Pin Account Search Results

How To: Sew a spiral shaped hair scrunchie

The hair scrunchie in this how-to video is so easy to make, even a cat can do it. You will need a felt fabric square of 20 by 20 cm, an elastic string of 30cm, a cutting punch, a hammer, marking pins, scissors, two big beads, and a cutting mat. Watch this video sewing tutorial and learn how to make a spiral shaped hair scrunchie.

How To: Sew a frilly hair scrunchie

While scrunchies might not be that common a hair accessory anymore, you can make one of your own by following the steps in this how-to video. You will need two satin fabric pieces of 50cm, a sewing machine, sewing thread, a pair of scissors, marking pins, as well as brown and black satin fabrics. It's so easy to make, even a cat can do it. Check out this video sewing tutorial and learn how to make a frilly hair scrunchie.

How To: Create the layered lace embroidery technique

Embroider away with the layered lace technique! Add embroidered petals to your flowers and wings to your butterflies with a new technique called layered lace. After embroidering the separate pieces, layer them together for a fantastic three-dimensional effect! Layered lace is a wonderful embroidery technique for pins, barrettes, napkin rings, and more. Enjoy this instructional video.

How To: Apply 1950's style makeup

Bring the glamour of old Hollywood back with this 1950's makeup look. Learn how to apply pin-up 1950s style makeup with this tutorial. The following products were used in this video: Rimmel concealer, Avon bronzer, Clinique eyeshadows, Smashbox eyeliner black, Rimmel mascara, and Loreal Art Visage in "Carmen." With this how to video and you will be able to create a 1950's style makeup look.

How To: Open Previous Drafts Faster in Your iPhone's Mail App — From Any Mailbox or Folder

All of your partially written, unsent emails live in your "Drafts" folders, in limbo until the day they are sent off or deleted. In Apple's Mail for iPhone, you can access all drafts from all accounts in a combined "All Drafts" folder from the app's main Mailboxes list — but only if you added it manually. But there's an even better way to access all of your drafts in Apple Mail in iOS; it's just not obvious.

How To: Share Any Password from Your iPhone to Other Apple Devices

In iOS 11, Apple made it easier for you to share passwords with friends. Back then, it was just Wi-Fi passwords, which made sense. "What's the Wi-Fi?" gets old after a while. But now, whether you're running iOS 12 or 13, you can share any password you want with any iPhone around, all with one of iOS' best features: AirDrop.

How To: Transfer Your Apple Music Playlists to Spotify from an iPhone or Android Phone

Switching from one popular music streaming service to another shouldn't have to be a hassle, but it is if you want to transfer all your favorite music over. No popular service offers a built-in feature to export or import playlists, so if you want to move your favorite Apple Music playlists over to Spotify, you'll have to use a third-party service.

How To: Stop Third-Party Apps You Never Authorized or No Longer Use from Accessing Your Instagram Account

Unless you're completely new to Instagram, it's likely that you've linked your account with a third-party service at some point and forgotten about it. Those services still have access to data such as your media and profile information, so it's important that you not only know how to find these "authorized" apps, but that you know how to revoke their permissions.

News: Google Authenticator Is NOT the Best 2FA App Anymore

If you want the best two-factor authentication app out there, our pick is Authy. A close second is LastPass Authenticator. If neither of those is to your liking, try Duo Mobile or Microsoft Authenticator. But if you're fine with missing out on great features, then and only then should you look at using Google Authenticator.

How To: The Beginner's Guide to Defending Against Wi-Fi Hacking

Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a few simple actions, the average user can go a long way toward defending against the five most common methods of Wi-Fi hacking, which include password cracking, social engineering, WPS attacks, remote access, and rogue access points.

How To: Clean Up Android's Cluttered Share Menu

The share menu is a vital part of Android that lets you send data between between apps. Many of your favorite apps support the feature, including the new Direct Share sub-menu, which can lead to a messy share menu. However, there are a number of tools to clean up this clutter, three of which don't require root.

How To: Hack WPA & WPA2 Wi-Fi Passwords with a Pixie-Dust Attack Using Airgeddon

Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this tactic used to take up to 8 hours, the newer WPS Pixie-Dust attack can crack networks in seconds. To do this, a modern wireless attack framework called Airgeddon is used to find vulnerable networks, and then Bully is used to crack them.

How To: Protect Your Identity After the Equifax Cyberattack

Equifax reported on Sept. 7 that it discovered a breach on July 29 which affects roughly half of Americans, many of whom don't realize they have dealings with the company. Hackers got away with social security numbers, addresses, and driver's license numbers, foreshadowing a "nuclear explosion of identity theft." Let's explore what really happened and what you and those around you can do to protect yourselves.