Trusting Relationship Search Results

How To: Earn Trust from Your Rabbit

This is about how to make a rabbit become less wary of you and more trustful with you also. I myself have a Dutch that was released by its previous owner, then I rescued it. She never wants to be took out of her cage, but now she doesn't mind as long as I'm gentle and nice.

How To: Use Project Management Guidebook

In any project management career, there is no such thing as a person who knows everything for each project. Many times, those who got too much confident with their jobs fail because they were not able to make things clear before and during the project implementation.

How To: Stay safe in a big city

Before you get started exploring a big new city or even just getting reacquainted with the one you live in now, make sure you aren’t putting yourself in any unnecessary danger. Memorize good traveler habits that will keep thieves and scam artist off your back.

How To: Write a successful college essay in nine steps

Motivational speaker and leadership coach Tim Warneka teaches how to write a successful college essay in nine simple steps. Read and understand the directions and expectations the professor has for the assignment. Sit down and write whatever comes to mind on the topic. Edit your paper, making sure to use academic English. Allow yourself time to "sleep on it" and come back to re-read your essay with a fresh mind. When you come back to it, read the paper out loud to find any mistakes. Allow one...

How To: Become a better dance partner

Is there something missing from your dance relationship? This four part how to video teaches you how to communicate with your dance partner. Use these secret tips from Naomi Uyama and Andy Reid, and become a better dance partner.

How To: Use the XML Schema tools in NetBeans 6.0

Watch this video tutorial to learn how to use the XML schema tools, which enable you to create, visualize, and edit XML schema in NetBeans 6.0. With these tools, you can visualize relationships between schema elements and use queries to find usages. You will also learn how you can easily create XML schemas by example. You will see how to navigate large schemas in the Design View, and you will learn how to visualize and edit multiple file schemas.

How To: The Fastest Way to Find an App on Your Cluttered iPhone

Confession time: I hardly ever leave the first page of my iPhone's home screen. No, my iPhone isn't super organized and, no, I don't limit the number of apps I download as well (trust me, this phone is a mess). The truth is that you don't need to rely on your iPhone's home screen pages to find and open an app. In most cases, there's simply a much faster way.

How To: The Beginner's Guide to Defending Against Wi-Fi Hacking

Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a few simple actions, the average user can go a long way toward defending against the five most common methods of Wi-Fi hacking, which include password cracking, social engineering, WPS attacks, remote access, and rogue access points.

News: Pinterest Takes Steps to Hack-Proof Your Account

The peaceful, pastel and doily-filled world of Pinterest is my oasis. My account conveys who I want to be and what I want to accomplish, so the idea of someone hacking it and ruining my favorite escape for me is heartbreaking. Fortunately, Pinterest has updated its security, implementing three new features to hack-proof your account.

How To: Lock the Dialer to Prevent Snooping When Letting Others Borrow Your Android

Lending someone your phone to make a call is always an awkward situation, as you closely monitor them to make sure they stick to a phone call rather than wandering off into private applications like your photo or messaging apps. You don't necessarily want to eavesdrop on their conversation, but trusting people with your phone is difficult, especially if you have some risqué or embarrassing pictures stored on it.

News: Apple's iPhone 6 Might End Up as Big as the Samsung Galaxy S5

If new leaked images are to be trusted, an iPhone with a display around 5 inches will be released later this year. From Italian site Macitynet, images show a device that's stated to be the new iPhone 6 side-by-side with the new Samsung Galaxy S5. A couple of weeks ago, I showed you leaked internal emails and memos that suggested Apple was concerned with not only Samsung's marketing strategy, but about the industry trend towards larger devices.

How To: Send Encrypted Spy Messages Through Gmail on Google Chrome

Have a super secret spy communication you'd like to send out, but don't have the funds to hire your own trusted operatives to deliver the message? Then stick to what you're used to—email it. SafeGmail is a browser extension that allows you to send encrypted emails right through your regular Gmail account. While this may seem a bit unnecessary for most messages, encrypting your email can definitely be useful.