Key Factors Search Results

How To: This Is Why Your TSA-Approved Luggage Locks Are Useless

Last year, the Washington Post's Ashley Halsey wrote an article on what really happens to your luggage at airports. In it, they unwittingly published a photo of the master keys the TSA uses for TSA-approved baggage locks. Now, thanks to that picture and a French lock-picking enthusiast, anyone with a 3D printer can make their own master keys to unlock any TSA-recognized locks.

How To: Replace Piano Keytops

Piano keytops can become worn or broken. Replacing them with new keytops isn't as difficult a task as some would think. In the demonstration video you can see how the keytops are replaced and the materials needed in order to complete the job. Having the right supplies and information can make this piano repair job achievable.

How To: Replace a Broken Home Button with a Soft Key on Your Samsung Galaxy Note 2

There may only be a few hardware buttons on your Samsung Galaxy Note 2, but when they're not working, your phone might as well be a doorstop. A few years back, I was texting while walking to class and a student on a bicycle crashed into me. My phone was flung thirty feet—straight into a puddle. I picked it up and checked for damage, but everything seemed okay. The biker apologized profusely, but nothing was wrong, so I told him not to worry about it and proceeded to class.

How To: Create a 3D video game using Alice online software

Shaun will teach us how to create a 3D video game compatible with MAC or PC with no prior programming knowledge. First download Alice, a 3D World program that can be turned into a video game. Open Alice, click on "add objects", click on "more controls" and select your choice of aspect ratio such wide screen. Now you can import your own 3D models that Shaun will show you at the end of the tutorial or choose from a wide selection that comes with Alice. In addition, if you click on "home," "web ...

How To: Split a circle into segments in Xara Xtreme

Learn how to split a circle into segments with Xara Xtreme. First select the shape editor tool. Drag the tool to the circle. The dialogue at the bottom communicates what steps to choose next. Holding the Ctrl key drag a straight line within the circle, click on the selector tool (yellow arrow on the left of the middle row) to enable the option of selecting. This saves 1 line on drawing layer 1 also and enables the marquee (flexible box) that you want to manipulate around the circle encasing t...

How To: Find a cool Windows XP hidden Easter egg

In this tutorial the author shows how to find out a Cool XP Easter Egg hidden in the XP which comes by downloading the latest update of widows update. The author now opens Internet Explorer and visits the windows site. Now he quits the explorer and holds down both the Control key and alt key and right clicks on the desktop seven times. Now keeping the control key pressed, he releases the alt key and right clicks the desktop and chooses the option 'Create ShortCut'. Now he releases all the key...

How To: Encrypt Your Notes, Photos & Archives with EncryptPad

For anyone wanting to keep information private, plain text is a format of the past. Instead, cheap, powerful encryption is widely available, but often not easy enough to use to attract widespread adoption. An exception to this rule is EncryptPad, an easy to use application that lets you encrypt text, photos, or archives with strong encryption using a password, keyfile, or both.

How To: iOS 12 Makes 2FA for Third-Party Apps & Websites Easy with Security Code AutoFill from SMS Texts

Two-factor authentication (2FA) is a great way to add another layer of security to sensitive third-party apps and websites like Venmo. However, before iOS 12, to log into a particular 2FA-secured app or site on your iPhone, you'd have to memorize or copy the SMS code from Messages, then jump back in a timely manner to log in. Apple's latest iOS version streamlines this process.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 8 (More Windows Registry Forensics)

Welcome back, my fledgling hackers! Let's continue to expand our knowledge of digital forensics, to provide you the skills necessary to be a digital forensic analyst or investigator, as well make you a better hacker overall. In your attempts to enter a system or network undetected, it is key to understand what a skilled forensic investigator can learn about you, the alleged hacker.

How To: Swap the Menu & Back Buttons on Your Samsung Galaxy Note 2 for Easier Left-Handed Navigation

Throughout history, almost every superstition dealing with evil has had something to do with left hands. In the seventeenth century, it was thought that the Devil himself baptised his followers using his left hand. Today, studies show that left-handed people are more likely to be schizophrenic, alcoholic, delinquent, dyslexic, have Crohn's disease and ulcerative colitis, and a slew of other medical problems. To top it all off, left-handed people have an average lifespan that is 9 years shorte...

How To: Use 3 point lighting to light your videos like pros

Three point lighting is the key to MAKING videos look professional. Tom Skowronski, the associate editor of Videomaker, guides us through the process of three point lighting. Three point lighting involves the use of three types of light to create a professional appearance when video taping. First, a key light is used to provide bright illumination of the subject. Then, a fill light cleans up the dark areas on the face. Lastly, a backlight fills serves to separate the subject from the background.