Secure Users' Search Results

How To: Keep email private with MixMaster

Email is one of the least private and least secure forms of communication, although few people realize this. MixMaster is one way to allow secure, anonymous communication even over the very public medium of email. This tutorial will get you started with MixMaster quickly and easily.

How To: Secure your public search profile on Facebook

Looking for a guide on how to secure your public Facebook profile? This clip will show you how it's done. Whether you're completely new to the Facebook's popular social networking site or simply require a small amount of clarification on how to perform a particular task on Facebook, you're sure to benefit from this helpful video guide. For more information, including detailed, step-by-step instructions, take a look.

How To: Wear a beret securely

In this video, we learn how to wear a beret securely. This is used to keep the beret on your head so it doesn't fly away. To do this, you will need the beret and bobby pins. First, place the beret onto your head and style your hair around it so it looks how you prefer. Next, grab your pins and place then inside the beret holes onto your hair. Use a couple of the pins to make sure the hat and hair are connected and secured tightly. When finished, move the hat slightly to make sure it is secure...

How To: Make a baby diaper cake step by step

This video is a tutorial on how to make a baby diaper cake. To begin, you will need to roll all your baby diapers from the waist down and secure them with rubber bands. Your top tier will have 8 diapers, the middle tier will have 19 diapers, and the bottom tier will have 40 diapers. Use rubber bands to secure all your tiers together. Next, glue thick ribbon around the tiers over your rubber bands. Follow up with decorations such as bows and extra ribbons. Use a cake stick to secure the tiers ...

How To: Tie a double sheet bend knot

Need to know how to tie a Double Sheet Bend? This is a more secure version of the standard sheet bend, and an excellent way of joining two ropes of equal or different diameter. He's using flex rope, but it's a generally good way of securing two lines together.

How To: Use Google sites to create & manage secure group sites

Google Sites makes it easy for anyone to create and manage simple, secure group websites. You can create and publish new pages with the click of a button, edit web pages like documents, and move content and pages around as you please. Information is stored securely online, and you decide who can edit or view the site. Google Sites is powerful enough for a company intranet, yet simple enough for a family website.

How To: Use Google's reCAPTCHA to secure your web site forms

Google is the biggest and best search engine on Earth, and if you are a webmaster and want your website to be a big success it would really behoove you to know as much about how it works as possible. The Google Webmasters series of videos and website were created to teach webmasters, SEO professionals, and others how Google works by answering their questions and giving them insights into how they can best integrate and utilize Google's functionality to improve their business. This video expla...

How To: Build a French cleat storage system

The Wood Whisperer is Marc J. Spagnuolo, a professional and passionate furniture maker, who also contributes to Fine Woodworking and Popular Woodworking. In this video, Spagnuolo shows us how to build a French cleat storage system. It's a very versatile unit, and gives you plenty of storage space without cluttering up a room.

How To: Use the Chrome Browser Secure Shell App to SSH into Remote Devices

Many guides on Null Byte require using the Secure Shell (SSH) to connect to a remote server. Unfortunately for beginners, learning to use SSH can become a confusing mix of third-party programs and native OS support. For Chrome OS users, using SSH is even more difficult. We'll fix this by using the Chrome Secure Shell to establish an SSH connection from any device that can run a Chrome browser.

How To: Lock Apps Using Your Samsung Galaxy S6’s Fingerprint Scanner

Like its predecessor—and probably every device in the future—the Samsung Galaxy S6 comes with a fingerprint scanner that allows for a more secure lock screen, web sign-ins, and account verification. But unlike its brethren, the sensor on the S6 has been vastly improved. No longer does it require a clumsy swipe—all you have to do is place your finger on it for less than a second, much like Touch ID on iPhones.

How To: The Difference Between Http and Https

With more people joining the internet scene each day it's important that it's security is.. well it has to be good. Of course everything can be hacked and that's the way hackers work. They know there IS a vulnerability but they don't don't know the rest. in this article i'll try to explain the big difference between HTTP and HTTPS

How To: Properly shoot and sight in a compound bow

In this video tutorial, viewers learn how to properly shoot and sight in a compound bow. It is recommended that users use a release. Your body should be perpendicular to the target. Hold the bow vertically, and hold it with a relaxed and secure grip. When you are ready to begin shooting, learn a technique that will help you relax and steady the bow. When you draw the bow string back, you should be looking through the peephole on the bow string and where the target and pins come into view. Thi...

How To: Make a dramatic spotlight from a household lamp

In this video tutorial, viewers learn how to make a guerilla spotlight using household items. Users will simply need a cardboard cylinder and a light source. Te materials used in this video were a toilet paper roll, piece of aluminum, gaff tape and a lamp. Begin by cutting a couple of 90 degrees slots in the middle of the foil, slide in the tube ad secure it with tape. It should be a bit longer than the tube. Now wrap it around the light source. This video will benefit those viewers who produ...

How To: Secure your wireless Internet connection

This video tutorial is in the Computers & Programming category where you will learn how to secure your wireless internet connection. If you don't secure your wireless internet connection you are allowing others to enter in to your network. Open the set up CD and first change the network name from the default name to anything that you like. For this go to step 3 of 'naming your network', type in your network name and click 'next'. Then you enable security on the network by choosing 'WPA2'. Nex...

How To: Make a paper slingshot gun that shoots

A tutorial on how to make a paper slingshot gun that shoots. Things you'll need: Bond Paper, Elastic, Scissor and Duct tape. Roll the bond paper half-wise. Secure with duct tape. Get another bond paper and fold it in half. Cut. Roll the cut bond papers length-wise and secure with duct tape. Form a "V" shape using the rolled cut bond papers. Attach to the first rolled bond paper to make a "Y" form. Secure with tape. Attach a rubber band on both ends. secure with tape. Follow these steps and Yo...

How To: Change These Settings Now to Protect Your Data in Case Your Phone Is Stolen

As smartphone users, we live in dangerous times. The value of phones continues to rise, making them prime targets for thieves. In 2015, the FCC estimated that one million phones are stolen each year, and with several devices starting to hit the $1,000 mark now, these numbers are sure to rise. But what do you do if you fall victim to phone theft?

How To: Prepare your home for winter snow fall

In this video tutorial, viewers learn how to winterize their home. Users should begin by cleaning the gutters on the side of their house. Scoop out all the debris and seal it with caulk. Then change the batteries of the smoke detector and clean it. It must be replaced if it is over 10 years old. Prepare the lawn mower for the spring season by sharpening the blades, clean it and drain all the gas out. It is a good idea to trim off the shrubs and trees. This video will benefit those viewers who...

How To: Create a red carpet look with the undone bun

In this video tutorial, viewers learn how to create a red carpet look with the undone bun hairstyle. Begin by bringing all your hair to one side and apply a band around the bun to secure it. Then take a clip and randomly pin it to the ends of the ponytail. Continue doing this for the rest of the ends of hair in the bun. Users may use up to 30 pins. Make sure the pins don't move and don't overdo the pins. This video will benefit those viewers who are interested in beauty and fashion, and would...

How To: Strap down large items to the bed of a truck

In this video tutorial, viewers learn how to strap down large items to the bed of a truck. Users will just need a long rope. The rope should be long enough to wrap around the back of the truck. Take the rope and make a loop. Then wrap around it and pull. It should look similar to a rope noose. Make sure it is tight. Then take the other side of the rope and put it through the loop. Pull on it to tighten. Then wrap around it and pull. Do this several times to secure it. This video will benefit ...