Key Term Search Results

How To: Wire a 555 timer chip for PWM

This demonstrates how to wire a 555 timer chip for Pulse Width Modulation. Items used: solderless breadboard, 555 chip, 510 ohm resistor, 100k ohm variable resistor, 1 RGB LED at 20-25ma, wires, and 9v battery. And those vertical lines are what i mean in terms of what you can see only on the camera. You can see the led light of course without the camera.

How To: Make key lime pie from scratch

Chef John and his mother show us how to make her key lime pie.Here is the recipe:it will make enough for two pie crusts. You need salt, flour,shortening,ice water.The filling requires 3 eggs,3 limes, sweetened condensed milk, green food coloring whipped cream, and lime zest.

How To: Create your own hot keys in After Effects 6.5

This tutorial goes over how to edit the text document that controls the hot key (shortcut key) commands. It doesn't go into the advanced commands or even begin to describe the various commands that you can invoke by changing the text document, but most of the users who will be editing this are ADVANCED USERS. NEVER. NEVER change the shortcut settings on a machine that is not yours and ALWAYS. ALWAYS make a backup copy of the document before you start to work on it.

How To: Slow play a Texas Hold'em hand

Are you not quite sure what slow playing mean in poker terms. You should only slow play when your hand is very strong and the odds of the next card giving your opponents a stronger hand very small. Master the art of slow playing and win more hands than before.

How To: Track Your Lost iPhone, iPad, or Mac Even When Its Offline — As Long as This Feature Is Enabled

Apple's latest updates to its operating systems add another security feature to its Find My service, so you have an even better chance at locating your lost iPhone, iPad, or Mac should it ever happen. As long as you have the option enabled, you can leverage other Apple users' devices to find yours on the map.

How To: Use Google's Advanced Protection Program to Secure Your Account from Phishing

It's easy to have your password stolen. Important people like executives, government workers, journalists, and activists face sophisticated phishing attacks to compromise their online accounts, often targeting Google account credentials. To reduce this risk, Google created the Advanced Protection Program, which uses U2F security keys to control account access and make stolen passwords worthless.

How To: Use the Chrome Browser Secure Shell App to SSH into Remote Devices

Many guides on Null Byte require using the Secure Shell (SSH) to connect to a remote server. Unfortunately for beginners, learning to use SSH can become a confusing mix of third-party programs and native OS support. For Chrome OS users, using SSH is even more difficult. We'll fix this by using the Chrome Secure Shell to establish an SSH connection from any device that can run a Chrome browser.