Valuable Tool Search Results

How To: Replace Steel Brake Lines

This video is all about removing and replacing steel brake lines and includes tips and techniques for doing so. Learn what tools you need, how to remove brake lines, how to mount brake hoses, the differences in brake line fittings, retaining clips, replacing brake lines, and different types of brake fluids.

How To: Create charts in Excel 2007

Check out this tutorial and learn how to create chars in Excel 2007. In Office Excel 2007, you just select data in your worksheet, choose a chart type that best suits your purpose, and click. Want to try a different chart type? Just click again and select a new chart type from a huge range of possibilities. Then work with the new Chart Tools to customize the design, layout, and formatting of your chart. You can see how various options would look just by pointing at them.

How To: Install IR shell 3.9 on a PSP with 3.80m33-

Do you own a Playstation Portable? There's a number of things you can customize on your PSP with the right tools. A few things you can do with an IR Shell: you can stream files via WiFi or USB and play MP3's while in game. If you're interested, take a look at this instructional video and learn how to install the latest IR Shell 3.9 onto your PSP. Keep in mind that this IR Shell only works if you have the custom firmware 3.80m33 on it.

How To: Build a terrarium for kids

This gardening tutorial teaches you how to create a successful terrarium for kids of any age. This how to video covers the major points of making a terrarium and I give you lots of alternative methods. Learn how to select a kid-friendly container, select plants, make the terrarium, care and maintain the terrarium. You can use the terrarium as an eco system learning tool for children. This is a great project to do with your children with this how to video.

How To: Fold down the windshield of a Jeep Wrangler JK

This is a step-by-step video tutorial on how to fold the windshield of a Jeep Wrangler JK. You will notice there are three tools needed; a Phillips head screwdriver, a 13mm deep well socket w/ ratchet and extender, and a t40 torx. First you should remove the plastic covers on the A-pillars of the Jeeps windshield. Make sure you put all bolts back into the holes they came out of for safe storage. That will also keep dirt out of the threads as you drive your vehicle with the windshield down. Ma...

How To: Use basic lighting effects in Maya

Modeling software is a wonderful tool for experimenting with modifictions of a product first before building it in real life. Plus, it's just cool to build things virtually. This Maya software tutorial teaches you how to use basic lighting effects in Maya.

How To: Avoid accidents in the workshop

One thing you should do every time you approach a tool is think of the worst-case scenarios. Its a bit gruesome to let your imagination take you there, but there is a good reason for it. This simple mental exercise not only raises your awareness of the potential dangers, but essentially shows you exactly what you need to do to prevent injury. This how to video walks you through potential dangers in the workshop and how you can avoid each one.

How To: Build wooden cabinet boxes

Do you want to learn how to build cabinets? Watch this five-part video tutorial for the basics of cabinet making using wood. Part one demonstrates the basics of making cabinet boxes from sheet goods while part two goes over how to cut the deck and stretchers for European-style frame less cabinets. Part three shows all the tools and some of the techniques you can use to apply edge banding. Finally, parts four and five demonstrates how to assemble to the cabinet carcass.

How To: Configure an ASP.Net site for a .Net Framework version

In this video tutorial, Chris Pels will show how to configure an ASP.NET web site to use a specific version of ASP.NET/.NET Framework. First see how to identify what version of the .NET Framework a web site is associated with by viewing the script map in Internet Information Server (IIS). See how a script map is associated with the root in IIS and then with individual web sites. Next learn about the ASP.NET IIS Registration tool (aspnet_regiis.exe) used to configure IIS or an ASP.NET web site...

How To: Use set driven keys in Maya 8.5

Check out this two-part Autodesk Maya 8.5 video tutorial on creating set driven keys. If you're and animator and your having trouble with your organic or unorganic animation, maybe this is your problem; it's a very powerful tool in 3D modeling in Maya. When ever you come into an object that you are constantly rotating, maybe you should put a set driven key on it, no?

How To: Avoid adware, spyware, and keyloggers on your computer

In this episode, Brandon Jackson shows how to merge two images with the Photoshop gradient tool to create a banner montage. Doug Grammar joins D.Lee Beard again, this time to explain spyware, adware, and keylogging. They explain what these threats to your privacy & computer speed are as well as how to prevent and get rid of them. Speaking of security, Jason Rybicki shows one way to tell if your privacy is being compromised on a Mac using a free widget.

How To: Use a power screwdriver

In this online video series learn from power tool expert and Industrial Technology teacher Jon Olson as he teaches and demonstrates how to use and maintain the power screwdriver. Learn important power tool tips and techniques such as construction work area safety, electrical safety, how to use the chuck on a power screwdriver; how to use a power screwdriver; tool maintenance; battery tool use and care; how to use the torque adjustment collar; how to drive a screw at an angle; how to use the v...

How To: Care for fruit trees

Learn how to care for fruit trees from a professional landscape designer. Our expert will educate on what tools you need and how to select and plant your new fruit tree. Learn valuable how-to tips for your fruit tree. See how to care for the tree by activating the soil. With all the luscious fruit dangling from the tree it can be an invitation for deer to come have a snack. Our expert will show how to protect your tree from becoming a treat. Pruning your fruit trees for maximum flowering and ...

Warning: Sensitive Info You Black Out in Images Can Be Revealed with a Few Quick Edits on Your iPhone

These days, most images we post online or share with others come from our smartphones. Whenever personal data is in them, such as debit card numbers, addresses, phone numbers, passwords, and other sensitive information, it's easy to jump into your iPhone's markup tools to black out the text before sharing. But a digital marker may not hide everything.

How To: Use Mitaka to Perform In-Browser OSINT to Identify Malware, Sketchy Sites, Shady Emails & More

Web browser extensions are one of the simplest ways to get starting using open-source intelligence tools because they're cross-platform. So anyone using Chrome on Linux, macOS, and Windows can use them all the same. The same goes for Firefox. One desktop browser add-on, in particular, makes OSINT as easy as right-clicking to search for hashes, email addresses, and URLs.

How To: Check Your MacOS Computer for Malware & Keyloggers

While you might suspect your MacOS computer has been infected with malware, it can be difficult to know for sure. One way to spot malicious programs is to look for suspicious behavior — like programs listening in on our keyboard input or launching themselves every time we boot. Thanks to free MacOS tools called ReiKey and KnockKnock, we can detect suspicious programs to discover keyloggers and other persistent malware lurking on our system.

How To: Create Packets from Scratch with Scapy for Scanning & DoSing

By using almost any packet-crafting tool, a hacker can perform denial-of-service (DoS) attacks. With the power to create just about any packet with any characteristics, a hacker can easily find one that will take down a host or network. Nmap and Hping are effective packet manipulation tools, but there's also Scapy, which is almost infinitely customizable.

How To: Everything You Need to Know About Adding & Editing Audio for Videos in Enlight Videoleap for iPhone

The music and sound effects that play in the background of any videos you edit helps set the tone, so it's essential to get it right. Enlight Videoleap, an extremely powerful and popular mobile video editing tool for iOS, lets you quickly and easily add audio from your iPhone and the cloud, but things can still get a little confusing when you have a timeline full of clips.

How To: Replace Video Backgrounds with the Green Screen Chroma Key Tool in Enlight Videoleap for iPhone

Using a green screen is an affordable and easy way to transport your video to anywhere imaginable, even to places that don't exist. You can use it to sit behind a desk in a busy newsroom or dance on the moon, but first, you have to know how to properly perform chroma key compositing two videos together. Fortunately, Enlight Videoleap on iOS makes it easy.

How To: This Tweak Gives You Free YouTube Premium Features on Your iPhone for Nothing, Including Background Playback

If you want the ability to play YouTube videos in the background as you multitask on your iPhone, you'll have to shell out $11.99 a month for the privilege of doing so with YouTube Premium. Not all of us can afford nor justify such an expense, but if your iPhone is jailbroken, you can get your hands on this sought-after feature — and much more — without spending a dime.

How to Hack Wi-Fi: Disabling Security Cameras on Any Wireless Network with Aireplay-Ng

Electronic warfare tactics work by jamming, disrupting, or disabling the technology a target uses to perform a critical function, and IoT devices are especially vulnerable to attacks. Wireless security cameras like the Nest Cam are frequently used to secure critical locations, but a hacker can surgically disable a webcam or other Wi-Fi connected device without disturbing the rest of the network.

How To: Hack WPA & WPA2 Wi-Fi Passwords with a Pixie-Dust Attack Using Airgeddon

Design flaws in many routers can allow hackers to steal Wi-Fi credentials, even if WPA or WPA2 encryption is used with a strong password. While this tactic used to take up to 8 hours, the newer WPS Pixie-Dust attack can crack networks in seconds. To do this, a modern wireless attack framework called Airgeddon is used to find vulnerable networks, and then Bully is used to crack them.

How To: Write an XSS Cookie Stealer in JavaScript to Steal Passwords

JavaScript is one of the most common languages used on the web. It can automate and animate website components, manage website content, and carry out many other useful functions from within a webpage. The scripting language also has many functions which can be used for malicious purposes, including stealing a user's cookies containing passwords and other information.