Mailing Address Search Results

How To: Copyright a book

You've written the great American novel, and you want to make sure that your story stays yours. Register your copyright and preserve your intellectual rights. In this video, learn how to copyright produced material.

How To: Read Gmails offline

In this video tutorial, viewers learn how to read Google email offline. Begin by logging onto your Google account. Then click on Settings and select the Labs tab. In the Offline headline, click on Enable. To not grab all your emails, go to the Offline tab and select which messages will be synchronized with your computer, based on labels and time frame. This video will benefit those viewers who use Google mail, and would like to learn how to read their emails offline in case their internet con...

How To: Magnify to edit text on an iPhone

In this Electronics video tutorial you are going to learn how to magnify to edit text on an iPhone. This video is a part of a series of tips on iPhone finger tips. This is very simple and easy to do and takes practically no time to complete. If you wish to add something to a list or change an email, go to the springboard and click on the ‘mail’ icon. Then scroll and find the text you want to edit. Now simply touch and hold your finger on the text. This will bring up the magnifying glass. Now ...

How To: Make innocent URLs appear suspicious with ShadyURL

Want to disguise your URLs so that they appear suspicious? In the style of websites such as Tiny URL that take your original URL and give you a shortened one to post on your blog or twitter feed, Shady URL takes your original URL and gives you one that might convince people not to click it. Go to Shady URL and paste the URL you wish to disguise. Click submit, and on the next page it will give you a URL that looks, well, shady. It might include something about a mail order bride or an investme...

How To: Open Windows mail attachments on a Mac

When you're a Windows OS user it's very easy to send out attachments on emails as .doc documents, made in Microsoft Office or Excel. But just because you're a Windows user doesn't mean your friend or coworker is. Or say that you're a MAC user and your friend keeps loading you with Microsoft Office documents. What do you do, other than telling him to stop already?

How To: Find your IP address with the Command prompt

In this video we learn how to find your IP address with the Command prompt. First, go to the start menu on your desktop. Then, find the run box and type in "cmd". After this, hit "enter" and then a black command prompt will show up on your screen. Next, type in "ip config" and then hit the enter button again. Now, a list of information will appear on the black screen. Look down the list to find the IP address listed on the page. Once you have this, you should write down your IP address and th...

How To: Hack into a Windows computer

This is how to hack a computer for educational purposes. First you need its IP address, radmin viewer 3.3 or later, and an open port scanner. Okay so first you need the IP and scan the IP address of the computer. Now find what open port it has. Ok then open up radmin viewer and put in the IP address and open the port you found. Now right click after you enter the computer's IP address and the open port. Select full control or view only and there you go. The computer has been successfully hack...

How To: Make a fancy folded Valentine's Day card

This video will teach you how to make an incredibly cute Valentine's Day card. This card tucks in itself to serve the purpose of both envelope and card, although an envelope should still be used for mailing it. All your valentines will know that you love them when you make this adorable card.

How To: Linux Basics for the Aspiring Hacker: Using Ship for Quick & Handy IP Address Information

Whether you're white hat, black hat, or some shade in-between, navigating through a network is a core part of hacking. To do that, we need to be able to explore a network to discover the addresses of gateways, interfaces, and other attached devices. When ifconfig just isn't enough, you can steer your way around a network with a convenient tool called Ship, the script for everything IP.

How To: Have Your Passwords Ever Been Leaked Online? Find Out with PwnedList

It seems like every other day there's a new security threat or data leak in the news. Whether it's your credit card PIN or your smartphone's apps leaking your email address, no one wants their personal information out there, especially passwords. And if you use the same email address and/or password for more than one site, the effects of someone getting hold of your credentials can be catastrophic.

How To: Speed up a Windows XP PC with TweakUI

Firstly download the TweakUI into your computer, which is free. Fire up TweakUI and click on menu "Explorer", uncheck menus: "Allow help on start menu"; "Allow log off on start menu" and so on play with the settings however you like. And select "Light arrow", next click on "Thumbnails" menu and drag the slider all the way to the right, increase the size of thumbnails to 120 pixels. Next double click menu "Common Dialogs" and uncheck all three menus. Next double click menu "Taskbar and start m...

How To: Build confidence on the phone and in voicemails

In this video Patricia Stark shows how to display voice mail confidence. Studies show that it takes only three seconds for somebody to size you up over the phone. You can know a lot about the person speaking on the other end of the phone and so you need to sound very confident while speaking to other persons. It is proved that when you smile when you are speaking on the phone it changes the whole delivery of your tone and if you are sitting there carelessly it will be reflected in your voice....

How To: Make a chain mail bracelet

You can learn to make a beautiful chain mail bracelet by watching this video. The bracelet is easy to make and affordable too. Start by sliding two silver jumper rings onto a paper clip. Two copper jumper rings are passed through the silver rings and twisted to complete the loop. Next, two silver rings are passed through the copper rings and twisted to complete the loop. Next, place the silver rings on either side of the copper rings and pull them up from between the copper rings, as shown in...

How To: Style bangs

Clueless when it comes to styling those unruly bangs of yours? Face fringes are cute and fashionable but need extra attention to keep them looking fresh. In this video, learn how to style those bangs easily and with style.

How To: Use a proxy and understand why they are important

In this video you are shown how to use proxies and why they are important. Proxies are useful because they shield you and make you anonymous over the internet, it also prevents websites from logging your IP address. To see how important it is to prevent this go to whatismyip.com. It will show you your IP, click on it and go to 'look up'. It will show you all the personal information that can determined from your IP address. The easiest way to proxy are VPN's, which stands for virtual private ...

How To: Your iPhone Can Help Keep Clutter from Piling Up in Mail and Messages — Here's How

Many of your accounts online likely require two-factor authentication (2FA) or two-step verification (2SV) to confirm your identity when logging in, and there's a good chance the second factor or step for each is a one-time email or SMS verification code. If you get a lot of email and SMS codes, it can clutter your Mail and Messages apps with junk if you don't delete the messages after signing in.

Rasberry Pi: Connecting on Computer

I have gotten comments from my last tutorial on not being able to do anything because of a lack of a monitor. In order to address this problem I'm gonna show you how to connect and control the Rasberry Pi through a SSH client on Linux, Mac, Windows, and Chromebook computers. This will probably we a long tutorial so please bear with me. Anyway, lets get to work.