Proper Safeguards Search Results

How To: Make iridized glass

Learn about ancient iridized glass and a method for creating iridized glass surfaces. This video is part of the exhibition "Reflecting Antiquity" at The Corning Museum of Glass (February 15 - May 27, 2008). Note: the method portrayed uses stannous chloride fumes, which can be highly toxic. Do not attempt this without proper protective equipment.

How To: Cut a carrot

Learn the proper technique for peeling and cutting a carrot without getting frustrated or shaving off too much of the carrot. This may seem like a mundane task, but you'd be surprised how helpful these tips are.

How To: Hand shift on the cello

This video is a demonstration of proper shifting technique on the cello. Learn the different hand shifting methods: The underhand and the overhand. Each movement is broken down and explained in detail.

How To: Catch a wave

Richard Schmidt teaches you how to surf the curl. Learn the proper timing and positioning as well as how to maneuver your surfboard through the water.

How To: Automate web testing with PAMIE

This Pamie Demo shows how to setup, install and run a simple automation script. It shows you: how to install Pamie, how to create a Pamie test script to Automate a form using PythonWin IDE, how to write the script and how to run the test. The volume is really low so crank your speakers way up and make sure you have the proper Python and programs downloaded.

How To: Give your dog a pill

Is you dog need to take vitamins or medicine? Sometimes it can be a real hassle to get the animal to swallow a pill. This clip will show you the proper way to give your dog a pill.

How To: Apply special effects make-up

This is an interesting video that shows you how to use special effects make-up to turn a 20-year-old into an old woman. So, if you can make, or get your hands on the proper products, this video will show you how to use this cool stuff.

How To: Safeguard Your Data & Privacy with This Speedy VPN

It's a myth that regular users only need the protection of a virtual private network when on a public Wi-Fi connection. First, almost all network connections can be accessed without the proper permissions. Second, ethical hackers also need to think about using a VPN as one step to encrypting and protecting their activity and identity during pentests, phishing, and other actions.