Self Employed Networking Search Results

How To: Remove and replace a front wheel bearing on a 1991 Ford Explorer

A wheel bearing doesn't have to be a costly fix for the mechanic. It could be a relatively cheap repair job for all you do-it-yourselfer types. There are different types of wheel bearings, but the type explained in this video, on a 1991 Ford Explorer, is a self-contained all-in-one assembly. If you have a '91 Ford Explorer, or a different vehicle with this kind of wheel bearing, then you're in luck… watch and learn.

How To: Do an arresting handling & restraining technique

In this video tutorial, viewers learn how to do an arresting technique for handling and restraining. As the opponent begins to punch you, grab the opponent's wrist with one hand. Then push the other arm under the opponent's bicep and under the armpit. Now pull the opponent towards you and push their arm to their back. Make sure you grab over the opponent's hand. Then use your knee to push against and opponent's hamstring and pull down their shoulder to throw them down on the floor. Continue l...

How To: Map network drives from a remote server

In this tutorial, we learn how to map network driers from a remote server. First, go to run on your start menu, then type in the id address or server name for what you want to access and press enter. Now, right click on the folder you want to map and click on map network drives. Choose any letter you want from the drop down menu, then click next to the "reconnect on logon" text. Click on the finish button, then open your newly mapped network drive from your computer. You can do this for any s...

How To: Perform a major outside foot reap in judo

In this video tutorial, viewers learn how to do the major outside foot reap in judo. This task is very easy, simple and fast to do. Begin by grabbing onto the opponent's arm and shoulder. Then step in towards the opponent and pull the opponent towards you. Now bring out your leg and sweep the opponent by push back their leg. This can be done on either right or left side. This video will benefit those viewers who are interested in martial arts and self defense, and would like to learn differen...

How To: Do a Kyokushin or kickboxing low kick combination

In this video tutorial, viewers learn how to do a Kyokushin/kickboxing low kick combination. Begin by making a low kick to the opponent's inner thigh and instantly punch/push to make distance. At the same time, position yourself to the opponent's side. Then perform a low kick on the opponent's front upper leg. Bend your knees when kicking for more power and prevent your opponent from closing in. This video will benefit those viewers who are interested in learning martial arts and self defense...

How To: Tether a laptop to a Droid smartphone for free WiFi

In this Electronics video tutorial you will learn how to tether a laptop to a Droid Smartphone for free Wi-Fi. For this you will need the android wifi tether application. Download the version for your device from here and install it. Then launch the app and press the icon to start tethering. In your laptop, go to settings and then to wi-fi. You will see a new network called android tether. Connect to the network and you will see that it works. As with any other network, you can change the nam...

How To: Make a cappuccino on a home espresso machine

In order to prepare Cappuccino with your home espresso machine, you will need the following: milk, coffee, an espresso machine. Fill steamed milk container 2/3 full of milk. Submerge the milk underneath the spinner, before you turn it on. Allow it to steam the milk, until it is warm and frothy. Keep an eye on it, judging the consistency for your self. Remove, when the milk is warm and frothy. Turn the machine off, before you remove the cup. Clean your wand.

How To: Blur out a face in your video using Wax 2.0

Watch this video and learn how to protect your identity on the internet. This clip will help you learn how to blur out your face and alter your voice when posting videos on the web, where your identity is an important secret. Stay anonymous while portraying your opinions. This software can also be used to avoid release issues with strangers in the backgrounds of your videos. Preventing passers by from having there picture posted with your opinions opening you up for legal action. This can als...

How To: Make an elegant fall flower arrangment for a home

The self-proclaimed "Flower God" was shopping the other day when he came across a vase that he could not resist purchasing. He shows us how to create a beautiful flower arrangement. He works with two different heights: a high plain and a low plain. He wires up some flowers so that they hold their shape better, clustering them down at the bottom. He then accents the low section with some Japanese Lanterns which project outward from the lower section. Next come the flowers for the height, tall ...

How To: Create a custom flash cursor in Flash

In this flash tutorial the instructor shows how to create a custom cursor. This is created using shapes and simple Action Scripts. First open the flash tool and create a simple shape. Then convert the shape in to a movie clip and add simple animation to it where it switches colors. Now create a new layer and add Action Script code as shown in the video. This Action Script code is a command to make the shape follow the cursor. Now the shape follows the cursor as the cursor moves and appears as...

How To: Convert improper fractions to mixed numbers

In this tutorial the instructor shows how to convert a improper fraction to mixed number. In the example the instructor takes the denominator of the mixed fraction and writes it beside and keeps adding it self to the latest number and he keeps on doing that way generating a series until he reaches the value of the numerator. Now he counts the number of occurrences of the numbers in the series before the value of the numerator which gives the value of the whole number in the mixed fraction. No...

How To: Use container fields with FileMaker Pro 10

This lynda.com video tutorial shows how to use container fields with FileMaker Pro 10. When you want to create fields in FileMaker database you have the choice on what kind of fields you want to make. Many general fields are self explanatory like text, date etc., but there is a special kind of field called the container field. FileMaker Pro container field is a versatile data type in that it can store any kind of binary data. Container fields can be used to hold binary data in four broad clas...

How To: Apply a middle eastern makeup look

Oftentimes female style and tradition in the Middle East leaves little room for self-expression. This is where makeup comes in. Women covering their heads and bodies can personalize their look by applying dramatic makeup to their faces. Check out this tutorial and learn how to create a beautiful, exotic makeup look. This look is dramatic and inspired by the beauty of the Middle East. It is not difficult to accomplish if you follow along with the step by step. Start enhancing that lovely face ...

How To: Match the color of objects in Photoshop

Match the color of objects on Photoshop. Take a picture of your self of one shirt that the shirt is on different color mean while choose the black tea shirt because it the traditionally one of the harder colors, change the image mode to the lab color for both images then use eyedropper tool and expose the info pallet select the neutral part of the image i.e. red. Hold down shift then we can see the icon changes then add contrast to it by hue saturation present in the layer pallet.

How To: Build confidence with improved presentation skills

Do your presentation skills need a little work? Being in front of a crowd or some potential clients may be one of the hardest things you will ever do, but staying confident makes all the difference. Losing any bit of confidence will result in your presentation falling flat and killing your self-esteem, and perhaps even risking your job. So, being confident is a must.

How To: Detect hackers with netstat

Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is available on Unix, Unix-like, and Windows NT-based operating systems. This video tutorial presents a basic introduction to working with the netstat tool. Determine whether you've been hacked with this how-to.

How To: Make a Taurus fall in love with you

Those born under the Taurus sign need to be handled with kid gloves. To trap a Taurus you will need a loyal nature, a strong sense of self image an a respect for money. Take the tie to look extra special for your Taurus since they pay particular attention to appearances. Learn how to use astrology advice in dating, by watching this how-to video. Pick up astrology tips on making a relationship with a Taurus work.

How To: Mod XBOX, PS2 and Nintendo Game Cube

In the 3rd episode of thebroken Kevin and Dan show how to mod the original XBOX, the PS2, and the Gamecube. But the show kicks off with a couple 40z and some easy tips on how to crack windows passwords. Ramzi busts out with his best hacker tip yet, a self-destructing laptop! and what's it like for a hacker in jail? Kevin gets the details as he chats up hacker 1, Kevin Mitnick.

News: Human foosball

forget that half assed human foosball, this is the real deal. set up a giant foosball game- strap your selves to some kind of revolving polls to flip you upside down like real foosball; throw in some balls filled with nasties (dog anal gland juice is the most foul smelling substance known to man) and let the game begin!

How To: Secure your wireless Internet connection

This video tutorial is in the Computers & Programming category where you will learn how to secure your wireless internet connection. If you don't secure your wireless internet connection you are allowing others to enter in to your network. Open the set up CD and first change the network name from the default name to anything that you like. For this go to step 3 of 'naming your network', type in your network name and click 'next'. Then you enable security on the network by choosing 'WPA2'. Nex...

News: Canon's 5D Mark II Invades Hollywood

Since its release three years ago, Canon's EOS 5D Mark II has been the most sought out digital SLR for photographers everywhere. But it's also becoming a favorite amongst cinematographers, thanks to its compact size and high-def video recording mode, seeing action in everything from independent features to Hollywood blockbusters and even big network TV shows.

How To: Understand & Use IPv4 to Navigate a Network

You may not know it, but the IPv4 address of your computer contains tons of useful information about whatever Wi-Fi network you're on. By knowing what your IPv4 address and subnet mask are telling you, you can easily scan the whole network range, locate the router, and discover other devices on the same network.

How To: Use SSH Local Port Forwarding to Pivot into Restricted Networks

SSH is a powerful tool with more uses than simply logging into a server. This protocol, which stands for Secure Shell, provides X11 forwarding, port forwarding, secure file transfer, and more. Using SSH port forwarding on a compromised host with access to a restricted network can allow an attacker to access hosts within the restricted network or pivot into the network.