National Security Search Results

How To: Protect your privacy online

In this video tutorial, viewers learn how to protect their privacy online. Some information that is exposed every time you visit a website are your I.P. address, operating system and browser. To view what information that you are revealing to a website, visit the site provided in the video. This site will give you all the information that you are exposing in a website. This video will benefit those viewers who visit a lot of websites, and would like to learn how to view the their exposed info...

How To: Understand Forex trading strategies

Forex— what is it? Any investor could tell you a complicated description of what Forex is, but the basics of the FX currency markets is— an over-the-counter financial market for trading currencies. The foreign currency exchange market has no central exchanges like the stock market and little regulatory oversight. With this beginner’s guide, learn the trading basics.

How To: Make watermarks in paper for security

Don't fret too much if your watermark is barely noticeable when you're finished with this project - the less obvious it is, the better a job you've done. Watermarkers are present in many types of paper, especially the monetary kind. If you hold up a ten dollar bill you'll see a watermark of Thomas Jefferson's face on the right, proving the bill is real.

How To: Enable the 'Ctrl-Alt-Del' login window on Windows 7

Use Microsoft Windows 7? Miss the old Ctrl-Alt-Delete log-in prompt? It's easy to restore. So easy, in fact, that this home computing how-to from the folks at CNET TV can present a complete overview of the restoration process in just over a minute's time. For more information, and to get started restoring this useful security feature on your own Windows 7 PC, watch this free video tutorial.

How To: Help your child stop stuttering

Stuttering is a communication disorder affecting over 3 million Americans. Stuttering can make school and other social interactions difficult. Although there are no instant cures, these tips will help your progression toward speech fluency.

How To: Add a watermark to photos in Photoshop

The PhotoshopUniverse team effectively teaches a method of adding a watermark to an image, as a security feature to make it harder to copy or steal. Instructions are simple and easy to follow, using as an example a photo of two girls that one might have in his or her family album. Using Photoshop, the text that will become the watermark is added, rotated and patterned across the entire image. To finalize the watermark, the opacity is edited to a desired value so that it does not interfere wit...

How To: Turn your doorbell into a guard dog alarm

This video shows you how to make a security device out of a door bell. The concept is that most thefts happen when people are away from home. To make sure of this the thief rings the door bell to make sure that nobody is home, if nobody answers then they will break in. A lot of people have dogs and alarm systems which will scare off the thieves, but this alarm system combines both. To make this devise you have to buy a speaker system that connects to your door bell. When the door bell rings i...

How To: Prep for auto racing with proper seat belt security

There are two ways to properly lock your seat belt. You can use the childlock auto adhjustment. Or you can recline the seat, but then push forward to make your seat belt very tight. You don't want to be flopping around in the car. The bottom of your wrist is on top of the steering wheel and your shoulder is in the seat. It will loosen up when you get on the track.

How To: Hack websites using cross-site scripting (XSS)

In this episode of Full Disclosure we are explaining the website attack known as Cross-Site Scripting (XSS). Cross-Site Scripting is a type of security vulnerability that affects web applications that do not sanitize user input properly. This kind of vulnerability allows an "attacker" to inject HTML or client side script like JavaScript into the website. Cross-Site Scripting is most commonly used to steal cookies. Cookies are used for authenticating, tracking, and maintaining specific informa...

How To: Make nutritious and easy one-dish meals

We all know how it goes: You've just come home from a grueling day at work followed by a grueling drive back, and you're beat. Even the thought of forcing your feet to the kitchen and turning on the stove makes you shudder. So you pick up the phone and order a pizza and buffalo wings. Sure, it's tasty, but is that really the best thing you could be eating?

How To: Make a fish hook from a bush

The video is about making a fish hook for the winter bushcraft national winter tutorial. The first step is to take a small stick and cut it so as to make it thin. Then an angle is cut at one end of the piece. The angle cut can be according to the maker's wish. Then cut out the part for catching. This small piece of stick is the hook. Take a piece of tree brush and wrap it around the hook. Wind it through the top and then the bottom of the hook until the hook is completely wrapped.

How To: Do the push away when bowling

Team USA's Lynda Barnes demonstrates the push away. Pick up some bowling tips and tricks to improve your game, whether you are a beginner or a competitive bowler in a bowling league. Learn how to do the push away with this bowling video.

How To: Use the six step approach when bowling

The timing of a young power player - Team USA's Derek Eoff - is examined. Pick up some bowling tips and tricks to improve your game, whether you are a beginner or a competitive bowler in a bowling league. Learn how to use the six step approach with this bowling video.