Reliable Flat Search Results

How To: Properly clean skateboard bearings

In this tutorial, we learn how to clean skateboard bearings. You will need: a socket wrench, a dirty skateboard with dirty bearings, super glue, rubbing alcohol, and an empty glass jar. First, use the wrench to remove the bearings from the skateboard. After this, pour the alcohol into the jar, then drop the bearings inside. You can also drop in other parts that need cleaning if they fit inside the jar. Now, place the lid of the jar on and shake it for about a minute. When finished, let the so...

How To: Take apart an Xbox 360 headset

This video demonstrates how to take apart the head set of an XBox 360. You will need two small screwdrivers - a flat head and a Phillips. First the head band is removed by pressing the lock hold. The foam is removed and set aside. The rim of the speaker is removed by pressing the locks and pulling it up. Now the speakers are exposed and the wiring is checked to see if it is connected properly if you cannot hear it properly. Now the transmitter boom is also checked for proper connection if tra...

How To: Do a forearm stand with Tara Stiles

Having a healthy lifestyle is very important. In this video, learn how to do a forearm stand with Tara Stiles in her "Let's Get Physical" Challenge. First, lay your forearms on the ground. Make sure your elbows are directly below your shoulders. Have the rest of your body in plank pose (your feet on the ground and your body flat.) After a little bit, walk your feet back up so that your body now forms an arch with your butt in the air. Walk back to your plank pose and stay there. If you're loo...

How To: String your glowsticks

This how to video is designed for people who wanted to start glowstringing but has never done it before. The tutorial starts by answering some of the most common questions such as how to tie the strings and how to hold them, then moving on to teach the Weave, Windmill, and Butterfly. All you need is a pair of shoelaces and a pair of 6 inch glowsticks (either used or unused) then you can start here. Some people like their shoelaces round and thin, some like theirs flat and thick. It doesn't ma...

How To: Apply gold and green eyeshadow

Learn how to create a shimmery gold and green eyeshadow look with this how to video. This makeup tutorial uses the following products: water-based mixing medium, a soft white gold base (Gold Dusk pigment), an emerald green base (Emerald Green pigment), an emerald green eyeshadow (Humid eyeshadow), a white gold eyeshadow (Gorgeous Gold, Casablanca), a dirty gold eyeshadow (Rye eyeshadow), a cool mint green eyeshadow (Aquavert), a brow bone color (Casablanca), a black liner (Graphblack technako...

How To: Browse Privately & Securely with This VPN

If you're looking to improve your browsing experience, then a VPN is the right way to go. If you're tired of censored or geographically blocked sites and wary of companies selling your data, then a good VPN can be your answer to a problem that limits every aspect of your experience online.

How To: Redial Busy Phone Lines Automatically on Your iPhone or Android Phone

Whether you're calling the unemployment office, a popular radio contest, or any other phone line that gets super busy, having to recall the number manually is a pain. Whatever you do, however, don't punch in the same digits over again and again — our smartphones can help do it for us, saving our time (and sanity).

How To: Change a Phone's Coordinates by Spoofing Wi-Fi Geolocation Hotspots

In many urban areas, GPS doesn't work well. Buildings reflect GPS signals on themselves to create a confusing mess for phones to sort out. As a result, most modern devices determine their location using a blend of techniques, including nearby Wi-Fi networks. By using SkyLift to create fake networks known to be in other areas, we can manipulate where a device thinks it is with an ESP8266 microcontroller.

How To: Enumerate NetBIOS Shares with NBTScan & Nmap Scripting Engine

NetBIOS is a service that allows for communication over a network and is often used to join a domain and legacy applications. It is an older technology but still used in some environments today. Since it is an unsecured protocol, it can often be a good starting point when attacking a network. Scanning for NetBIOS shares with NBTScan and the Nmap Scripting Engine is a good way to begin.

How To: Flash ZIPs Without TWRP (Or Any Custom Recovery)

There once was a time in the Android rooting scene where we couldn't rely on using a custom recovery for all of our modding needs. Manual file flashing was very popular in the early days of Android before custom recoveries started taking over. With the rise of TWRP, it seemed like there was almost no need for manual file flashers; however, they appear to be making a welcomed return in a big way.

How To: Record Your iPhone's Screen Without the Annoying Red Bar or Bubble

Native screen recording, one of the hottest features that Apple included in iOS 11 and later, is easily started from the optional Control Center toggle on your iPhone. From there, you can stop recording from the same place or from the red status bar or bubble. It's a very convenient addition to iOS, but there's one obvious downside — that red indicator, which can appear in your recordings.

How To: Chat with Friends on Messenger Without a Facebook Account

For some of you, whether or not to delete Facebook is a daily struggle. One reason you might not have pulled the trigger on your Facebook account yet could be because of Messenger, which provides millions of people with different devices an easy way to communicate with each other. But here's a secret you might not know: you don't need to have a Facebook account to use Facebook's popular chat app.

News: The New Nokia 6.1 Is a Solid Upgrade to One of Last Year's Most Durable Budget Phones

HMD (the company currently making Nokia-branded phones) only released one flagship device last year, with the rest of the phones falling in the mid-range and entry-level tiers. However, at Mobile World Congress 2018, HMD announced their ambition to become a top five smartphone maker in 3–5 years. Meeting this goal will require penetration in all markets — especially the United States — and it looks like Nokia will get the ball rolling early this year.

How To: Use U2F Security Keys on Your Smartphone to Access Your Google Account with Advanced Protection

Security-minded users can reduce the risk of phishing by enabling Advanced Protection on important Google accounts, requiring a U2F security token to log in. Using these keys isn't intuitive on most popular smartphone platforms, and you can find yourself locked out if you don't plan ahead. You'll need to learn and practice using U2F keys on your device before enabling this layer of security.

News: Like Peaches? Protective Virus Could Save Millions of Dollars in Fruit from Fire Blight

Peach trees and other related plants are susceptible to the devastation caused by fire blight, a contagious bacterial disease. Once contracted, infected trees have to be burned to contain the disease and prevent spread to nearby trees. Increasing resistance to antibiotic treatment has sent scientists in search of alternative ways to deal with the bacteria and prevent its catastrophic damage.