Secured Indexing Search Results

How To: Change the engine oil in a Chevy truck

In this tutorial, we learn how to change the engine oil in a Chevy truck. To start, you will want to place your car up on a secure jack so you can get underneath it with ease. Next, find the oil can and drain plug underneath the truck and use a wrench to remove the bolts around them. Now, place an oil pan underneath the drain plug and let the oil leak out into this until there is no more left. Next, clean off the bolt that is used for the drain plug and remove the filter from the underneath o...

How To: Make filet mignon with Paula Deen

Paula Dean shows us how to make Filet Mignon for a romantic dinner for two in this video. Marinate your steak meat in the refrigerator using a plain Italian salad dressing. You can use a bottled dressing or make your own, if you prefer. Marinate for about 4 hours, 2 hours on each side.

How To: Make a handkerchief mouse

First of all you need a handkerchief or a cloth napkin. Make sure that it is clean for use. Now start by folding the two opposite corners together. This shall make a triangle. Now you have top fold the two middle bits so that they overlap at the center. Now start rolling them together upwards. It is very important that you are rolling them very tightly. This shall make the body of the mouse solid otherwise it may fall apart. When you have made a solid roll then fold the two ends upwards as sh...

How To: Replace the battery on a 2nd Gen iPod Touch

This video by repairs universe shows viewers how to replace the battery in the 2nd Generation iPod Touch. The tools you will need for this project include safe-open pry tools and a small phillips head screwdriver. To begin, remove the screen by releasing several clips that hold it to the frame using the safe-open pry tool. Run the tool between the case and the glass along all edges. Gently pull glass off and pry off the digitizer. Next, remove the small screw in the upper corner, lift up the ...

How To: Do construction paper weaving with your kids

This is a project to keep your kids entertained. It is also a great way to practice hand eye coordination and motor skills. The materials that you are going to need are; construction paper and something to cut the paper with.Depending on the age of the child you can use 3 colors or more for older children and 2 colors for the younger children. Color choice is left up to what the child wants.To get started take a full size sheet of construction paper. Fold this paper in half length-wise. Take ...

How To: Encrypt files in Mac OS X with the Disk Utility app

The Mac OS's Disc Utility allows for the encryption of files. To open Disc Utility click on the magnifying glass (spot light) up in the top right hand corner, and search for Disc Utility. Click on the first result in the list. Once Disc Utility is open, click on "create a new image" in the top tool bar. A new window will drop down, where you choose what you want to save the new image as. Give it a name, and choose the size you want it to be. Moving down, choose the encryption you want to use ...

How To: Make a continuous daisy chain necklace

This video shows you how to create a continuous, daisy-chain necklace. The materials used include: size 11 rock eyes in yellow, red and purple, a toggle clasp , 9mm thread and a size 10 beading needle. Start by sewing on one half of the clasp, tying a knot to hold it in place. Be sure to leave the tail ends long enough to be able to re-thread it later with a needle to sew the tail ends. The video then shows the precise order in which the various beads are threaded through to produce a chain i...

How To: French braid hair from a zig-zag part

Cute Girl Hairstyles shows you how to create a French braid hairstyle for your hairstyle. Firstly, divide the long hair into two parts with a zig-zag parting on the top of the head. Keep one half of the hair in a ponytail to keep it out of the way. Wet the hair down, and take a small section of the hair. Section that part into three and repeat. Cross the first piece with the second piece, and then cross the third piece over (braiding). Pick up hair and add it to the left lock and repeat. You ...

How To: Solder a wire

This video describes how to solder a wire. The first thing you have to remember is that the wires should be cleaned, shiny, and bright. Then trim about 1/2-inch of the insulation of the wires and then make a secure mechanical connection. Next, put some soldering pencil clean and shiny 60/40 rosin core solder. Do not use 50/50 core solder. Start by making sure that the soldering iron is tint. Put the soldering iron underneath the joint. Heat tends to rise and then touch the solder to the joint...

How To: Make realistic custom vampire fangs

Clean out the empty bottle that you are going to use. You can use a white dish-washing soap bottle or a cleaning agent bottle. Just make sure it is empty and clean. Use the pen to draw a wide rectangle that measures 3 inches long by 1/4 inch wide onto the bottle. The teeth you are making are going to stretch from either side of your canine teeth above and over your two front teeth. This will help them be more secure. Draw this onto a part of the bottle where it is curved. Draw two vampire tee...

How To: Make a Tall Balloon Centerpiece for Weddings & Events

See how to make a very tall, simple, yet elegant centerpiece for weddings and other events. You first need a tube and a base that it will fit into. Placing the tube in the base, use a hot glue gun to secure the tube into the base. You can then fill up the balloons with air using an air pump and tie pairs of balloons together. Twisting together four balloons, place the cluster of balloons around the base of the tube. Repeat with an additional 8 balloons and place this cluster at the top of the...

How To: Install a glass vessel sink or countertop

This video tutorial shows you how to install a glass vessel sink or countertop. First you need to make sure that the glass vessel sink or countertop has all of the pieces needed and that none of the pieces are scratched or broken. You then need to place the mouthing ring on the countertop where the sink is going to go. Make sure that the rubber side is facing down. Then carefully set the sink on the mouthing ring. You must then take off the tail piece of the pop up drain. Take off the ridge a...

How To: Introduce a pet rat to water

This instructional pet video shows a good way to introduce your pet rats to water. However, it's important to understand that some pet rats will just not like water. Your success will vary depending on your individual critter(s). Watch this tutorial video to learn the best methods of approach.

How To: This Smart Phone Mount Is Also a Wireless Charger

Whether you're using your phone's map to navigate or entrusting your passenger with the responsibilities of the mobile DJ, your phone needs a secure place in your car. And if it could charge while it's there, that's great too. The Naztech Smart Grip Wireless Charging Car Mount is exactly what you're looking for if you need a place to keep your phone secure, charging, and able to be used when it's safe to do so. Right now, this adjustable phone mount is on sale for $39.99, an 11% discount.

How To: Find Vulnerable Webcams Across the Globe Using Shodan

Search engines index websites on the web so you can find them more efficiently, and the same is true for internet-connected devices. Shodan indexes devices like webcams, printers, and even industrial controls into one easy-to-search database, giving hackers access to vulnerable devices online across the globe. And you can search its database via its website or command-line library.

News: After 5 Years, Touch ID Is About to Get Read Its Last Rites

RIP Touch ID. Apple's fingerprint sensor on iPhone and iPad models with Home buttons is about to become phased out on Wednesday, Sept. 12. While Touch ID will remain an integral part of models from the iPhone 5S to the iPhone 8 Plus, as well as the iPad Air 2 through the sixth generation iPad, Face ID will completely take over as the default security method for unlocking future iOS devices.

How To: Securely Sync Files Between Two Machines Using Syncthing

Transferring hundreds of screenshots, webcam recordings, keystroke logs, and audio recordings between your VPS and a local Kali machine can be tricky. Services like Dropbox don't always have the best privacy policies and suffer data breaches just like any other website. To mitigate these risks, we'll use a secure, open source, and decentralized alternative.

How To: The Beginner's Guide to Defending Against Wi-Fi Hacking

Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a few simple actions, the average user can go a long way toward defending against the five most common methods of Wi-Fi hacking, which include password cracking, social engineering, WPS attacks, remote access, and rogue access points.

How To: 4 Apps to Help Keep Your Android Device Secure

As of 2016, there are approximately 1.85 billion Android smartphones worldwide. This growing popularity has led to an increasing number hacks and cyber attacks against the OS. Unfortunately, Android users need more protection than what is offered by Google. The good thing is that there are a number of options available.

How To: Hide Your IP Address with a Proxy Server

Proxies can be quicker to use than a VPN for specific applications, like web browsers or torrent clients. Both services will hide your true IP address, but a VPN is slowed down because it encrypts all data through a VPN network, while a proxy just acts as a middleman for fetching and returning requests from a server on your behalf. When speed is needed, go proxy.

How To: Your Phone's Biggest Security Weakness Is Its Data Connection — Here's How to Lock It Down

After numerous scandals like the Equifax data breach and the 2016 US election, cybersecurity has become a significant issue for Americans. Unfortunately, anytime we use our devices, we're open to a cyber attack — especially when we browse the web. However, there are ways that we can make it harder for hackers and data miners.

Hack Like a Pro: Cryptography Basics for the Aspiring Hacker

Welcome back, my rookie hackers! As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be able to crack passwords and encrypted protocols such as SSL and wireless, you need to at least be familiar with the concepts and terminology of cryptography and encryption.