Verified Fresh Search Results

How To: Turn an Old Aquarium into a Cloud Tank & Create Creepy Alien Atmosphere Effects

Need some creepy visual effects for your alien flick, but don't want to spend a bunch of money? With some pretty basic materials, you can turn an empty aquarium into a "cloud tank," which can be used to create several different atmospheric effects. Before Hollywood started using CGI, cloud tanks were used for scenes in a lot of famous movies. Remember this one? Besides Raiders of the Lost Ark, cloud tanks also helped make some wonderful non-CGI effects in Independence Day, Close Encounters of...

How To: Restore deleted files with Encase from NTFS USB drive

Use Encase to open the drive after the document has been deleted. The deleted file will show up in the program and will have a red circle with a line through it showing that it was previously deleted. The window on the bottom of the screen will show the document context so you can verify that it is the correct one. Right click on the file and click 'copy/unerase' to restore the document. Down in the bottom right hand corner you will see the progression of the copying to the chosen file destin...

How To: Make a Celsius to Fahrenheit converter in C++

In this video, the instructor shows how to convert Celsius to Fahrenheit using a C++ program. This video shows how to do this by a live example where the instructor writes down the code to do it. First, code the basic structure of a c++ program that contains the include and all other statements. Now accept the value of temperature in Celsius from the standard input. Now multiply that value by 1.8 and add 32 to it to get the value in Fahrenheit. Display the value to the output. Finally, compil...

How To: Use aspirin in unusual ways

Don’t wait for your next headache to pull out that bottle of aspirin. Aspirin can be used as a topical home remedy for some medical problems, and as a handy fix to remove stain, keep your flowers fresh and even start a car battery.

How To: Send & Receive SMS/MMS Text Messages from Your iPhone on Any of Your Other Apple Devices

One of the best reasons to enter Apple's ecosystem is iMessage, where you can communicate more securely with other Apple users and send and receive chats across all of your connected iPhone, iPad, iPod touch, and Mac devices. While those blue bubble conversations sync across devices, the green bubbles — SMS and MMS texts — remain on your iPhone alone unless you change a setting manually.

How To: Root Your Pixel 3 on Android 10

When new Android versions come out, the modding community has to find new ways to root the OS. It's a fun cat and mouse game to follow, but it also means the process of rooting isn't exactly the same as it was the last time you did it. Android 10 changes how root works on a system level for some devices, but luckily, the developers are already on top of things.

Android Basics: How to Root with CF Auto Root

The sheer variety of Android devices on the market is staggering—one report suggests there are well over 24,000 distinct phones and tablets floating around out there. When you consider that each manufacturer adds a few tweaks to the Android code base here and there, that makes for a lot of software variations, which in turn means there needs to be many different root methods to match this variety.

How To: Which Stores Accept Apple Pay? The Always Up-to-Date List

Apple Pay has been available to use in stores, as well as in select apps and websites, ever since its first appearance in iOS 8.1. Now, with iOS 12, there are currently 13 different iPhone models that support Apple Pay functionality without the use of an Apple Watch, and the list of partnered stores that accept Apple Pay has only grown. Here's our always-up-to-date list to keep you in the know.

How To: Every Mac Is Vulnerable to the Shellshock Bash Exploit: Here's How to Patch OS X

Heartbleed, move over. There's a new bug in town, and this time it's also affecting Mac and Linux computers. It's called Shellshock (its original official title is CVE-2014-6271), and it's currently got a 10 out of 10 severity rating over at the National Cyber Awareness System. While some updates have been issued to fix this bug, they were incomplete, and your system is probably still vulnerable, as it has been for the last probably 20 years.

How To: Understanding Signature Schemes: How Data Sources Are Authenticated, Secured, & Spoofed

One of the biggest problems in data security is authentication of data and its source. How can Alice be certain that the executable in her inbox is from the venerable Bob, and not from the not-so-venerable Oscar? Clearly Alice wants to know because if this file is actually sent to her by Oscar, the file might not be a game, but a trojan that can do anything on her computer such as sift through her email and passwords, upload her honeymoon pictures, or even turn on microphones and webcams. Thi...