Wedding Certificates Search Results

How To: Make a DIY guitar cut-out for a party centerpiece

A-BnC Parties and More, Inc. demonstrates how to construct a do-it-yourself music guitar cut out for your musical theme party centerpieces. The guitar is accented with guitar strings made from black yard, heavy black card stock and clear push pins. Judy shows how to take a plain white polystyrene guitar cut out, paint and add these lovely accents. She puts it on another budget Just Add Sand centerpiece base and accents with two pieces of onion grass. Add balloons, a table name and table place...

How To: Make a budget music note centerpiece

Judy of A-BnC Parties and More, Inc. shows you how to make an economical do it yourself music note centerpiece. Three music notes are attached to wooden dowels which are added to a budget Just Add Sand centerpiece base. The centerpiece is accented with two pieces of onion grass. Add balloons, a table name and table place cards for an economical musical themed music note centerpiece for your Bat Mitzvah, Bar Mitzvah, wedding, special event or party!

How To: Make metallic paper poofs or flowers for a centerpiece

This two part video tutorial teaches you how to make metallic paper poofs which can be used to camouflage the Styrofoam® base of your centerpiece. The poofs, or flowers, also add color and excitement to your finished product. Metallic paper reflects light and comes in deeper tones that tissue paper. Use these flowers for all kinds of centerpieces: bar or bat mitzvah, wedding and engagement, birthday, sports theme, retirement, anniversaries, corporate events, etc.

Hands-On: Kopin's Golden-i Infinity Is What Google Glass Was Supposed to Be, But Comes at a Cheaper Price

If you cover a particular area in tech long enough, you develop certain pet peeves, and one of mine happens to be devices that attempt to keep us wed to the Google Glass style of augmented reality. And while I remain mostly uninterested in such devices, one of these products recently earned my admiration and might work for you, too, under the right circumstances. It's called the Golden-i Infinity.

How To: Make Flavored Sugar Cubes for Coffee, Tea, & Cocktails

One lump or two? That was the age-old question with sugar cubes, which used to be a staple of any tea salon or dignified household this side of Downton Abbey. These days sugar isn't really used in cubes much except in bars and restaurants, and that's a shame. Cubes are a lot less messy than granulated sugar, and you can measure the exact amount you put in your drink no matter what.

How To: What Happens to Your Passwords When You Die?

Most of us have never put much thought into this, but the question needs to be asked — what exactly happens to all of our online accounts when we die? No, the internet won't just know and delete accounts for you, so you need to plan for life's one guarantee. Because without a plan, things become a lot harder to sort out.

How To: Create a Basic Attendance Sheet in Excel

If you're a teacher in any type of school, whether it's high school, college, or middle school, it's imperative that you keep an attendance sheet. The paper and pen route can get pretty messy, and very disorganized, and that's where Microsoft Excel comes in. With this software, you can create a simple yet functional attendance sheet to keep track of your students.

How To: Make a photo book on Lulu.com

Photo books are a great way to consolidate your favorite moments into one place, and there's no need to buy those clunky photograph books anymore, especially when the whole world of photography has turned digital. That's where Lulu comes in.

How To: Iron clothes

In this video series, watch as professional homemaker Vickie Pavone teaches how to iron clothes and other household items. Learn how to iron fitted sheets, how to iron flat sheets and pillow cases, how to iron a blouse, how to iron a skirt, how to iron pleats, how to iron a men's button down shirt, how to iron a men's polo shirt, how to iron slacks, how to iron denim, how to iron a law enforcement uniform, how to iron clothes using starch, how to iron, delicate silk fabrics, how to iron synth...

How To: Plate Food Like a Pro

We are visual animals. So when it comes to food, presentation is everything. In deciding what to eat, certain colors and textures instantly turn us off or on. Think of runny sautéed spinach versus a salad of fresh vibrant spinach. Which one would you reach for first?

How To: Steal a Geeky Girl's Heart

Yes, boys. It’s true. It’s here. IT’S FOR REAL!! I am here to provide a list of things that boys should do (meaning they don’t do these things very often, probably why us girls think it’s adorable when they do) when they are pursuing one of us lovely ladies. There is a lot more to making her fall for you than you think, and yes, it’s the little things. The opened doors, the little touches, the tiny encouragements. Those are the things that matter. So here we go...

How To: Leverage a Directory Traversal Vulnerability into Code Execution

Directory traversal, or path traversal, is an HTTP attack which allows attackers to access restricted directories by using the ../ characters to backtrack into files or directories outside the root folder. If a web app is vulnerable to this, an attacker can potentially access restricted files that contain info about all registered users on the system, their permissions, and encrypted passwords.

How To: Fake Captive Portal with an Android Phone

Have you ever used an open wifi, which after you connect displays a website to enter your credentials to get internet? That website is called captive portal and widely used in airports, hotels, universities etc. Have you ever wondered what would happen if someone would set up an open wifi with the same name displaying a very similar web page asking for credentials? Usually if there are multiple wifi networks with the same name and encryption, devices only display the one with the highest sign...

How To: 8 Ways Your iPhone Can Make Emailing More Secure

Privacy is a growing concern in the tech industry, but Apple has fallen behind many of its peers when it comes to email security. Fortunately, iOS 15 changes that. Your email address is the key to a vast amount of personal information, not to mention a stepping stone into your other online accounts, so it's great to see new features for iPhones that protect email accounts and their contents.