Protect Search Results

How To: Password protect your wireless network

Most of the home wireless networks are not set up by professionals and hence they might lack in security features. People just set up the wireless networks by connecting the devices and powering them up and never care to apply security settings to the network. This may result in your wireless network being compromised by unwanted external entities. How ever you can do a web based configuration settings and secure your wireless network by password protecting it. This settings differ from the m...

How To: Repair the write protection on an SD card

In this video tutorial, viewers learn how to repair the write protect on an SD card. An SD card is a non-volatile memory card format that is used in portable devices. If the write protect on a SD card is broken, the user cannot record any files onto the card. To fix this, viewers will need a small piece of scotch tape. Put the tape on the notch of the SD card. Do not cover the metal tabs at the back. This video will benefit those viewers who have a SD card and would like to repair the write p...

How To: Password protect and hide your folders on Mac OS X

Watch this video for a helpful tip on how to use secret folder application and protect folders in your MAC PC by hiding it. you could download secret folder application from version tracker.com for free go to the Website and click download button to download the application on your Mac PC open the secret folder application. click on the required password button, put your desired password and re enter to confirm. to access your file, click the plus button at the lower left. choose the desired ...

How To: Protect your luggage from bed bugs

Bed Bug control for luggage is the best way to protect your luggage from infestation. What you will do is, open your luggage and any zippers you may have on your luggage and spray it down the best you can. You will want to spray the seams and any closed area inside and outside you luggage. You should also spray down your handle and wheels (if available). Bed bug control will keep the germs from different hotels or any where you travel, so that it doesn’t follow you back home.

How To: Protect yourself from bed bugs in a hotel room

This "Good Morning America" insightful video reveals the truth of hotels room, and what you can do to protect yourself. You'll meet those silent vampire'esque creatures known as bed bugs, you'll even see urine stains on the wall. But, of course you want to be able to travel and see the world without the fear of encountering any of these pesky things. So, you'll learn some helpful tools to help prevent or kill these little bugs for an enjoyable stress free trip and stay.

How To: Protect your trees in the winter

To keep your young tree healthy through the winter there are several maintenance tips to keep in mind. You need to protect them from mice and voles gnawing around the base of the tree because they can easily girdle the bark and cause a tree to die. A simple way to prevent this is to use a plastic wrap. Simply put it around the base of the tree about an inch or so below the soil line and wrap it around the tree all the way up. This will prevent the little mice teeth from gnawing on the bark. A...

How To: Protect against SQL injection attacks when programming in PHP

In this clip, you'll learn about how to prevent SQL injection when writing code in PHP. Whether you're new to the PHP: Hypertext Preprocessor scripting language or are a seasoned web developer merely looking to improve your chops, you're sure to find benefit in this free video programming lesson. For more information, including detailed, step-by-step instructions, take a look.

How To: Protect your Facebook profile by changing your privacy settings

Want to change your Facebook privacy settings? This clip will show you how it's done. Whether you're completely new to the Facebook's popular social networking site or simply require a small amount of clarification on how to perform a particular task on Facebook, you're sure to benefit from this helpful video guide. For more information, including detailed, step-by-step instructions, take a look.

How To: Protect your wrists when using a Pilates Reformer

See how to avoid compressive forces on the wrist and still do abdominal and arm work when using a Pilates Reformer machine. With Pilates, as with any physical fitness system, a basic mastery of proper technique is essential for both maximizing the effectiveness of your workouts and avoiding accidental injury. Whether you're looking to slim down or merely tighten up your core, you're sure to be well served by this home fitness how-to from the folks at Balanced Body Pilates.

How To: Protect your computer from snoops

Keep private info from prying eyes and earn some peace of mind when you safeguard your PC or Mac against nosy intruders. You will need several great passwords, virtual desktop software, snoopware blockers, a screen filter, a mirror, a healthy sense of paranoia, WPA encryption, and an understanding IT specialist.

How To: Protect VBA code in Microsoft Office Access 2007

The Microsoft Office Access 2007 relational database manager enables information workers to quickly track and report information with ease thanks to its interactive design capabilities that do not require deep database knowledge. In this Microsoft Access video tutorial, you'll learn about protecting your VBA code from snoopy little trolls. For more information on keeping your VBA code secure, watch this MS Access how-to.

How To: Protect children from high bath water temperatures

Giving your kid a bath is an integral part of child care. What's that saying? Cleanliness is next to Godliness? Okay, maybe not, but a clean baby is a great sight, but there are things to worry about when filling up the bathtub. Could the water temperature be too hot? NFPA's Amy LeBeau on the importance of testing the temperature of bathwater before putting children into the tub. Safety also comes first.

How To: Protect your wrists when using a Pilates Reformer

This clip offers advice on how to save your wrists and build strength in your back when using a Pilates Reformer exercise machine. With pilates, as with any physical fitness system, a basic mastery of proper technique is essential for both maximizing the effectiveness of your workouts and avoiding accidental injury. Whether you're looking to slim down or merely tighten up your core, you're sure to be well served by this home fitness how-to from the folks at Balanced Body Pilates. For complete...

How To: Enable Protected Mode in Internet Explorer 7 in Vista

This video talks about protected mode for internet explorer 7 and Windows Vista. The person tells you that protected mode helps protect your computer from types of spyware. It is not the best solution and they tell you one should not rely on this alone. By default protected mode is on. You want to make sure it hasn't accidentally been disabled. To check your settings, double click on the area on the bottom of the screen that says protected mode. The security tab will pop open. Look to see if ...

How To: Protect your plants from frost

An associate from Garden Years discusses the danger frost poses to small, outdoor plants. Since you don't have a lot of control over the weather, there are a few tips you can follow to try an avoid any unwanted damage to existing plants. The host examines a peach tree to identify when a plant is blooming and thus very delicate. If a plant is fully blooming, then any temperature below freezing (32 f) can damage the blossoms. Aside from putting cloth over the plant, mulch is also very helpful i...

How To: Password protect queries in Microsoft Access

The Microsoft Office Access 2007 relational database manager enables information workers to quickly track and report information with ease thanks to its interactive design capabilities that do not require deep database knowledge. In this Microsoft Access video tutorial, you'll learn how to force a password to be entered in order to run a query.

How To: Password protect databases with Microsoft Access

The Microsoft Office Access 2007 relational database manager enables information workers to quickly track and report information with ease thanks to its interactive design capabilities that do not require deep database knowledge. In this Microsoft Access video tutorial, you'll learn about creating a login form and password protecting your database.

How To: Protect private files from prying eyes with TrueCrypt

Check out this video tutorial to see how to keep your private files private, even if you have to email them to yourself at your office? TrueCrypt, an open source piece of software, lets you encrypt your files so they remain accessible only to you. This works on any platform; Windows, Linux, or Mac. So, watch this video to see the TrueCrypt download process, how to install it, and how to create an encrypted volume on your hard drive.

How To: Protect your online reputation

With social networking systems, YouTube comments chains, chat rooms, bulletins boards, Twitter updates... It seems as if almost everyone has at one time publicly stated an opinion on the Internet. Nearly half of all prospective employers research job applicants online. Make sure that what you’re posting today doesn’t cost you a dream job tomorrow!

How To: Protect plants from frost

Frost is in the air. If you have tender plants like basil, pepper or impatients when that cold weather comes it will zap those plants. Often, if you can get through those first couple frosts, an Indian summer, that can last weeks and weeks, will follow. If you can protect your plants during this time you can have blooms for much longer. There are several ways to protect your plants. You can use a traditional device like a glass cloche. The nice thing about them is they are decorative and will...

How To: Password protect a Mozilla Firefox profile

Ever wanted to password protect a Firefox This clip will teach you everything you'll need to know. It's easy! So easy, in fact, that this home-computing how-to from the folks at Britec can present a complete overview of the process in just over two minutes. For more information, including detailed, step-by-step instructions, take a look.