Trusted Florists Search Results

How To: Your Android Phone Comes with a Face ID Feature Built In — Here's How to Use It

The iPhone X has a new unlocking mechanism called Face ID, which replaces the old Touch ID system since the phone no longer has a fingerprint sensor. The way it works is simple — you just look at the phone, it recognizes your face, then the system unlocks — so Apple deserves the praise they're getting for it. But did you know you can get almost this exact same feature on any Android device right now?

How To: 3 Ways to Unlock Your Samsung Galaxy S8 Faster — Without Using the Fingerprint Scanner

A great many S8 and S8+ users have undoubtedly spent quite a bit of time figuring out ways to unlock their new Galaxy in as few steps as possible. One of the most endearing features of previous Galaxy models was the ability to unlock the phone by pressing the home button and momentarily leaving your finger there for the sensor to do its job, almost instantaneously opening the device — all without having to pick up the phone.

How To: Kickbox

Learn how to kickbox from the trusted folks at Expert Village. Strap on your gloves and get in shape with some simple tips and workouts. This video is a culmination of moves that you can learn individually as well.

How To: Get the OnePlus 5T's Face Unlock on Any Phone

The OnePlus 5T was just released, and it's packing several new useful features. While many OnePlus 5 buyers are feeling frustrated with the quick release cycle, lots of fans are still clamoring to buy the new device. Aside from the larger screen, most of the buzz around the 5T has centered around the new face unlock method. Thanks to a clever hack, you can now get this feature on almost any phone!

How To: Curl your hair using a flat iron with Kandee Johnson

We all love primping products, but what girl doesn't want to save a few bucks when she can? While lots of beauty companies will advertise that they have the best curling iron for you to achieve those Kate Hudson beachy waves, the truth is that you really don't need a curling iron at all. In fact, to get your hair bouncy and curly, all you really need is a flat iron.

How To: Get rid of ink stains on leather purses cheaply

If you've ever owned a leather purse, you know that ink or pen stains are a pain in the ass. If you've ever owned a designer leather purse, then you've probably even cried over an accidental stain (oh no! My $3,000 purse is ruined!). Removing ink stains from leather is thought to be extremely difficult, but there is a way to do it quickly and easily.

How To: Select a quality car mechanic & shop

This how-to video explains the importance of choosing a quality car mechanic and shop. This video is by AAA. They say that by investigating a shop before you trust them making repairs on your car, you can save a lot of money later if they make a mistake. John Neilson of AAA explains to look at the cleanliness of a shop because if it is clean then they probably take customer service very serious. If you follow these easy instruction you will be assured that you can select a quality car mechani...

How To: Train your dog to be calm around new objects

This video explains how to keep a dog calm and to be less reactive to objects that it is not used to including baby strollers, hats, canes, and a few other items. Starting with a few tips on how to get a dog used to the item in question such as keeping a leash on the dog and far enough away from a person the dog trusts and loves so that the dog will associate the object with a person. There are many aspects when training a dog in this way and each method can be tried if one does not work. Aft...

How To: Make a level two boffer sword for LARPing

If you're a LARP maniac, or just a fan of LSD-themed (Latter-day Saint) games and activities, then this tutorial is just the ticket. Check this video out to learn how to make a foam-padded sword that is easy and inexpensive. This level two boffer sword will take care of your LARPing opponents like Chuck Norris. If you're a fan of live action role-playing, then this boffer sword is just the beginning, trust me. There's a level three boffer sword, too.

News: A Siri 'Feature' Makes Personal Information Accessible from a Locked iPhone

If you follow tech, you're probably familiar with Siri, Apple's personal voice assistant, which has been integrated heavily into iOS ever since iOS 5. But you might not have known that Siri is capable of performing some tasks when the iPhone is in a locked state. The default state of iOS is to allow access to Siri from the lock screen, most likely for the convenience of hands-free access to the phone.

How To: Open Third-Party Apps from Unidentified Developers in macOS

Apple has a built-in way to protect you from opening up potentially malicious apps on your computer in Mac OS X Lion, Mountain Lion, Mavericks, Yosemite, El Capitan, and macOS Sierra. This setting, named Gatekeeper, will never stop you from installing apps from the Mac App Store, but it could from anywhere else. If it's an app you're sure you want to install on your system, here's how to do it.

How To: Weed in hard-to-reach spots

One of the most challenging, arduous parts of gardening is weeding vegetables that are close to the ground. Cabbage, for instance, leafs out near the earth and can be fiendishly tricky to weed. In this Growing Wisdom gardening tutorial, you'll learn about some of the tools that can help you weed those hard-to-reach spots without breaking your back in the process.

How To: Prevent file tampering in Windows

Do you actually trust your friends to not mess around with your files when you let them check their email or get on Facebook on your computer or laptop? You should think long and hard about that. If you insist on letting anyone get access to your computer, you should check out this tip from Tekzilla. Learn how to prevent people from messing with your files. Keep your files from being deleted or renamed, and keep them secure.

How To: Secure MS Word documents with Digital Signatures

Securing Microsoft Office Word 2007 documents with Digital Signatures - When you receive a document that has been signed by someone you know, you are more likely to trust the contents than those of a document that has not been signed, or has been signed with an unfamiliar signature. Signing a document validates it to someone who recognizes your signature, now add the same degree of integrity to your documents in Microsoft Office Word 2007 thanks to the new Digital Signatures feature. For more...

How To: Make a Peruvian macramé bracelet

Add a little South American flavor to your wrist by learning to make your own Peruvian bracelet. You'll need some heavy string and some macramé skills to craft your own Peru-style bracelet, but trust us—it's not hard. Just follow along with the video and see how easy it is.

How To: Secure your data with an SSH Tunnel

This new episode of Full Disclosure shows you how to use a SSH Tunnel to secure your data when you are on an untrusted LAN (ex. Coffee Shop, School's network, or Defcon). Furthermore, you can use the SSH Tunnel to bypass the LAN's internet filters. The SSH tunnel protocol works by encapsulates your data into an encrypted payload and transmitting it to the SSH Server which is setup on a trusted LAN.