Numerous Protecting Search Results

How To: Access blocked websites and bypass proxy servers

Are you using the Internet at a school, library, or some other place that blocks or restricts web access? Mom and dad still trying to protect you from online predators, even though you're more than old enough to be one yourself? Learn how to bypass proxy servers that block access to certain websites by watching this how-to video. In this case it's done to access Myspace but this method can be used with any blocked website. Follow along with this video tutorial and never get hindered by restri...

How To: Mix polyester resin

Resin mixing is an important part of composite manufacturing. Here's how to do it safely and with an acceptable margin of accuracy. Make sure to wear gloves to protect your hands and skin from the active agents in the resin.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 16 (Extracting EXIF Data from Image Files)

Welcome back, my greenhorn hackers! In many cases when a computer, phone, or mobile device is seized for evidence, the system will have graphic images that might be used as evidence. Obviously, in some cases these graphic images may be the evidence such as in child pornography cases. In other situations, the graphic images may tell us something about where and when the suspect was somewhere specific.

How To: Install House Wrap

G'day, Knuckleheads, and welcome to Episode 20 of my Owner Builder Series! In this Episode, we look at installing the Wall Wrap which goes on before the cladding is installed. It's a vapour membrane that protects the frame and internal linings from moisture damage.

How To: Draw broly

In this how to video, you will learn how to draw Broly. First, start out with an oval shape for the face. Next, add another for the ear. From here, you can add the neck, shoulders, and chest. Next, draw numerous spikes for the hair. The basic outline is complete. Go into the drawing with more detail by adding lines inside the spikes to simulate hair strands. Add the eyebrows, eyes, nose, and mouth. Next, draw in the muscles of the shoulders and chest. Add the outline of the necklace. Now you ...

How To: Eat starfish

Are you bored with ordinary meals? Why not tap into your adventurous side and try Starfish? Yes, that's right, those cute little fish that you see on the sand - you can eat them! So, if you are interested, check out this video and master the techniques needed to eat these spiny sea creatures.

How To: Start chicken picking

This video lesson introduces a basic philosophy on chicken pickin' or country playing. For country guitar playing, you don't need to use much in the way of effects, just a tiny bit of reverb and compression. Country isn’t dependent on one set of scales, like rock or blues. To play country, you must play over the chords much like a bluegrass or jazz player. It is no coincidence that many country players are also jazz players and vice versa. Every chord has different lines, chord shapes, or rif...

How To: Build a universal motion alarm to protect your home

This video shows us the method to make a universal motion alarm to protect your home. You will need a reed switch with an alternating contact, a 9V battery with a battery clip, a switch, a buzzer, a small plastic box and a magnet. When a magnet is brought near the reed switch, it switches to the other contact and the switch is open. If the magnet is removed, the switch is closed and the buzzer starts ringing. Make the circuit with correct polarity for battery and the buzzer. Make a hole in th...

How To: Remove a popcorn ceiling

Many acoustical or popcorn ceilings that were put in, in the 1970's, contained asbestos. If you are unsure about the contents of the ceiling take a piece and put it in a plastic bag and send it to a lab for testing. Once you know that the ceiling is asbestos free and you are ready to take it down, start by turning off the power to the room. Next put down a plastic drop cloth to cover the floor and furniture in the room and protect it from the water that you will be using in this process. Tape...

How To: 4 Apps to Help Keep Your Android Device Secure

As of 2016, there are approximately 1.85 billion Android smartphones worldwide. This growing popularity has led to an increasing number hacks and cyber attacks against the OS. Unfortunately, Android users need more protection than what is offered by Google. The good thing is that there are a number of options available.

News: Chinese Hack of U.S. Employment Records Reveals the Weakness of Signature-Based Defense Systems

With each day that dawns, there is a new, major hack that makes the news headlines. If you are paying attention, there are usually numerous hacks each day and far more that never make the news or are kept private by the victims. Every so often, a hack is so important that I feel compelled to comment on it here to help us learn something about the nature of hacking and IT security. This is one of those cases. Last week, the U.S. Office of Personnel Management (OPM) revealed that they had been ...