Pin Account Search Results

How To: Do knitting techniques spacing & marking buttonholes

Watch this knitting instructional video on spacing and marking buttonholes for knitting projects. This knitting demonstration uses the swatch of a right sweater front to show an easy way to mark the placement of buttonholes on your knitted material. Lily Chin attributes the method to Carol Anderson of Cottage Creations. You wil be working the button bands from the right side, from the bottom up, so you'll be marking the placement of the bottom of each buttonhole. If this was a boy's or man's ...

How To: Properly tie a toga for a party

Whether you're heading to a frat party, out for Halloween or just looking for a cool way to tie your towel at the beach - this video is here to help! Learn how to tie a toga, the ancient Greek way of dressing, and be ready for whatever costume situation may arise with a quick and cheap outfit!

How To: Use XNEST to log into another local user's account

Have you ever wanted to go into another user's account on your computer but had trouble finding the energy to log out, then log out, only to log back into your own account? Well, here's your solution: XNest will let you log in to another user's account from your account in a virtual way. It's very simple to set up and may just help you with your virtual account crisis!

How To: Replace an inner tie rod on a Ford Explorer

In order to replace a inner tie rod on a Ford Explorer, you will need to loosen the jam nut first. Remove the pin and the nut, next. Loosen the outer tie rod. Count the rotations as you remove it. Remove the bellows boot. The inner clamp is not removable. You have to damage it to remove it. You will need an inner tie rod tool. Use your inner tie rod tool and adapter. Spin it. Compare the old and new part to make sure that you have the right one. Now, reinstall the rod. Align the vent tube wit...

How To: Make white chocolate cheesecake

Expand your cheesecake horizons by making white chocolate cheesecake the next time your in the mood for a rich and decadent dessert! In this video, learn from Sue McMahon, cookery editor at Woman's Weekly magazine, how to make a delicious white chocolate cheesecake. This cheesecake takes a total time of four hours and thirty minutes to make and you will need the following ingredients:

How To: Create a frilled layers out of gumpaste for cakes

This video is showing how to create frilled layers on a cake. First you need one mini cake, rolling pin, one knife, one cocktail stick, rolling board, icing sugar, glue or water, and gumpaste to do this. First you have to roll out the gumpaste to very thin layer. Next cut it out round with the frill cutter. Next take a cocktail stick and then create wavy effect to the gumpaste. Sprinkle some icing sugar on the board to use it fast. Next cut the gumpaste. Next take the mini cake and apply some...

How To: Connect hardware peripherals to an HP TouchSmart PC

HP TouchSmart PC is a powerful computer with various features. You can use you PC to connect to other hardware devices like printer, scanner etc. A hardware device might not even work with you computer because the connecting cables might not match. So if you want a printer to connect to your computer you will need a USB connector. If your printer has a normal pin connector, you cannot work with it directly. In this case the other option is to print wireless, provided your printer supports it....

How To: Make herbal lozenges

John Gallagher explains the process of making herbal lozenges in which need slippery elm bark powder and licorice root slices both which sooth the irritation of the throat. You need half a cup of water and two tablespoons of honey along with a small bowl and a dough roller. To cut the dough get a bottle cap and store them in a small metal container. Boil half a cup of water and put licorice according to the number of lozenge required and simmer it on a low flame for 10 minutes. Take 2 tablesp...

How To: Make a mini pumpkin teapot for a dollhouse

The person in this video is teaching us how to make toys with the help of polymer clay. As you can see the video you can say that the person there is a girl. This lady is teaching to make a teapot to her daughter. Her hand is focusing the camera. First she makes a little ball with the help of polymer clay. Then she made few lines on that ball and press that ball slightly on the top. Then she takes another piece of clay and presses it but that one is too small. Then she use another on quit big...

How To: Make a DIY violin music themed party centerpiece

This do it yourself centerpiece is brought to you by A-Bnc parties and more. This starts of by making the bow, shown by painting a dowel and letting it dry. Then glue the 'frogs' at the ends of the dowel and glue fishing line to both frogs and trim to fit. Next take a polystyrene cut out of a violin and seal it. This helps paint stick to the surface of the cut out. The violin is painted brown to replicate an actual violin. Using black paint you detail the 'f' holes and allow to dry before pro...

How To: Cover a cake in minutes

Kate Hemmings on The Crafts Channel shows that covering a cake isn't as tricky as you may think. You will need a type of icing that rolls out, such as fondant icing. Ideally, you will want to have fondant icing with glycerine, and so the Pettinice brand is excellent in this case. If you use this icing, you will not encounter problems with cracking of the icing when you try to shape it over the cake.

How To: Make a cone record player

If you're record player doesn't work anymore, but it still turns, then this is the perfect solution for you. The video show you how to make a cone record player. It's also a neat trick for playing your records with out a record player, instead of a regular phonograph needle.

How To: Keep Law Enforcement Out of Your Android Device

With protests springing up across America, there's a chance you may have your first interaction with law enforcement. Many demonstrators will have their phones in-hand to film the action, which, sadly, could prompt an officer to demand the device and any self-incriminating data it may contain. Before this happens, you should know there are tools at your disposal to protect your data in such situations.

How To: Remotely Silence Alarms, Messages, Calls, Notifications & Other Sounds on Your iPhone to Keep Others from Finding It

Imagine a scenario where you're nowhere near your iPhone, but it's on loud, and you really need to silence it. An alarm may be blaring, notifications could be spitting out sounds left and right, and calls may be ringing. Things can get annoying real quick for whoever's around it. Plus, all that attention makes it easy for someone to find and possibly steal your iPhone. Luckily, you can quiet it down.

How To: Gift Apps & Games to Android Users

The iTunes App Store makes it easy to buy an app or game on someone else's behalf, and it's a great way to send an iPhone user a thoughtful gift. The Google Play Store doesn't have such functionality, but there are still a few workarounds to accomplish the same goal: gifting an app to an Android user.

How To: 11 Tips for Preordering an iPhone XR, XS, or XS Max Before They Sell Out

Apple's new iPhone XR, XS, and XS Max are sure to be hits this year. Of course, that means plenty of hungry customers are looking to sign up for a model once preorders begin on Friday, Sept. 14, for the XS models, and Oct. 19 for the XR. Luckily, there are preemptive actions you can take right now to avoid waiting outside an Apple Store overnight or getting kicked out of the preorder queue online.

Released: iOS 12 Dev Beta 3 (Public Beta 2), Includes Improved Maps, Bug Fixes & Security Patches

Apple released the third beta of iOS 12 for developers on Tuesday, July 3. The update comes exactly two weeks after the release of the second developer beta, which introduced a variety of fixes as well as new issues, and just one week after the release of the public beta. Public beta testers received this iOS 12 update on Thursday, July 5, labeled as public beta 2.

Advanced Phishing: How to Inject Meetings into Anyone's Google Calendar

Google Calendar is a cornerstone of the Google Suite, perhaps second only to Gmail itself. Whereas email is constantly plagued by phishing attacks, as of yet, the calendar is a relatively untapped social engineering attack vector. But it's relatively easy for an attacker to inject a meeting or event into a target's Google Calendar and use it to exploit them.

How To: Your Android Phone Comes with a Face ID Feature Built In — Here's How to Use It

The iPhone X has a new unlocking mechanism called Face ID, which replaces the old Touch ID system since the phone no longer has a fingerprint sensor. The way it works is simple — you just look at the phone, it recognizes your face, then the system unlocks — so Apple deserves the praise they're getting for it. But did you know you can get almost this exact same feature on any Android device right now?

How To: Wardrive on an Android Phone to Map Vulnerable Networks

Tossing an old Android smartphone with a decent battery into your hacking kit can let you quickly map hundreds of vulnerable networks in your area just by walking or driving by them. The practice of wardriving uses a Wi-Fi network card and GPS receiver to stealthily discover and record the location and settings of any nearby routers, and your phone allows you to easily discover those with security issues.