Pdf File Search Results

How To: Create a new Skype account

For people who would like to find an easy way to communicate with their loved ones via video or voice chat on their computer, this video will show you how to create and use a Skype account. After going onto Skype.com, you should download Skype, since you will not be able to use this without having the program on your computer. After downloading the file, you should then create an account on the program that appears, creating a username and password. By following these simple steps, anyone wil...

How To: Find, download & install Firefox 3

In this tutorial the author shows how to find, download and install Firefox 3. He points out to the Mozilla Firefox website which is [www.mozilla.org/firefox]. Now you reach the Firefox web page where there is a link to download the browser. After clicking the link you will be prompted to save the file and now you can download the software. Now after the software gets installed the author guides you through the various steps to get Firefox 3 installed. He also shows how to transfer settings a...

How To: Fix games that won't work on the R4 card

Do you have video games that you long to play on your computer but have errors when you try to play them? Watch this video and your technical problems will be solved in only 6 minutes. Just sit down, relax, and watch the video that guides you with easy steps on how to fix corrupt rom files for games on your Nintendo DS! Be sure to follow the link in order to download the software required to fix your problems! You'll be playing your favorite DS games with ease in no time!

How To: Delete web browser cookies

Veronica Belmont shows how to get rid of browser cookies. She starts with explaining what a cookies is, that it is a small file downloaded to the computer from the internet so that the website can remember more information about the users, which she says is quite helpful if you visit a website regularly. She also explains about some malicious cookies which track user actions and report to websites. She now explains how to open options in Firefox browser or settings in Internet Explorer and wh...

How To: Backup & restore your bookmarks in Internet Explorer

how-to Backup and Restore Your Bookmarks in Internet Explorer ClearTechInfo shows you how to backup and restore all your precious bookmarks in Internet explorer. These bookmarks can be used on another computer or can be restored onto the same computer if and when the bookmarks get erased or corrupt.

How To: Install Puppy Linux on an innotek VirtualBox

The author shows how to install Puppu Linux 4.3.1 in Innotek VirtualBox 1.5.2. He shows steps to create a new virtual machine in Innotek VirtualBox, by showing the various configuration settings like the RAM size, hard disk space etc. He shows how to boot the virtual machine with the Puppy Linux installation ISO file. Next, during boot up, he shows how to set the language and regional settings, resolution settings etc. In the next screen he shows how to access the local drive and partition it...

How To: Enhance traditional art methods with digital media

Have you ever heard of tradigital art? Tradigital art incorporates traditional materials with digital media. This is a combination of such techniques as illustration with Decocolor Markers, Prismacolor Markers, pencils, and Photoshop. Watch this tutorial to learn how to enhance traditional art methods with digital media. It illustrates the tradigital process step-by-step. Make sure to pause the video after each step and look at the screen every few seconds while you are drawing.

How To: Rebuild the fire simulator in Houdini 9.5

Check out this masterclass on Houdini 9.5 and how to rebuild the fire simulator. Houdini's Fluid Tools offer a powerful simulation environment for visual effects artists. Senior Mathematician Jeff Lait introduces you to the basic building blocks for generating fluids and low level tools that make it easier to control the simulations.

How To: Convert VHS tapes to DVD with Roxio Easy VHS to DVD

This easy-to-follow video tutorial walks you through steps of converting old VHS tapes to DVD. Roxio Easy VHS to DVD is a combination of software and hardware that allows you to easily and quickly digitize old analog recordings. You simply attach the included hardware to a free USB 2.0 port on your computer, then capture from virtually any analog video or audio source.

How To: Transform an envelope into a gift bag

See how to make some cool gift / party favor bags for any occasion. They are made with envelopes. You can make them from nearly any size and type. The ones in the video are made with some surplus greeting card envelopes. Sometimes you can purchase "leftovers" from an office supply or drug store (any store that sells greeting cards). "Left-overs" mean that the cards get damaged or lost but the envelope is left. Just ask the manager if you can purchase them.

How To: Deal with a flirtatious boss or sexual harassment

He's not exactly demanding sexual favors, but his flirting is getting really gross. What's a girl who likes her job to do? You will need diplomacy and documentation. Assess his behavior. Now, don’t be offended, but we have to ask: Is he really coming on to you, or is he just a sociable, flirtatious kind of guy? If it’s the latter, just ignore it. Do your part to keep the relationship professional. Don't chat about how your last two boyfriends cheated on you and then expect him to know that di...

How To: Make an Assassin's Creed hidden blade prop

Adam from Chemical Reaction wants to show you a little movie magic. This video tutorial will show you how to make an Assassin's Creed hidden blade prop for your homemade film. If you're a fan of the Assassin's Creed video game, then you can't not make this hidden blade. This is a great prop for anybody wanting to recreate it for a fan film. It's cheap and quite easy and works pretty well.

How To: Use the Hacker Defender rootkit or HackDef

Hacker Defender is one of the most widely deployed rootkits in the world. It is a user-mode rootkit that modifies several Windows and Native API functions, which allows it to hide information (files, processes, etc.) from other applications. In addition, Hacker Defender implements a backdoor and port redirector that operates through TCP ports opened by existing services. This means it is not possible to find the hidden backdoor through traditional means, like launching a remote port scan agai...

How To: Build a steadycam for small hybrid digital cameras

Need to shoot a film for class and realized you don't have a Fisher Dolly and your cinematographer's hands are a little to shaky for what you would consider good filmmaking? Well, this video tutorial will show you how to make your very own steadycam. Check out how a nautilus design transforms into a more suitable steadycam; the gimbal is the key, and gimbals are very hard to find, especially the right one.

How To: Watch torrents on an Xbox with TorrentFlux and XBMC

TorrentFlux is an web-based system for managing bit torrent file transfers. It is an open source package (GPL) and developed for Linux, Unix & BSD platforms on the ubiquitous LAMP stack. In video tutorial, you'll learn how to set up TorrentFlux and how to share your downloaded content via a Samba share to an Xbox running XBMC. For detailed, step-by-step instructions, or to get started watching your own torrented media from the comfort of your couch, take a look.

How To: Create flickering text in Boris Title Toolkit for AE

Boris Title Toolkit gives Adobe After Effects users advanced titling capabilities for maximum quality, speed, and creativity. Using Title Toolkit, graphic artists can import ASCII or RTF files for fast, easy credit rolls, take advantage of rich text style options such as bevel borders, gradient fills, simulated extrusion, and embossing, and save or apply custom or preset text styles, gradients, and colors, all of which can be applied on a per character basis.

How To: Use the basics of GIMP

This tutorial is on GIMP Basics. GIMP is a free Photoshop substitute available for all platforms and pre-loaded in Linux operating systems. The tutorial covers the scale, crop, cut with transparency, flip, and rotate commands of GIMP. Part 2 covers saving and file size reduction in GIMP.

How To: Use Backtrack security software

A basic tutorial from InfinityExists.com on using Backtrack - the Linux-based security software package. This tutorial covers: Where to get Backtrack 2, How to burn an .ISO file, How to boot Backtrack 2, How to login, and start the GUI interface. It also illustrates basic Linux commands, and how to set up your Network Interfaces.

How To: Access All Your Mac's Files Right on Your iPhone or iPad — No Third-Party Software Needed

When you need a file on your Mac as soon as possible, you usually have to get your MacBook or hop on your iMac, Mac mini, Mac Pro, or Mac Studio. But that's too much work if you're in bed, lying on the couch, or outside in the fresh air. Why even bother when you can access that file directly on your iPhone or iPad — without moving an inch?

How To: 4 New Reminders Features in iOS 14.5 That'll Boost Your Productivity & Make To-Lists More Fun

Apple's Reminders app has come a long way. In the past, if you really wanted to keep track of your important daily, weekly, and monthly tasks, you needed to install a specialty third-party app to make it work. While those apps still offer valuable features, Reminders can get the job done for many iPhone users now. With iOS 14.5, Apple only sweetens the deal.

How To: Stop Photos from Automatically Creating iCloud Links When Sharing Images & Videos from Your iPhone

If you use iCloud Photos, Apple's iCloud link feature is meant to make sharing multiple photos and videos faster and easier, but it's not as great as you might think. Luckily, there's a way to stop your iPhone from creating them automatically, as long as you're running iOS 13 or later.

How To: Find & Exploit SUID Binaries with SUID3NUM

File permissions can get tricky on Linux and can be a valuable avenue of attack during privilege escalation if things aren't configured correctly. SUID binaries can often be an easy path to root, but sifting through all of the defaults can be a massive waste of time. Luckily, there's a simple script that can sort things out for us.

How To: Map Wardriving Data with Jupyter Notebook

With the Wigle WiFi app running on an Android phone, a hacker can discover and map any nearby network, including those created by printers and other insecure devices. The default tools to analyze the resulting data can fall short of what a hacker needs, but by importing wardriving data into Jupyter Notebook, we can map all Wi-Fi devices we encounter and slice through the data with ease.