Shangri La Security Search Results

How To: Make a motion triggered spy camera

Kip "Kipkay" Kedersha is known for his intriguing and clever how-to and prank videos, even when he teams up with MAKE Magazine. He will show you how to tweak, hack, mod, and bend any technology to your hacking needs. No electronic device, gadget, or household item can stand the test of Kipkay's hacks and mods.

How To: Play Bobby Darin's "Beyond the Sea" by on the ukulele

Want to play Bobby Darin's "Beyond the Sea" on your ukulele? Learn how with this free video ukulele lesson from Ukulele Mike. Whether you play the ukulele or bass kazoo, there is no better way to improve your chops than by learning to play your favorite songs. Not only is it more fun and much easier than running drills or memorizing a chord book by wrote, it's obviously also a wonderful way to build your repertory of songs. For more information, and to get started playing "Beyond the Sea" or,...

How To: Play "Between the Devil and the Deep Blue Sea" on the ukulele

Want to play "Between the Devil and the Deep Blue Sea" à la George Harrison of the Beatles on the ukulele? Learn how with this free video ukulele lesson from Ukulele Mike. Whether you play the ukulele or bass kazoo, there is no better way to improve your chops than by learning to play your favorite songs. Not only is it more fun and much easier than running drills or memorizing a chord book by wrote, it's obviously also a wonderful way to build your repertory of songs. For more information, a...

How To: Play free and rest strokes on the ukulele

In this free video ukulele lesson from Jens Albrecht, you'll learn how to play both free and rest strokes on your ukelele à la Ukulele Mike in his "Paris Nocturne." Whether you play the ukulele or bass kazoo, if you want to improve your technique, you'll need to practice. Fortunately, the Internet is awash in high-quality video tutorials like this one, which make practicing both easy and highly enjoyable. For more information, and to get started playing free and rest strokes on your own ukule...

How To: Do four different cupcaking icing techniques

In the confectionary world the way you ice or present a cupcake is just as important as how good a cupcake tastes. Thanks to cupcake bakeries like Magnolia Bakery in NYC and Sprinkles in L.A., the age of the yummy and chicly decorated cupcake has officially been ushered in. Make your own cupcakes that much more in line with the times by watching this cupcake decorating tutorial.

How To: Protect your privacy online

In this video tutorial, viewers learn how to protect their privacy online. Some information that is exposed every time you visit a website are your I.P. address, operating system and browser. To view what information that you are revealing to a website, visit the site provided in the video. This site will give you all the information that you are exposing in a website. This video will benefit those viewers who visit a lot of websites, and would like to learn how to view the their exposed info...

How To: Make watermarks in paper for security

Don't fret too much if your watermark is barely noticeable when you're finished with this project - the less obvious it is, the better a job you've done. Watermarkers are present in many types of paper, especially the monetary kind. If you hold up a ten dollar bill you'll see a watermark of Thomas Jefferson's face on the right, proving the bill is real.

How To: Enable the 'Ctrl-Alt-Del' login window on Windows 7

Use Microsoft Windows 7? Miss the old Ctrl-Alt-Delete log-in prompt? It's easy to restore. So easy, in fact, that this home computing how-to from the folks at CNET TV can present a complete overview of the restoration process in just over a minute's time. For more information, and to get started restoring this useful security feature on your own Windows 7 PC, watch this free video tutorial.

How To: Add a watermark to photos in Photoshop

The PhotoshopUniverse team effectively teaches a method of adding a watermark to an image, as a security feature to make it harder to copy or steal. Instructions are simple and easy to follow, using as an example a photo of two girls that one might have in his or her family album. Using Photoshop, the text that will become the watermark is added, rotated and patterned across the entire image. To finalize the watermark, the opacity is edited to a desired value so that it does not interfere wit...

How To: Turn your doorbell into a guard dog alarm

This video shows you how to make a security device out of a door bell. The concept is that most thefts happen when people are away from home. To make sure of this the thief rings the door bell to make sure that nobody is home, if nobody answers then they will break in. A lot of people have dogs and alarm systems which will scare off the thieves, but this alarm system combines both. To make this devise you have to buy a speaker system that connects to your door bell. When the door bell rings i...

How To: Create a Moroccan magenta nail art design

Julieg713 is a nail art expert. Check out her nail art tutorials on WonderHowTo (Search Julieg713). Her nail art looks are fun & pretty, not to mention well demonstrated. This nail polish video demonstrate how to create a Moroccan magenta nail art design. Watch this video to learn how to recreate this nail art look.

How To: Prep for auto racing with proper seat belt security

There are two ways to properly lock your seat belt. You can use the childlock auto adhjustment. Or you can recline the seat, but then push forward to make your seat belt very tight. You don't want to be flopping around in the car. The bottom of your wrist is on top of the steering wheel and your shoulder is in the seat. It will loosen up when you get on the track.

How To: Hack websites using cross-site scripting (XSS)

In this episode of Full Disclosure we are explaining the website attack known as Cross-Site Scripting (XSS). Cross-Site Scripting is a type of security vulnerability that affects web applications that do not sanitize user input properly. This kind of vulnerability allows an "attacker" to inject HTML or client side script like JavaScript into the website. Cross-Site Scripting is most commonly used to steal cookies. Cookies are used for authenticating, tracking, and maintaining specific informa...

How To: Completely Prevent Apps from Accessing Your Camera & Microphone on Android

We're thinking more and more about our digital privacy these days. When we first started using smartphones, we'd download apps with reckless abandon, allowing permissions lists as long as novels in order to play free games. Now, we know that apps have access to things like our cameras and microphones, even when they shouldn't. Luckily, taking away these permissions is easy.