Medical Data Search Results

How To: Budget w/ ledger sheets in Microsoft Excel: Mac 2008

Don't want to shell out the big bucks for some fancy, expensive budgeting software? Well, if you have Excel 2008 for Mac installed, you can manage your budget right there. Personal financing doesn't get easier than this— even business finances are easy to keep track of. The Microsoft Office for Mac team shows you just how to manage your finances with pre-formatted Ledger Sheets in this how-to video.

How To: Build a handheld version of the TSA's microwave-based body scanner

With the TSA's full-body scanners occupying a great deal of airports nationwide, the debate remains as to whether air travelers should continue to be subject to immoral security techniques and possible health risks due to the x-ray scanning devices. The "advanced imaging technology" may help keep obvious weapons out of major airports, but scanning naked bodies seems more voyeuristic than crucial to national security. But while the argument continues, one woman is taking a stand… well, not rea...

How To: Disable (prank) the Shut Down button in the start menu on Windows XP

If you love computer pranks, this is one of the easiest ones to pull. This video will show you how to remove the Shut Down button from the start menu in Windows XP. Actually, it does't remove the shutdown button, it just disables it, giving the user a restriction message, stating "This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator."

How To: Jailbreak an iPhone 3G or iTouch 2G 4.0 / 4.0.1

As of today, there are no legal barriers standing between you and jailbreaking your iPhone, iPad, or other mobile device. Hooray! If you were afraid of Apple coming to your house at night if you jailbroke your phone, you can finally let go of the fear and make your iDevice the beast it should have been all along! This video will show you how to jailbreak a iPhone 3G or iTouch 2G with iOS version 4.0 or 4.0.1 using Redsn0w. Now you can fully enjoy your Apple device.

How To: Replace a hard drive in a late 2008 MacBook Pro

In this how-to video, you will learn how to replace a hard drive in a 2008 Macbook Pro. Make sure you use the proper anti-static precautions before replacing the device. You will need a T6 screwdriver and a Phillips screwdriver. Make sure you transfer your data from the old drive to the new one before installing. Shut down the computer, close the lid and turn the laptop over. Remove the battery cover and battery. The hard drive is held by a plastic retaining bar. Loosen the screw holding the ...

How To: Install a hard drive in a 13" MacBook Pro (2009)

To install a hard drive in a 13" (13 inch) Macbook Pro laptop computer released in 2009 you will make sure to first transfer all data off the drive then discharge any static electricity from your hands making sure your are in a static free work environment. Next you will remove the old hard drive, to do this flip over the laptop and remove the 10 screws around the edge of the device with a #00 Phillips screwdriver starting with the three longer screws on the top right. Next, lift off the bott...

How To: Install a hard drive in a 17" MacBook Pro

In this how-to video, you will learn how to install a hard drive into a 17" Macbook Pro. Make sure you use the proper anti-static precautions before going on with this procedure. You will need a pry tool, a Phillips screwdriver, and a T6 screwdriver. Make sure you transfer your old data into the new drive before installing. Shut down the computer and flip the laptop over. Unscrew the ten screws around the bottom. Now, remove the cover. You will see the hard drive at the lower right. Loosen th...

How To: Install a hard drive in a 15" MacBook Pro (2009)

In this video from MacOSG we learn how to install a hard drive in a 15" Macbook Pro from around 2009. For this you need a #00 Phillips head screwdriver and a T6 Torx screwdriver. Make sure you use proper anti-static precautions with this. Transfer your data to the new drive before installing. To remove the hard drive, flip over your Macbook. Use your Phillips to remove the 10 screws. Remove the 3 at the right which are longer than the other screws. Then remove the left most screw which is the...

How To: Use Houdini voxel fluids

Created by Houdini Product Specialist Stephen Tucker, this crash course series focuses on the concept of fluid dynamics and how they work within Houdini. These videos on Voxel Fluids should help any artist get up in running with the foundation tools available for creating fluid effects in Houdini 9.5. Topics range from how to create a container to how to gain access to fluid attributes for shading, and even passing data from volumes to particles.

How To: Restore files in Windows using Data Recovery Wizard

In this video the instructor shows how to restore lost data. When you delete your files you can restore them from the recycle bin. But if a hard drive is formatted all the data is lost and you can not even recover it from recycle bin. In such cases you will need to use data recovery tools to recover that lost data. In this video the instructor uses the Data Recovery Wizard software to recover the data. Start the Data Recovery Wizard. In that there are three options by which you can recover yo...

How To: Develop psychic powers

Roughly half of all Americans believe in extra sensory perception... Are you part of that statistic? Ever get the feeling you have a paranormal ability? You can investigate your psychic abilities and hone your skills with these tips.

How To: Keep Law Enforcement Out of Your Android Device

With protests springing up across America, there's a chance you may have your first interaction with law enforcement. Many demonstrators will have their phones in-hand to film the action, which, sadly, could prompt an officer to demand the device and any self-incriminating data it may contain. Before this happens, you should know there are tools at your disposal to protect your data in such situations.

How To: 10 Privacy Settings in iOS 13 That Everyone Should Double-Check

Apple has seemingly always made it a priority to show how much it cares about user security and privacy — enough that it has a page dedicated to it, proclaiming that "privacy is a fundamental human right." It's true that there are few issues more important than user privacy when it comes to technology, and Apple only makes things better in iOS 13.

Android for Hackers: How to Backdoor Windows 10 & Livestream the Desktop (Without RDP)

The Windows 10 desktop and microphone can be livestreamed without using Remote Desktop Protocol (RDP) software and without opening any ports on the target computer. A hacker with low user privileges can monitor and exfiltrate a target's every move and private conversation in real time no matter where they are. Hackers are watching and listening, and there are few ways to protect yourself.

How To: Use Cerberus to Take Control of Anyone's Android Phone

If you need to hack an Android device, try a remote administration tool. Known more familiarly as a RAT, there are open-source RATs that are barebones and exorbitantly priced RATs that are more polished. There are also low-cost and polished RATs that aren't intended to be RATs at all, such as Cerberus, an anti-theft solution available right on Google Play.

How To: It's Not Just Your Camera & Mic — Here's All the Crazy Ways Your Phone Could Be Used to Spy on You

As you're surely aware, your phone can be used against you. Thanks to our cameras and microphones, a clever hacker can obtain access to your device and invade your privacy. But spying isn't limited to just these two sensors — gyroscopes, proximity sensors, QR codes, and even ads can be used to paint a very clear picture about who you are and what you're currently doing.

How to Hack Wi-Fi: Hunting Down & Cracking WEP Networks

While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and they can be cracked in a matter of minutes. We'll show you how a hacker would do so and explain why they should be careful to avoid hacking into a honeypot.

How To: Use Google's Advanced Protection Program to Secure Your Account from Phishing

It's easy to have your password stolen. Important people like executives, government workers, journalists, and activists face sophisticated phishing attacks to compromise their online accounts, often targeting Google account credentials. To reduce this risk, Google created the Advanced Protection Program, which uses U2F security keys to control account access and make stolen passwords worthless.