Technical Search Results

How To: Fit roller blinds

Need to change a little décor in your home or apartment? Blinds are the perfect solution for bringing a room to life... or maybe just for blocking out the sun. This video tutorial will show you how to fit roller blinds. Roller blinds can be kind of tricky, but if you have a little help, it's a cinch. Now, go fit a Roller blind!

How To: Fit wooden venetian blinds

Need to change a little décor in your home or apartment? Blinds are the perfect solution for bringing a room to life... or maybe just for blocking out the sun. This video tutorial will show you how to fit wooden venetian blinds. Wooden venetian blinds can be kind of tricky, but if you have a little help, it's a cinch. Now, go fit a wooden venetian blind!

How To: Fit vertical blinds

Need to change a little décor in your home or apartment? Blinds are the perfect solution for bringing a room to life... or maybe just for blocking out the sun. This video tutorial will show you how to fit vertical blinds. Vertical blinds can be kind of tricky, but if you have a little help, it's a cinch. Now, go fit a vertical blind!

How To: Become a wedding DJ

Do you love music and need a little extra cash? Do you think you have a knack for entertaining others with your rockin' playlists? Check out this video and learn how to turn that musical mind into a career as a wedding DJ. The most memorable part of the wedding reception is the music and dancing and you could be a part of it! Follow these steps and have people complimenting you on your awesome tunes as they leave the reception.

Social Engineering: How to Use Persuasion to Compromise a Human Target

Social engineering makes headlines because human behavior is often the weakest link of even well-defended targets. Automated social engineering tools can help reclusive hackers touch these techniques, but the study of how to hack human interactions in person is often ignored. Today, we will examine how to use subtle, hard to detect persuasion techniques to compromise a human target.

NR50: The People to Watch in Mobile Augmented Reality

While the world is only recently becoming aware of its existence, augmented reality has been around in some form or another since the '90s. In the last decade, with the advancement and miniaturization of computer technology — specifically smartphones and tablets — AR has become far more viable as a usable tool and even more so as a form of entertainment. And these are the people behind mobile AR to keep an eye on.

How To: Do a Business Part 2 of 5

Although a business plan is a technical document, remember that this first draft will not be. The audience and author of this document will be the owner/manager of the small business. The purpose is to get as much information written as possible so this draft can be used as a starter for versions of the business plan that are crafted for other audiences. It eliminates the possibility of the first business plan you write for other audiences actually looks like your first attempt. Since the lat...

How To: Quickly Check if Your iPhone Is Still Covered by Apple's Warranty or AppleCare

Let's say that the screen on your iPhone is showing signs of discoloration, which makes the display annoying to use. You'll need a replacement display or a new iPhone as soon as possible. If you have one of the newer iPhone models, the cost to fix it might be more than your wallet can handle, but a warranty may still cover it, and there are ways to check quickly.

How To: Conduct a Pentest Like a Pro in 6 Phases

Penetration testing, or pentesting, is the process of probing a network or system by simulating an attack, which is used to find vulnerabilities that could be exploited by a malicious actor. The main goal of a pentest is to identify security holes and weaknesses so that the organization being tested can fix any potential issues. In a professional penetration test, there are six phases you should know.

News: 8 Tips for Creating Strong, Unbreakable Passwords

This weekend, hackers broke into the servers of the popular shoe shopping site Zappos, giving them access to the personal information of 24 million Zappos customers. The user data taken included names, email addresses, billing and shipping addresses, phone numbers, the last four digits of credit card numbers, and encrypted passwords. However, full credit card data was not lifted, and passwords were cryptographically scrambled.