Spyware Programs Search Results

How To: Build the perfect Windows Media Center PC

You don't need a lot of money to build yourself an impressive home theater system. Yes, typically putting one together means piecing together a bunch of speakers, a supersized plasma HD TV, and whatever other add-ons you want. But really getting a great cinematic experience involves nothing more than having a computer with some fancy programs.

How To: Make a one-camera shoot look like multi-cams

It's easy when Jamie-B from Total Recall Films takes an in-depth look at filming and editing techniques you can easily use to make your next film look and feel professional using a well know technique called "tricking the camera" -- and the viewer. Watch to see how to make a one-camera shoot look like multi-cams.

How To: Animate in Maya

Animation controls run on the bottom of the screen. The time slider is the most important control for designing frames in Maya. Playback is exactly intuitive. This is a basic overview of Maya animation protocol and a lesson in using Maya tools.

How To: Understand color theory and the color wheel

Check out this video from Sessions on using the color wheel. Better understand color relationships, color schemes and color theory. This is a great lesson for designers, artists, stylists and decorators. Create color harmony using the color wheel. Tutorial video from Sessions Online Schools of Art & Design's "Color Theory" course. Part of Sessions' Graphic, Web, Digital Arts, Marketing, and Multimedia Arts Design certificate programs.

How To: Bypass RealVNC authentication

VNC stands for Virtual Network Computing. It is remote control software which allows you to view and fully interact with one computer desktop (the "VNC server") using a simple program (the "VNC viewer") on another computer desktop anywhere on the Internet. The two computers don't even have to be the same type, so for example you can use VNC to view a Windows Vista desktop at the office on a Linux or Mac computer at home. For ultimate simplicity, there is even a Java viewer, so that any deskto...

How To: Use the Internet Explorer 7 phishing filter

Check out this video tutorial to learn more about the Phishing Filter on Internet Explorer 7. Web browsers such as Microsoft's Internet Explorer 7 have become an important part of the computing experience for business and home users around the world. With the popularity of web browsers for accessing information, running programs, and even accessing corporate resources, the browser has become a target for viruses, malware, and phishing schemes that present real dangers to Internet users. Inter...

How To: Chage the Adobe Flex 3 preloading screen

Altering the preloading screen in Flex 3 sure can be complicated, to say the least. Wouldn't it be awesome if the whole process was easier? Maybe if someone made, I don't know, a tutorial that walked you through the steps so that even a beginner could understand the procedure. Wouldn't that be fantastic? We thought so too... so here it is. Watch and learn how to change the Flex preloading screen in this programming tutorial.

How To: Create bones in Maya 8.5

If you need to create an animated character, Maya is the software program for you. If you don't know how to make that character you've dreamed up, then maybe you should check out this Maya video tutorial on an important step -- creating a skeleton structure. Creating bones could be a daunting task in Autodesk Maya 8.5, but with the help of this four-part video, you'll see how to create those realistic bones for your animation with ease. You'll also see some common unintentional wrong rotation...

How To: Hack WPA WiFi Passwords by Cracking the WPS PIN

A flaw in WPS, or WiFi Protected Setup, known about for over a year by TNS, was finally exploited with proof of concept code. Both TNS, the discoverers of the exploit and Stefan at .braindump have created their respective "reaver" and "wpscrack" programs to exploit the WPS vulnerability. From this exploit, the WPA password can be recovered almost instantly in plain-text once the attack on the access point WPS is initiated, which normally takes 2-10 hours (depending on which program you use).

How To: Password protect PDF files with NovaPDF

This video tutorial belongs to the software category which is going to show you how to convert a Word document to a password protected PDF file with NovaPDF. Go to NovaPDF and download the program and install it. It is a paid program. Select the word document that you want to convert and select print option. Under the name of the printer you will find novaPDF option. Select this and click 'preferences'. Now click on 'security' and select high level encryption. In the document permissions, sel...

How To: Master and mix a hip-hop song using Cool Edit Pro 2.0

In this how to video, you will learn how to master and mix a rap song using Cool Edit Pro 2. First, download the program and open the vocal track in the program. Double click the vocals to highlight it all. Next go to effects and pick amplitude and amplify. Choose center wave and click okay. Go to amplitude again and choose dynamic processing. Choose very fast processing. Go to delay effects and type in 250, 10, 1812, 20, 100%, and 30% in the window. Next, go to filters and pick FTT filters. ...

How To: Convert movie files to DVD player-playable video

In this video from Act2Scene5 we learn how to convert movie files to DVD player playable video using ConvertXtoDVD. All you have to do is take a movie file and drag it into the interface. The program will import it into the program. Once it's in the application, you have several options you can do. You can change the name of the DVD so you can name it. You can also set the DVD to auto start. You can use loop playback where the video will restart after watching it through. Another option is to...

How To: Control a friend's PC with Windows XP Remote Desktop

Wartex8 demonstrates how to use remote desktop in Windows XP. Remote Desktop is a useful utility that you can use to control another computer and its applications.The necessary steps that are adopted to activate remote desktop are:1) Right click on my computer icon (either the icon on the desktop or the one on the start menu list) and select properties, and a new dialog box called system properties will pop up on the window.2) In the System Properties, select the computer name tab and write d...

How To: Get turn by turn directions with Ford SYNC

If you have just purchased a new Ford Taurus, you may have noticed the new SYNC feature. SYNC is a GPS built right into your dashboard. If this is your first time using a global positioning system, you may need a few pointers. Check out this video and learn how to access step by step directions and get where you need to go.

How To: Do a Windows XP system restore

Although it is a rare and potentially frightening occurrence, knowing how to do a system restore in Windows XP is an important thing to know how to do. To get started with a system restore, select the Start menu in the lower right of your screen. Then select All Programs. Then from the All Program menu, select Accessories and then from Accessories, select System Tools. There are several items under System Tools, but you want to select System Restore. You will follow through the next few scree...

How To: Unlock a version 3.1.2 iPhone 3G or 3Gs

Unlock and jailbreak your iPhone! You can either reinstall the entire operating system, wiping all the data from your phone, or you can wait for Black Snow to come out. In the method shown in the video, you can unlock right away. To restore, hold option (on a Mac) or shift (on a PC) and click restore. After it is done restoring, you should be getting an error message that the phone isn't registered and to insert a SIM card. Insert the SIM card you want to use. Close iTunes and open up www.bla...

How To: The Best-Selling VPN Is Now on Sale

The ability to browse the web in coffee shops, libraries, airports, and practically anywhere else you can imagine is more than convenient, but convenience has risks. Using public Wi-Fi allows others to spy on you easily. Even your own internet service provider can see every website you've ever visited. Don't fall into the trap of protecting your identity, data, and devices after it's too late.

How To: This Best-Selling VPN Is on Sale for Just $12 Today

Now that more people are working from home on unsecured networks and personal devices, hackers are having a field day accessing everything from private browsing histories to personal banking information. A virtual private network (VPN) is the first and most important line of defense when it comes to protecting all of your devices from digital intrusions, but not all VPNs are created equal.

News: If You Have Philips Hue Bulbs, This $25 Accessory Is a MUST

I got my first Philips Hue White and Color Ambiance bulbs because they're the consensus best of the best for colored lighting. But after spending 90 bucks on two light bulbs, when it came to all the accessories like switches and buttons, I went with cheaper third party options. Little did I know, I was overlooking a great first-party accessory with a surprisingly reasonable price.

How To: Get Started with MicroPython for ESP8266 Microcontrollers

For anyone interested in using cheap, Wi-Fi-connected microcontrollers like the ESP8266, the Arduino programming language can be a barrier to entry. Based on C++, Arduino requires knowledge of more computer science than languages like Python. Fortunately for beginners, setting up MicroPython on an ESP8266 allows anyone to write Python on affordable microcontrollers in a matter of minutes.