Letting Search Results

How To: Use Your "Dead" Car Battery to Power Emergency Fans, Lighting, and More!

A common misconception is that all car batteries die. This, in fact, isn't true—the majority of "dead" car batteries just don't contain enough juice to power a car, but they can still provide enough watts to keep emergency fans and lighting running, which is great when a power outage occurs. So, instead of lugging the battery to the nearest drop-off center or just letting it collect dust in the garage, you can put that car battery to good use.

How To: Access Hidden Mac OS X Settings in Lion and Mountain Lion Without Using Terminal

There are a lot of hidden settings in Mac OS X that you can change by using the Apple Terminal, but if you're not familiar with it, it can be tricky. Mountain Tweaks and Lion Tweaks are two apps created by Fredrik Wiker that cut out the extra step by letting you change those settings without having to use Terminal, therefore making it ridiculously simple. Since Mountain Lion is the latest version of OS X, we'll focus on Mountain Tweaks. There are three categories of tweaks. General Tweaks are...

How To: Flavor Your Water Naturally, Encouraging Hydration

Through the hot summer months staying properly hydrated can be difficult and boring. Water is not a good "flavor" after your third or fourth glass of the day. There are store-bought re-hydration beverages available but they are expensive and generally packed with sugar. Here is a simple way to flavor your water with things you most likely have in the house.

Tor vs. I2P: The Great Onion Debate

In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and messages asking the technical differences between the two. I'd like to thank all of you for letting me know what was on your minds, as you should always!

News: 9 Easy Exploits to Raise Combat Skills in Skyrim

Skyrim is an enormous RPG recently released by Bethesda. After many long years of waiting (I had 1000's of hours clocked into its predecessor, Oblivion, way back in 8th grade) the game is finally out and it surpasses everyone's expectations—save for removing custom spell crafting... Why, Bethesda?

News: Scrabble Finally Hits Android Devices... But Does It Beat Words with Friends?

Three years ago, Scrabble was one of the very first 500 mobile applications to appear on the new iTunes App Store, allowing iPhone users the chance to kill their Scrabble cravings on the go. It was a smart move for Hasbro and Electronic Arts (EA), but it's been two years and eight months since the Android Market opened for business, and they've just now released an official app for Android smartphones—Scrabble Free.

How To: The Essential Newbie's Guide to SQL Injections and Manipulating Data in a MySQL Database

No doubt you've seen some of the hack logs being released. One part that stands out over and over again is the heavy database usage. It used to be early on that virus and hackers would destroy data, usually just for lulz. However, with the explosive commercial growth of the Internet, the real target is turning into data theft. You should learn how this happens so you can protect yourself accordingly. Let's take a look at what makes this possible and dare I say, easy.

News: So You Just Bought Photoshop. Now What?

Photoshop. It’s like a mountain to climb. You can chug up to the top, working hard, never letting up, or you can just go part way up and scoot around the side of the mountain and still get to the other side. Not everyone needs to be a Photoshop guru, or ninja pixel punisher. There are a few things to know and be comfortable with in order to do lots of cool things. Here are some tips that will take you a little way up the mountain, somewhat in order of altitude.

News: Shocking End

All the Jackass actors put on a dog collar that shocks. Everyone gets their own collar. Their are remotes that can control the dog collar. By pushing a button on the remote, it will give a shock to a specific collar.

Next Page