How To: Install a deadbolt lock with This Old House
Watch this video from This Old House to learn how to install a deadbolt lock. Steps:
Watch this video from This Old House to learn how to install a deadbolt lock. Steps:
Watch this video from This Old House to learn how to replace an old threshold. Steps:
Watch this video from This Old House to learn how to install a rain diverter. Steps:
Watch this video from This Old House to learn how to fix a bath sink stopper. Steps:
Watch this video from This Old House to learn how to install a utility sink. Steps:
Watch this video from This Old House to learn how to prevent frozen pipes. Steps:
Watch this video from This Old House to learn how to install a frost proof faucet. Steps:
Watch this video from This Old House to learn how to repair shingle siding. Steps:
Watch this video from This Old House to learn how to repair a baluster. Steps:
Watch this video from This Old House to learn how add stairway headroom. Steps:
Watch this video from This Old House to learn how to transplant a tree. Steps:
How to Build a Basic BirdhouseMaybe you were outside in your back yard and you noticed that it seemed a little lonely and empty. Our maybe you have young kids that love to experience wild life in their own back yard. Whatever reason you have for searching out this article, you have decided to build your very own basic bird house. I recently built a deck in my back and had alot of scrap 1x6 decking boards left over. Instead of letting all that good material go to waste, I decided to build a co...
Solar panels are an amazing invention. Catching energy from the Sun before it even enters Earth's food chain, photovoltaics are like an all-natural nuclear power plant. Unfortunately, the constituted parts of a solar panel are rare, valuable, and subject to the coercive forces of market competition.
How did it happen? How did your ultra-secure WPA password on your wireless network get broken into? Well, you might have just found yourself at the mercy of a cracker.
Having an SSH or Secure SHell to tunnel your traffic through is something we have talked about many times at Null Byte. As we know, it allows us to securely route and encrypt our traffic through a remote server, effectively anonymizing us and protecting our traffic from all forms of analysis—simultaneously. We have gone over how to make a home SSH tunnel. However, the question has come up, "How can I get an SSH tunnel to somewhere other than my computer?" This would be useful in a situation w...
At Kaplan University, our main focus in developing our online MBA programs is career development. We believe the time and effort that is required to obtain a master’s degree online should be apparent the first day the student begins their new career. Earning an MBA could be a step in the right direction towards a fulfilling and satisfying career.*
Angry Birds and FarmVille have become two of the biggest game franchises in the world. And recently their creators, Rovio and Zynga, have hit the news again, but not because of anymore major game announcements.
Solar Shades Looks like it's going to be another hot summer and this time of year, I always get questions about the best kind of Shades for the home! I may be a little bias in my opinion because I'm going through a more minimalist "less is more" style in my life right now. Taking the more modern design approach that is very popular right now, I wanted to talk a little about Solar Shades for the home.
The battle between Pepsi and Coke has been a grueling one, with both sides securing their secret formulas for great tasting, addicting sodas behind lock and key.
Parental involvement is a crucial ingredient in the success of many children. Teachers know the saying all too well that it takes more than a village to raise a child, for one - it takes parental involvement. Thus, it is important for teachers to reach out to parents in that first week of school. Teachers should write a formal letter that is welcoming and easily comprehensible to the parent and the student. This letter should be able to communicate that the teacher values the child’s educatio...
From Infowars: “Of course, at this stage Mr. Paul is little more than a distraction to Mr. Romney, and the two candidates are said to be quite fond of each other. Until now, Mr. Santorum had also been pinning some of his hopes on Texas, which, with its 155 delegates, has the most delegates of any contest to date,” writes Gerry Mullany.
Watch out Macs. Flashback is back. Variations of the trojan have reportedly infected 600,000 Mac computers around the globe, with about 57 percent in the U.S. and another 20 percent in Canada.
Wireless networks. Nowadays, everyone uses 'em, but most don't secure 'em. On average, I can drive up and down any block in my city and find at least one or two open or semi-open networks on any given day. With some changed MAC addresses for good measure, an attacker can use your network as a spring board for who knows what. When the police come a few days after, they are coming to your door—and not to talk about how nice your lawn is. Don't be that guy.
In this article, I'll show you how you can make your very own bullet/shell bottle opener. All you need is a .50 caliber deactivated round and some workshop tools!
SSH is amazing, and we praise its existence on Null Byte for many reasons. Notably, it allows us to reroute our traffic through encrypted ports on our local host to be sent to its destination when on the go. You can even control your home computers remotely over a secure and encrypted connection. This is handy for a multitude of reasons.
In photography, using filters over lenses is a common practice and provides a great way to set the mood or to create an artistic image. The only problem is that they can be quite costly and there currently aren't many available for cell phones specifially. Fortunately, there is a simple solution to this, and all you need are everyday objects that can be found around the house. If you're a purist and don't want to rely on filters provided by camera apps, this is a great way to experiment with ...
The holidays are here and all of us here at Phone Snap hope you're spending them under a nice warm roof with some yummy food and great company! For this week's Phone Snap challenge, we want you to utilize your cell phone to capture some holiday spirit. Whether it be the gifts under the tree, stockings hanging over the fireplace, Christmas lights outside, or everybody gathered together wearing their favorite holiday sweaters—we'd love for you to share with us!
Welcome to Part 3 in my series on protecting your computer from prying eyes (Part 1, Part 2). In today's segment, we will be going over drive encryption using the TrueCrypt program on Windows OS. Drive encryption is a technique that masks your data with a cryptographic function. The encryption header stores the password that you have entered for the archive, which allows the data to be reversed and read from. Encrypted data is safe from anyone who wants to read it, other than people with the ...
I've previously mentioned how saving browser passwords is a bad idea, but I never went into much detail as to why. Passwords that are saved in your browser can be carved out and stolen very easily. In fact, even passwords you save for instant messaging and Wi-Fi are vulnerable. Windows is very inefficient with the way it stores passwords—it doesn't store them in key-vaults, nor does it encrypt them. You're left with passwords residing in memory and filespace that's unencrypted.
Now we're getting to the kids who actually know what's going on. You're more likely to get enthusiasm and dare I say focus from grade school and middle school kids. Here's the lowdown:
You're sitting in your favorite café enjoying a hot cup of joe, then you open up your laptop or turn on your tablet computer to get to work, but as always you get sidetracked and head straight for Facebook. Someone just tagged you in a photo, so you check it out, then you see it out of the corner of your eye—your Facebook picture digitally displayed on the wall in a nice, neat digital photo frame.
Firesheep caused quite a stir when it was released last October, giving both hackers and non-hackers instant access to people's account information when on a public Wi-Fi connection. When logged into an insecure website on the same network as someone with Firesheep, you're giving them access to the cookies that keep you logged in. This is called session hijacking, and grants them easy access to your accounts, like Facebook, Flickr and Twitter. Now, there's an even easier way to do this—a mobi...
Designer Andrew Clifford Capener has made an alternative to the classic Scrabble board that celebrates the expression of typeface. It isn't in production yet, but Capener's set would offer tiles in a variety of different fonts:
Health, safety and security are three main issues which determine if your cruise is a successful vacation.
Have an old-school tabula recta lying around? No? Then just print out the chart below. Nothing ensures better password security than this centuries-old cipher technique. Here's how it works, via Wikipedia:
Willow Smith has what it takes to be a star, just like her parents, Will and Jada Smith, and her brother, Jaden Smith. But this Smith, at the tender age of 9, is quickly becoming a pop superstar and preteen trendsetter, thanks to her music video "Whip My Hair".
Would you rather live far up in the trees? Or deep underwater? A Nevada family of scuba divers have built the ultimate childhood getaway: the Needham family's "Bubble Room" is an underwater fort that sits at the bottom of a lake in the Sierras. The room is an air-filled pocket, made with vinyl and anchored down by an octagonal framework of metal pipe.
Every day of the week, WonderHowTo curators are hard at work, scouring the web for the greatest and most inspiring how-to videos. Every Friday, we'll highlight our favorite finds.
It's no secret that Jimmy Kimmel is a SCRABBLE man. He hosted and won the SCRABBLE 60th Anniversary Celebrity Doubles Tournament (SCRABBLE Under the Stars), and for the last couple of years, featured the National School SCRABBLE Champs on his late night show "Jimmy Kimmel Live!".
This Animal Welfare Foundation two-part video tutorial is from expert veterinary staff demonstrating the correct procedures for handling small mammals for clinical examination and medication. Its aim is to show that the primary consideration should be for the the welfare of the animal. This video guide will show you practical animal handling for a mouse.