Risk Free Search Results

How To: Keep your laptop battery safe and secure with four tips from CNET

Millions of laptop batteries have been recalled because of the risk of FIRE. Get some tips from CNET to learn how to keep your laptop battery safe and secure. First, make sure your battery hasn't already been recalled. Second, don't leave the laptop constantly charging because it heats it up. One way to save your battery is to remove it completely when you plug in directly. Third, treat the battery as fragile. And finally, four, avoid buying knockoff batteries.

How To: Use ROM Manager to manage roms on your Droid

Installing and managing ROMs on your rooted Android phone can be a pain. You have to connect phone to computer a lot, and every time you load a new one you run the risk of it not working and having to start all over again. Fortunately, there's even an App for that! This video will show you how to use a cool App called ROM Manager to handle all your ROM-related tasks, from getting and loading new ones to maintaining and editing them. Never load a ROM manually again, buy this App!

How To: Tether iPhone 4 using HANDYLIGHT without jailbreaking

If you ever wanted to tether your iPhone but found your carriers’ prices ridiculously high, then meet HANDYLIGHT. This $0.99 iPhone app has a nice hidden feature. It will allow you to connect to the internet using your iPhone (i.e. tether). There’s no guarantee that this app will stay in the app store much longer (or even on your phone after you purchase it), so use it at your own risk.

How To: Make your lips kissable and soft

Kissable lips are quite the oxymoron, because though kissble lips look bright, glossy, and plump, thereby attracting suitors to their whims, all the products used to make them look kissible actually prevent anyone from actually wanting to kiss them (unless they're willing to risk the lip gloss slobber and pink mouth staining).

How To: Install a fan on your Xbox 360 power brick

In this video, you will learn how to install a fan on your XBox 360 power brick. In order to do that, just follow these steps exactly like in the video: The first thing to do is to buy an 8mm fan and to clear the power brick. Now make a hole in the power brick case and glue the fan to it. Connect the negative and the positive wires like in the video and turn it on. If you follow these steps right, you will get the correct result. Your power brick will get more cold air and the risk of a RROD ...

How To: Figure out why he didn't call you back

YourTango presents relationship expert Rachel Greenwald, who breaks down why he didn't call you back. She takes us through the process of learning why men do not call women back after first dates. Find out if you are the type of woman who is at risk of not getting a call back, and it begins with "the blahs", a woman who gives the one word answer to standard questions. Next, see if you suffer from iPod repeatability, the Oprah eyes, or how men call it the Park Avenue princess. If you follow th...

How To: Make ice cream in under a minute with liquid nitrogen

Systm is the Do-It-Yourself show designed for the common geek who wants to quickly and easily learn how to dive into the latest and hottest tech projects. In this episode, you'll learn how to make ice cream in udder a minute, using the wonders of liquid nitrogen. (You will also learn how to do this safely, so you don't risk giving your fingers a case of instant frostbite.)

How To: Play the card game Sixteen

The multiple award-winning card game Sixteen is packed with head-to-head action. If you can you count to 16 and take calculated risks, then you can force your opponent to bust. But play your cards defensively at the right time or the tables will turn! Win the most sets and you'll win the game. It sounds simple (and it is), but Sixteen's unique strategy and cribbage-like counting will hold the attention of even the most seasoned game players.

News: How Gut Bacteria Could Set Off the Immune System in Rheumatoid Arthritis

As if the swollen, painful joints of rheumatoid arthritis weren't enough, the disease is the result of our immune system turning against cells of our own body. Ever since this realization, scientists have worked to find the trigger that sets the immune system off. Scientists believe that gut bacteria may have a role in initiating the abnormal immune response. Now, a team of researchers from Boston has figured out how that might occur.

News: Strep Bacteria a Deadly Participant in Development of Colorectal Cancer

Colorectal cancer — cancer of the colon or rectum — is the third most commonly diagnosed cancer in the US. To reduce the chances of a diagnosis we are all urged to stop smoking, keep our weight down, decrease our intake of alcohol and red meat, keep active, and get screened for colon cancer. But, new research has found something that participates in the development of colorectal cancer that might not be as easy to control: A strep bacteria that promotes tumor growth.

News: Windows 8 Reports Your Downloads to Microsoft, But Is It Really a Security Threat?

Security researcher Nadim Kobeissi has discovered that the Windows 8 SmartScreen feature, meant to screen downloads for malicious software, actually reports the data about which applications users are installing to Microsoft. He also says that "the Microsoft server is configured to support SSLv2 which is known to be insecure and susceptible to interception." The two main concerns are the ability of law enforcement to subpoena Microsoft for the information and of hackers to intercept user data...

How To: Use secure online passwords

In this video, we learn how to use secure online passwords. There are a ton of things to consider when creating a password. A weak password is something that someone can easily guess. If you are using a birthday, common dictionary word, child's name, or something common then you are at risk. Your password should combine letters and numbers, and be at least eight characters long. It should also be completely random and have upper and lower case letters. You can use a password assistant if you ...

How To: Break in a Rubik's Cube so that it solves beautifully

Most Rubik's cubes are not well-made or well-taken care of. They creak and turn slowly, acting like the cheap pieces of plastic that they for the most part are. There are ways though, even for cheap cubes, to make them work much more quickly and smoothly than they do out of the box. This video will show you a great method for breaking in your Rubik's Cube. It bears some risk of breaking your cube, but if you're careful your cube should be in better shape than ever when you're done, allowing y...

How To: Use Nikon digiscopes or telescopic lenses

In this tutorial, we learn how to use Nikon digiscopes. This means taking digital pictures with a digital camera through a lens. You can use two different versions of lenses with the Nikon Coolpix camera. You will need an eyepiece to use the camera with these lenses. You can get up to 75x magnification while using these, but risk of camera shake is greater. First, mount the camera on the triPod and apply the lens adapter, then the Coolpix camera. After this, use the view finder to see through...

How To: Attack the pressure points of the leg while fighting

Disabling your opponents legs is the fastest way to make sure that you can get away from a fight situation without killing your opponent. Attacking the pressure points associated with the large blood vessels and nerves in the legs is an effective way to do that. This two-part video features an extensive walkthrough of the legs pressure points and ideas for attacks that can be used against them to get your fight over with as quickly as possible without risking killing someone.

How To: Remove Antivirus Pro from your computer with Spyhunter

Astrum Antivirus Pro is a rogue anti-spyware application and a clone of VirusTrigger and Antivirus Trigger. Astrum Antivirus Pro is often downloaded and installed by a Trojan or through browser security holes. Astrum Antivirus Pro may generate large numbers of popup adverts. Astrum Antivirus Pro will also display notifications of imaginary security risks in its attempts to get the user to purchase the full version. Astrum Antivirus Pro may run a fake system scanner and then display fake syste...

How To: Apply depth of field to your photographs

Learn how to use depth of field with help from this photography tutorial. Although it may seem that depth of field is a confusing factor in photography, it's actually quite easy to understand & adjust once you've gotten the hang of it. Depth of field (or, DOF) is a great way to experiment with your photography & improve your skills as a beginner photographer. When taking your photograph using DOF, it is imperative to remember that the shutter speed and aperture (or F-stop) need to change at e...

How To: Build confidence with improved presentation skills

Do your presentation skills need a little work? Being in front of a crowd or some potential clients may be one of the hardest things you will ever do, but staying confident makes all the difference. Losing any bit of confidence will result in your presentation falling flat and killing your self-esteem, and perhaps even risking your job. So, being confident is a must.

How To: Install tire chains correctly

For winter weather you should always carry tire chains. In the mountains of California one must carry tire chains or risk getting a ticket from a police officer. Buy chains at Walmart. They come custom fit to your vehicle and are easier to put on than the old ones that required you to drive over the chain. Don't drive in winter weather or snow without chains unless you have 4 wheel drive, 4wd, or all wheel drive AWD.

How To: Get some sleep when you have a newborn

Is sleep deprivation threatening your sanity? Before you fall apart, try a few tricks that have worked for other new moms. You will need breast milk, a willingness to share your bedroom, power naps and help. Warning: Talk to your doctor before bringing your baby into bed with you. There are risks associated with this practice. Watch this video for tips to help you through those early, sleepless months with your newborn.

How To: Back Up Your Gmail Account (5 Ways of Archiving Gmail Data)

Last weekend, some unlucky Gmail users inadvertently had their email accounts wiped out. Actually, it was 0.02 percent of all Gmail users—or roughly 40,000 of the 200 million who use the email service, due to an "unexpected bug" which affected copies of the data. Gmail does make backup files of everything, so eventually everyone will reclaim their email history. In fact, as of yesterday, Google has successfully restored all information from their backup tapes and has started returning everyon...