware with Shadow Defender

Looking for a security solution for your Microsoft Windows PC? With Shadow Defender, it's easy! So easy, in fact, that this home-computing how-to from the folks at Britec can present a complete overview of the process in just under ten minutes. For more information, including step-by-step instructions on how to get started using Shadow Defender to protect your own desktop computer or laptop, take a look.

How To: Use Microsoft Excel macros securely

hether you're interested in learning Microsoft Excel from the bottom up or just looking to pick up a few tips and tricks, you've come to the right place. In this tutorial from everyone's favorite digital spreadsheet guru, ExcelIsFun, the 52.5th installment in his "Highline Excel Class" series of free video Excel lessons, you'll learn about macro security. For more information on how to use macros safely, watch this free video guide.

How To: Deal with a flirtatious boss or sexual harassment

He's not exactly demanding sexual favors, but his flirting is getting really gross. What's a girl who likes her job to do? You will need diplomacy and documentation. Assess his behavior. Now, don’t be offended, but we have to ask: Is he really coming on to you, or is he just a sociable, flirtatious kind of guy? If it’s the latter, just ignore it. Do your part to keep the relationship professional. Don't chat about how your last two boyfriends cheated on you and then expect him to know that di...

How To: Hack an Oracle database

In this installment from the Unorthodox Hacking series of Internet security tutorials, you'll learn how to get a shell on an Oracle database. To see how to pop a shell from within Oracle or even perform a port scan from the database itself, watch this hacking how-to.

How To: Secure your website with AccessDiver

AccessDiver is a website security scanner. It incorporates a set of powerful features that will help you to find and organize vulnerabilities and weaknesses in your own site. This video tutorial presents a guide to its use. For more information, as well as to get started using AccessDiver for yourself, watch this video tutorial.

How To: Use field templates in Axosoft OnTime

Did you know that field templates can be applied two different ways? And that the two "edit" buttons on the main interface tie directly into how these field templates are used? This installment from Axosoft's own series of video tutorials on the OnTime Project Management Suite discusses these topics and how to control such permissions through security roles.

How To: Hack an Apple iPhone running 2.0.2 firmware

There is a security flaw with any Apple iPhone running firmware version 2.0.2. This flaw potentially gives a person access to your email account and contacts when you have your iPhone locked. This video demonstrates a simple, but impermanent, fix for stopping others from accessing your private information. To protect your own Apple iPhone, watch this tutorial.

How To: Crate train a dog

Dogs naturally want to have a den, so a crate gives him his own space. Puppies will get security and comfort from a crate. Because a dog will not want to go to the bathroom where they sleep, they won't make a mess in their crate, making it useful for housebreaking a dog. Watch this video pet care tutorial and learn how to crate train a dog.

How To: Store passwords securely in Mac OS X

In this how-to, Gary Rosenzweig of MacMost.com takes a look at best practices for making and storing passwords. You should have a different password for every account, for example, use secure passwords and store them in using a security utility. Learn how to store your passwords securely with this tutorial.

How To: Controll your computer from your iPhone/iPod Touch

I explain how to view and control your computer from your iPhone/iPod Touch. This works over Edge and Wifi connection, but obviously the better your connection the faster it will go. If you are having problems connecting try going to control panel then security center then turn your firewall off. Also try turning off anything like virus protection.

How To: Use an ISA server

So what exactly is ISA Server? ISA Server, which stands for Internet Security and Acceleration Server, is Microsoft's software-based firewall, proxy, and web caching service/product. Now what does all of that mean? This video helps explain it!

How To: Justify a new job salary

SalaryExpert.com or Salary.com are two great Websites designated to informing people of expected salaries of particular job fields, so people know what to expect when offered a salary. Know what salary amount to expect when being offered a job in a particular job from a career adviser in this free video on job guidance.

How To: Stop procrastinating by rewarding yourself

In this tutorial, we learn how to stop procrastinating by rewarding yourself. To do this, you should first select one task you've been putting off for a long time. Then, time yourself and give the task one full hour of your time. Ignore everything else you have to do during this time, don't take breaks and let anything bother you. When you are finished with the task, give yourself a reward for completing this job! This will help you finish your task at hand and get things done more effectivel...

How To: Prep a classic VW Beetle Bug for a paint job

A new paint job can do wonders for any car, no matter how old it may be. It can give a look and feel to the car thanks to paint that may not have been available when it was being produced. But prepping a car, especially one that has been worked on, is an important aspect before any paint touches it. So in this tutorial, you'll find out some easy tips for making sure you get the right paint jo for you classic VW Beetle. Enjoy!

How To: Properly paint your home using a roller brush

Owning a home can be a great accomplishment for many men and women. Once you own it, you can do almost anything you want with it, even give it a new paint job. Now, painting is a fun and easy way to customize rooms in your home that may lack character, but it can be a tough job. This tutorial, presented by Lowes, will help show you how to properly paint your room using a roller brush and the right equipment. So good luck and try to stay clean. Enjoy!