Key People Search Results

How To: Carve a figure out of wood

Carved wood figures always present an aura of mystery. From the fearsome tribal masks of Africa to the towering totems of British Columbia, indigenous peoples have long created wooden guardians to channel their spirits and protect their peoples. Puppets can even move like us, mock us, or in the case of Pinocchio, come alive. Be careful wood carvers, for in your hands you possess the power of the gods, the power to create, the power to give life, and hopefully the power to make a cool sculptur...

How To: Lose belly fat without doing crunches

In this video tutorial, viewers learn how to lose belly fat without having to do crunches. The exercises provided in this video are: push-ups, squats and dumbbell squat raises. These exercise don't just work on the abdominal muscles. It is recommended to do each exercise until failure. These exercises use the abdominal muscles as stabilizers. The key to losing fat is to push yourself hard to do the exercise. Abdominal muscles are not designed to flex. Crunches do not help lose belly fat. This...

How To: Use the step boards on a 2010 Lincoln Navigator

On the 2010 Lincoln Navigator there's a handy feature called the deployable running boards, which are essentially step bars that automatically deploy when the car door is opened, to help you step inside your vehicle. This video demonstrates how they work, and how you can shut them on or off, because not everybody will find these useful — tall people definitely won't.

How To: Use the keyless entry number pad on a 2010 Lincoln MKS

Imagine, never needing to unlock your car door with a key. Actually, it's been around for a while, and it's called keyless remote entry, but on the 2010 Lincoln MKS, it's not remote… it's built directly into the side of the car door. It's a number pad with a programmable security code. This video will show you how to unlock your vehicle without even reaching into your pocket! If you have a MKS.

How To: Replace the battery in an iRiver H320 or H340

This is just a quick video to help you replace your iRiver Digital MP3 Player's battery. Patience is key in completing this disassembly and replacement, using just a small screwdriver and a few minutes of your time. This step-by-step video demonstration will show you the procedure for replacing the battery in your iRiver H320 or H340. You can use the replacement battery found in the video, or any other replacement battery, the results are the same.

How To: Preserve fresh fruit

With the growing popularity of buying local, many people are rediscovering the benefits of preserving fruit at home. Concerns over food origin, additives and preservatives are driving this trend and in just 20 minutes you can enjoy fresh produce all year long. Watch this how to video to learn more about picking fresh food and the preservation process.

How To: Use cherry and olive pitters

People always want to know the difference between cherry pitters and olive pitters. This how to video should help a bit. Yes, a cherry pitter will pit olives--if you're careful. But if you want to do a bunch of olives fast, the olive pitter is much easier to use. An olive pitter will not, however, pit cherries--they usually smoosh them.

How To: Bake rice krispie treats

If you want to see what it really looks like to make rice crispy treats with regular people and people in the kitchen just like you probably have then this video will do just that. RKTs are easy to make but can be a little tricky if you don’t know where you keep the pans.

How To: Encrypt Gmail messages with GPG and FireGPG

This tutorial will show how to use GPG and the FireGPG plug-in to encrypt and decrypt messages in Gmail. GPG is an open source implementation of OpenPGP (Pretty Good Privacy) , a public-key-encryption system. With public key encryption you don?t have to give away the secret key that decrypts data for people to be able to send you messages. All senders need is the public key which can only be used to encrypt, this way the secret key never has to be sent across unsecured channels. Encrypt Gmail...

How To: The Hacks Behind Cracking, Part 2: How to Generate Software Keys

If you've ever heard software piracy terminology being discussed, I'm sure the term KeyGens came up. KeyGens is short for key generator, which is a program that exploits algorithmic faults in software by generating software license keys that appear to be genuine. Normally used as a technique to protect the source code software and prevent piracy, a key generator exploits the key algorithm to effectively nullify the need for any software licenses. For example, we must try to find patterns in t...

News: Copy a key with a Coke can

Attention cheapskates and locksmith apprentices, this key copying solution is stunningly simple. We've really mulled over this one. As you can read in the comments below, people struggle with executing this successfully. But it can and will work. You just have to modify your key to fit your needs.

How To: Increase Website Traffic Using White Hat SEO Techniques and Free SEO Tools

Put simply, SEO = more organic traffic. And more traffic is always good for a web page / website (unless of course, you are an underground drug-dealer selling drugs worldwide via a spooky website whose URLs are as search engine unfriendly as possible, so that no one accidentally discovers your page and informs the police, sending to heaven both an exciting career opportunity and the likely Al Capone's successor).

How To: Build Your Own "Pogo Mo Thoin" to Flash Any Xbox 360 DVD Drive for Under $5

The biggest struggle with flashing DVD drives on Xbox 360s has been the price tag of the probe to extract keys on some drives. The probe and kit is required to extract the DVD key, which is needed to perform a drive repair, flash, or backup of any kind. Who wants to pay big bucks for the "pro" kit and then get added to a huge waiting list behind a million other people looking to buy the same product? We can hack the same thing together at home!

How To: Code Your Own Twitter Client in Python Using OAuth

This is my attempt to show people some cool things we can do with programming, and to give a small incentive for people to join the weekly Community Bytes. I wanted to make a tutorial on how to use Twitter from the command line with Python. This would have been an easy project to do not too far back, and a good bit of practice for a beginner to programming. It teaches that you can do useful stuff with programming. However, a while ago Twitter started using something called OAuth to access the...

How To: Use Trapcode Sound Keys After Effects plugin

Sound Keys is a keyframe generator plug-in for Adobe After Effects. Learn how to visually select parts of an audio track and convert that audio into keyframes. TrapCode Sound Keys After Effects plugin is great for audio-intensive animations. See how to use it in this tutorial. Use Trapcode Sound Keys After Effects plugin.

How To: Use the SpectraMatte Key Effect in Avid

Learn how to use the SpectraMatte Key Effect in Avid Media Composer Adrenaline HD and Avid Symphony Nitris to adjust and fine-tune color keys and and eliminate shadows and color spill. This can also be used to create green screen effects. Use the SpectraMatte Key Effect in Avid.

How To: Change shortcuts in After Effects

In this After Effects tutorial, Creative Cow leader Aharon Rabinowitz shows you how to be an AE road warrior by changing the keyboard shortcuts to account for missing keys on a laptop - such as the Ram Preview key or the Audio Preview key. Learn to customize your shortcuts in After Effects and improve your workflow. Change shortcuts in After Effects.

Uncrackable: Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt and decrypt as you need. GPG is a great open-source version of Pretty Good Privacy (PGP), a similar application used for encryption, but licensing and patent problems led to the development of GPG in its wake.

News: 5 Keyboard Shortcuts Every Windows User Should Know

Take a look around the next time you open up the File menu and slowly scroll through your editing options. Are your coworkers quietly cringing? Your kids running for the other room? Sounds like you need a few good keyboard shortcuts up your sleeve. Memorizing the right combos can transform you into a super speedy Windows superstar. Forget the mouse. Keyboard shortcuts are the new black.