Privacy Protection Laws Search Results

How To: Change These Settings Now to Protect Your Data in Case Your Phone Is Stolen

As smartphone users, we live in dangerous times. The value of phones continues to rise, making them prime targets for thieves. In 2015, the FCC estimated that one million phones are stolen each year, and with several devices starting to hit the $1,000 mark now, these numbers are sure to rise. But what do you do if you fall victim to phone theft?

How To: Use the law of cosines in trigonometry

Want to solve for a side of a triangle when 2 sides and an angle are known? Learn how with this free video trig lesson. From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Internet, it's easier than ever to follow in their footsteps (or just finish your homework or study for that next big test). With this installment from Internet pedagogical superstar Salman Khan's series of free m...

How To: Experiment the law of inertia

Newtons proposed the concept of inertia. According to him an object at rest tends to stay at test and an object in motion tends to continue in motions unless acted up on by an external force. This is the principle of inertia. The tendency of the body to continue to stay as it was is called its inertia. You can demonstrate this principle with a simple experiment. As shown in the video when the hoop is pulled out the pen cap falls in to the bottle. Here the hoop is acted upon but the cap is not...

How To: Encrypt a NETGEAR router with WPA password protection

In this tutorial, we learn how to set and encrypt a Wi-Fi password using WPA in Netgear. First, type "www.routerlogin.net" into your internet browser. Next, a pop-up window will appear, type your user name and password into this dialog box. A new window will pop up, click on the tab on the left hand side of the screen that says "wireless settings". Type in your user name and password once more, then find where it says "security settings", and click on the "WPA-PSK" radio button. Now, make a p...

How To: Encrypt a Linksys router with WEP password protection

Watch this video to learn how to encrypt Wi-Fi using WEP password on Linksys in 4 simple steps. Connect to your wireless network. Open your Web browser and type in the web address http://192.168.1.1. Press enter key. Type in the User Name for your network. Type in the Password, press OK button. Select the Wireless text tab, select the Wireless Security text item. Pull down and select the WEP menu item. Type in a good password. Click the Generate button. Click the Save Settings button. Encrypt...

How To: Make Wiccan spell poppets

In this video we learn how to make a poppet. A poppet is generally used to give protection, healing to the ones we love. It may be our cat, aunt, home, or whatever we like to do it for. Here in this video we make a poppet for an animal. So the requirements are color shields, scissors, lavender and roots (for protection), citrine. Citrine helps in cleansing. Draw the shape of the animal we require on a cloth of two stacks and cut it using scissors. Use the thread to attach the edges. Leave a s...

News: Google Authenticator Is NOT the Best 2FA App Anymore

If you want the best two-factor authentication app out there, our pick is Authy. A close second is LastPass Authenticator. If neither of those is to your liking, try Duo Mobile or Microsoft Authenticator. But if you're fine with missing out on great features, then and only then should you look at using Google Authenticator.

How To: Make your MySpace information more private

In this video tutorial, viewers learn how to make their information more private on My-Space. Users will need to begin by logging into their account. On your homepage, click in Account Settings and click on the Privacy tab. Under General Privacy, users are able control who sees their online status, birthday and photos. To only allow friends to view your profile, select "my friends only" from Profile Viewable by. Users are also able to block other users by age and to block specific users from ...

How To: Understand deductive reasoning

In this video, Robert Ahdoot becomes "surfer dude" and shows us the ways of deductive reasoning, as relating to geometry. He begins with a simple example of a syllogism, taking two premises and using them to form a conclusion. This is called the Law of Syllogism. This concept is then used for geometric statements. If two angles are complementary, they sum to 90 degrees. If two angles sum to 90 degrees, then they are acute. By the law taught, it can be said that if two angles are complementary...

How To: Ride a bike in traffic

This video is a tutorial on how to ride a bike in traffic. The first rule is to obey the law. You would need to follow the laws of traffic as though you were driving a car. If there is a bike lane, use it. It is not a good idea to use the sidewalk as that is reserved for walkers and runners. Ride predictably by signaling your turns. The video tells the viewer which side of the road to ride on, and also provides tips. He also discusses how to ride with another cyclist. This is a very informati...

How To: Clear Your Cookies and Cache in Windows XP

This video explains how to delete cookies in Windows XP, Mozilla Firefox, Internet Explorer and Opera. To delete cookies in Mozilla Firefox, choose the "tools" option from the tool bar, then choose "options", then choose "privacy". Many options will be given under the "privacy" menu, but make sure to choose the following options- "accept cookies from site" and "accept third party cookies", then choose the option "I close Firefox option" under "keep until" then choose "ok" to delete the cookie...

How To: Set-up a home office with an extra room

Starting to work at home? With more and more people trying to make a solid living at home, it's important to know the best way to set up a home office – even if you don't have a spare room. Learn how to set-up a solid work environment with tips from this video on how to create the perfect home office.

How To: Protect your online reputation

With social networking systems, YouTube comments chains, chat rooms, bulletins boards, Twitter updates... It seems as if almost everyone has at one time publicly stated an opinion on the Internet. Nearly half of all prospective employers research job applicants online. Make sure that what you’re posting today doesn’t cost you a dream job tomorrow!

How To: Lock Facebook Messenger Behind Face ID or Touch ID for Maximum Security

Although Facebook has some questionable privacy and security practices, you'll find it still offers you ways to protect the information that's important to you. One of those ways is locking Messenger behind biometric authentication protocols such as Face ID and Touch ID, ensuring that no one else can access your private chats.

How To: Install MicroG to Replace Google Play Services & Prevent Data Mining

With all the talk about privacy concerns recently, Google's name keeps coming up because they are a very data-driven company. As an Android user, they know basically everything about you based on your device usage. That can easily scare some people off who are worried about their privacy and security. You do have some say in what personal data Google controls, but what if you want total control?

How To: Prevent & Stop Apps from Using Your iPhone's Microphone & Enhance Your Privacy

Any app on your iPhone could potentially listen in on your conversations and use that information to target you with tailored ads. Although most companies, including Facebook and Apple, have come out and vehemently denied these claims of spying on consumers, who's to say they're telling the truth? The only way to be sure you're safe is to take matters into your own hands.

How To: Buy Bitcoin Anonymously — A Guide to Investing in Cryptocurrency While Maintaining Privacy

Just like cash, bitcoin is used for everything from regular day-to-day business to criminal activities. However, unlike physical cash, the blockchain is permanent and immutable, which means anyone from a teen to the US government can follow every single transaction you make without you even knowing about it. However, there are ways to add layers of anonymity to your bitcoin transactions.