Support Received Search Results

How To: Know Who's Not Who They Claim to Be Online

All kinds of people pretend to be someone they're not on the internet, including scammers, people attempting to wind others up, hackers and web predators. Almost all of these people will leave bases uncovered and they're all easy to expose when you understand how to. Here are my favorite ways of finding out when somebody is lying quickly. Image Search

How To: Get your passport

If you are going to travel outside the United States on a ski trip with Skitravel.com, you will need a passport. From Skitravel's website you can click the "get a passport" link. The link will take you to the US Department of State's passport form (the DS11 passport form). On the Department of State's form, you have two choices, a passport book or a passport card. The passport book is good for ten years and you can travel anywhere in the world with it. The second choice is the passport card. ...

How To: Calculate your carbon footprint

Watch this video tutorial to learn how to calculate your carbon footprint. A carbon footprint is an equation that estimates just how much you, personally, are contributing to global warming—and all you have to do is plug some info into an online calculator. Figuring out how to make your footprint smaller, of course, is another matter.

How To: Immobilize an ankle

Learn how to immobilize an ankle. The ankle is a complex joint, so when an injury occurs, and you can't get help right away, the first thing to do is keep it from moving – you'll prevent any more damage to the surrounding nerves and tissue.

How To: Buy and win eBay auctions

Help yourself win that must-have item with these tips. You Will Need: a computer with internet access, money, & patience. Create an account. Browse the categories to familiarize yourself with the site, especially if you don’t have a specific item in mind. If you know what you want, start searching by using broad terms and synonyms to yield the most results. Add quotes around your search terms or qualifiers, such as a specific color or size, to narrow the field. You can also post on the “Want ...

How To: Sell your stuff on eBay

Turn your possessions into cash and become an online selling machine. You will need: Something to sell, a computer with internet access, an eBay account, a digital camera, shipping supplies, something to sell,a computer with internet access, an eBay account, a digital camera, & shipping supplies.

How To: Give subcutaneous fluids to a rabbit

Sub-q fluids should only be administered to an animal under the instruction of a veterinarian, but some pets, like rabbits, will need to receive them at home, when the veterinarian is not around. Proper procedure should be followed to ensure that the subcutaneous fluids are reaching the rabbit, and that the bunny doesn't get hurt from malpractice. Watch this video veterinary tutorial and learn how to give Sub-Q fluids to a pet rabbit.

How To: Treat strains and sprains [signed] (British Red Cross)

Everyone should be able to perform basic first aid, even those with hearing impairment. Deaf individuals are just as likely to save a life as anyone else, but they need to know how, just like everyone else. This video is signed to help those with hearing problems learn about strains and sprains treatments. Although strains and sprains are not a serious injury, they are still very painful for the sufferer, and the only way to make sure they heal properly is to make sure they get immediate atte...

How To: Fertilize & deadhead roses

In this how-to video, you will learn how to fertilize and deadhead roses. Late summer fertilization is okay for these roses. Make sure to water them in well, as this is key. Deadheading in late summer will give you a fall bloom cycle with the roses. Deadheading will mean cutting off dead blooms. Hips are dead blooms that have fertilized. These make seeds and some are either sterile or will actually grow. To properly deadhead, go down to the second or third five-leaf. Cut at a 45 degree angle ...

How To: Choose fruit trees

Doña Ana County Extension Agent John White and Master Gardener Benny Knudsen look at stone fruit trees on their tour of the "Garden of Weeden". The Mariposa Plum, the dwarf Stella Sweet Cherry, Elberta Peach, Tilton Apricot and the almond tree (which also belongs to the stone fruit family) are featured in this segment of Southwest Yard and Garden series. The suitability of these trees for a small garden is mentioned. Besides this, also discussed is the problem of late frost and its effect on ...

How To: Dive into new features of Photoshop CS4

Pixel Perfect is the "perfect" show to help you with your Photoshop skills. Be amazed and learn as master digital artist Bert Monroy takes a stylus and a digital pad and treats it as Monet and Picasso do with oil and canvas. Learn the tips and tricks you need to whip those digital pictures into shape with Adobe Photoshop and Illustrator. In this episode, Ben shows you how to dive into new features of Photoshop CS4.

How To: Operate the new iPhone 3G

Since it's introduction, iPhone has become the standard for design and ease of use, redefining what's possible on a mobile phone. And now with iPhone 3G, this revolutionary device gets even better, offering even more advanced capabilities. iPhone 3G works with fast 3G cellular and wi-fi networks around the world to keep you connected wherever you go. With its integrated GPS technology iPhone 3G makes it even easier to find where you are and where you're going. iPhone 2.0 software includes sup...

Hacker Fundamentals: A Tale of Two Standards

If you read my article on the OSI model, you got a good overview on communications from that model's perspective, but how does that relate to TCP/IP? We're going to take it a step further, getting into the idea behind the two address concept. How does an IP address and a MAC address work together? If you want to hijack sessions and all sorts of lulz like that, you need to understand these concepts. Let's get into it, mates!

How To: Hack WPA WiFi Passwords by Cracking the WPS PIN

A flaw in WPS, or WiFi Protected Setup, known about for over a year by TNS, was finally exploited with proof of concept code. Both TNS, the discoverers of the exploit and Stefan at .braindump have created their respective "reaver" and "wpscrack" programs to exploit the WPS vulnerability. From this exploit, the WPA password can be recovered almost instantly in plain-text once the attack on the access point WPS is initiated, which normally takes 2-10 hours (depending on which program you use).

News: Why Help?

When stories are told about people in need, the ones with happy endings include the details of someone that produced an action that caused the people in need to be better off than before. Do we have to wait for the identification of a need? Could we on purpose just plan to present products and services that cause our customers and client to see an improvement in their circumstances just because of the business interchange with an owner manager of purpose? The fair exchange of products or serv...

How To: Do a fakie on a BMX

In this How To Video Kurtis Elwell will walk you through how to do a fakie on a BMX. The best place to start learning how to roll a fakie is on a steep hill or incline. As soon as you start to lose momentum on the hill you will stop for a moment then start rolling backwards. If your BMX is equipped with a cassette wheel it will start to force you to pedal backwards. Then, when you are rolling backwards and want to turn around, turn your front wheel to a 45 degree angle. Lean back a bit so all...