Smart Idea Search Results

How To: Make Your Laptop Theft Proof

The dreaded moment you hope never happens—someone has stolen your laptop. You could have private information, pictures, or even private information belonging to the company you work for, all lost forever. It can cause you pain, money, or even a job.

How To: Join Second Life and Create Your Own Avatar

On June 23, 2003, Linden labs created a free client program known as Second Life. This program allows users, or residents, to interact with each other in a virtual world by using avatars. Thanks to this program, residents are able to explore, socialize, and create and trade virtual property, and services with each other. Second Life has become one of the most popular programs used by various age ranges from 16 to 60, but how do you enter this world and get your own avatar?

News: hahaha i got 2 really bomb ideas

alright my first idea is to go to a ski mountain wearing ridiculous stuff and looking retarded and then go on a chairlift and halfway at a spot you would hang off the chairlift and make them stop the chairlift and get everyones attention and then just drop and ski away or something like that haha (of course a height that you wont die from dropping from) and my second idea was to go to a fitness center/gym or anywhere that has a lockeroom and run around naked chasing eachother and falling in t...

How To: Upgrade your suitcase with customized, printed designs

If your bags have seen too many highways and byways, treat them to a first-class upgrade with this idea from Rust-Oleum and ReadyMade: Give world-weary luggage a new lease on life with Rust-Oleum paint and hit the road, stat. Spray paint a stenciled image on your suitcase to update and personalize your look! You will need an image, rustoleum spray paint, a utility knife, masking tape, spray adehsive, rubber gloves and a mask. Cut out your bold simple design and use as a stencil. Use a spray p...

How To: Power off the blocks in swimming

Most top swimmers use the grab start to get their race under way. This gets you moving off the blocks quickly and into the water smoothly. The starter will not begin the race until everybody is ready and still. This is really important because you can be disqualified if you fall in before the start or if you are slow getting ready. Follow along in this how-to animation to learn the best method to power off the blocks in swimming.

How To: Make a clay bowl

Clay pottery is a fun and creative art form that can be done with slabs of clay and not only on a spinning wheel. This free video clip series will show you several tips on how to construct a batter bowl and open a world of design ideas for you. Make a clay bowl - Part 1 of 20.

News: tennis ball drive by

its a much more intense game of dodge ball. jackass crew members will line up against a wall while another crew member peers out of the sun roof of a car with a tennisball launcher shooting tennis balls at the other crew members. idea 17

News: exploding toilet poop

Ok look find a restroom that all the Jackass cast would would use...then replace it with a non working toilet.and the idea is that when a jackass member has to use the restroom they will sit down and poop,but inside the toilet there will be some poop hidden and that poop will explode on them and will be really gross but a great prank, and they will have poop from another jackass member.hehe sounds like great idea to me.oh yeah and it can only be one victim or maybe more who knows you guys try...

News: Bobbing For Yellow Apples

Okay go with me on this one, I've had this idea for years. Play bobbing for apples, but instead of having the apples in water you should use piss (urine). Or you could use beer or some other liquid that looks like piss, and for the last person switch the beer tank with a tank filled with piss. It would be hilarious

How To: Attach a crystal to your wand

Watch this blurb about wands and how to attach a crystal to the end of yours. If you use wood, and you harvest it from the wild, it's a good idea to leave an offering of some sort. Also, research the magical qualities of various types of trees first. Attach a crystal to your wand.

News: Secure Your Wireless Network from Pillage and Plunder in 8 Easy Steps

Wireless networks. Nowadays, everyone uses 'em, but most don't secure 'em. On average, I can drive up and down any block in my city and find at least one or two open or semi-open networks on any given day. With some changed MAC addresses for good measure, an attacker can use your network as a spring board for who knows what. When the police come a few days after, they are coming to your door—and not to talk about how nice your lawn is. Don't be that guy.

How To: Read a Poem

How to Read a Poem Poems can be read many ways. The following steps describe one approach. Of course not all poems require close study and all should be read first for pleasure.

News: Creating Content For Videos

Okay, so what are we going to make our videos about? I’ve written before about creating articles, and what kind of content we are going to put in our articles. So what are we going to put into our videos? Let me give you a few ideas that I have. These are some things that I would do if I had a service business.

How To: Build a Wireless Energy Transfer Array to Power Light Bulbs Without Plugging Them In

In this article, I'll show you how to built a Wireless Transfer of Energy Transmitter. Simply put, this device will send electricity to a florescent light bulb and light it up, from up to three feet. The idea originally (at least, prominently) came from Nikola Tesla (read more about this amazing inventor here), who used his Tesla coils to transfer wireless energy to light bulbs in demonstrations (photo below). However, the circuit described in this article consists of a flyback transformer, n...

How To: Encrypt And Decrypt Text In Python

In this article, I'll show you how to create a simplistic AES python based text encryptor. You'll need python 2.7 and PyCrypto (found here). The code is fairly simple, a user enters an encryption key (which basically tells the program how to scramble the text, using an algorithm), then the text to be encrypted. The program takes the key and text and inputs it into the "cryptograph" or code-based algorithm from PyCrypto. PyCrypto can use 16, 24, or 36 character encryption keys, but for the sak...

Great Deal: Free Facebook Timeline Business Cards

When you're meeting new people, chances are they're no longer interested in collecting your phone number or email address. Instead, they're more interested to see if you have a Facebook account. So, what's a better way to get connected online in the offline world than a business card of your Facebook Timeline? The new cover image and info section on your profile makes for a great Facebook business (or personal) card.