In this Software video tutorial you will learn how to link tasks in Microsoft Project 2007. There are four ways to link a task. Finish to start is the default, then you have start to start, finish to finish and start to finish. Here you will see how to link up two tasks and what is the dependency between them. There are various methods of creating dependency between two tasks. One method is to select the two tasks and click on the ‚Äòlink tasks‚Äô button on the tool bar or you can go to the ‚...
In this tutorial, we learn how to use Linux: Commandline Dependencies with gdebi. First, download a Deb file then use dpackage to install the package on the command line. If this fails, you will be able to use gdebi to install all the dependencies in command mode. This will save you time from trying to figure out how to open your file any other way. When you are finished, you will be able to open you file and enjoy what's inside. If you aren't familiar with how this works, search the internet...
March Madness—the period when college basketball teams compete for the championship—is a perfect time to throw a party. Learn how to throw the best March Madness party around with tips from Howcast.
Permanent access to the internet might not always be possible for you and your Linux system, and this computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to offline package install and update on Ubuntu Linux.
Welcome back, my hacker novitiates! Eluding and evading antivirus software and intrusion detection systems is one of the most critical tasks of the hacker. As soon as a new exploit is developed and discovered, the AV and IDS developers build a signature for the attack, which is then likely to be detected and prevented.
In this video tutorial the author shows how to use the Cosine Law. He shows how to find an angle of a triangle where he know all the sides of a triangle, using the cosine Law. He uses a lower case letter to designate a side and a capital letter to designate an angel apposite to that side. He gives the formula for the cosine law using a triangle as an example. Now he goes on and demonstrates how to use a scientific calculate. He shows how to use the degree mode in the calculator to solve these...
Learn how to play hide-and-seek. If you need a rainy day activity for the kids, or just want to relive your childhood, hide-and-seek is a great game for everyone.
Want to search your entire hard drive rather than just a designated segment of it? This Windows 7 tutorial will show you how it's done! It's easy! So easy, in fact, that this home-computing how-to can present a complete overview of the process in just over a minute's time. For more information, including detailed, step-by-step instructions, watch this Win 7 user's guide.
Network mapping lets PC users organize multiple computers into a system that provides informational data access. This video tutorial shows how to set file sharing permissions and assign users designated privileges within a network. Establishing a network provides functionality within a workplace and facilitates virtual communication among users.
In this video guide, we learn how to play On the Spot, a variation of pool and billiards where the objective is to hit a ball directly onto a designated spot on your pool or billiard table. For all of the details, and to get started playing On the Spot yourself, take a look.
The Color Picker component lets users change colors of a designated item - like choosing red lilies or white lilies in a Flash-based game. This tutorial demonstrates how to construct your items in ActionScript 3 and then attach them to the Color Picker function in Adobe Flash.
The Text Area Component is a tool available to website developers who are using Adobe Flash CS4 to build their website, and it designates a specific area of your field as text-based. You can also set up these fields as either editable or non-editable.
Cloaking is a function you can get to in the advanced menu of Dreamweaver, and it lets you designate a specific folder as being not for upload. This lets you save a folder full of pictures or code you may not want to use just yet.
Designate a back end or administrator sector of the website, a place you can use to manage the content on the rest of the site. This tutorial shows you how to use Dreamweaver to set up this area of your website and cordon it off from the rest of your website.
When programming in Visual Studio, you may find yourself creating any number of all-but-identical windows. This can be tedious and time consuming. This tutorial discusses the deadly and dangerous task of using a form as a parent for the development of other forms in Visual Studio, using C# in this particular example. For more information on designating a form as a parent, take a look.
Wouldn't it be heavenly if your cat took care of its business in the designated place? Cats are very smart animals and are capable of being potty trained easily. Watch this instructional cat video to learn how you can potty train your cat. Say goodbye to your cat's litter box by teaching your cat to use the toilet.
Some girls are designated as so hot they could "kill with a kiss," but with no woman is this designation so literal as Poison Ivy, whose plant toxin-filled lips kill any man she sets her puckers on.
Welcome back, my greenhorn hackers! The Holy Grail of any hacker is to develop a zero-day exploit—an exploit that has never been seen by antivirus (AV) and other software developers, as well as intrusion detection system (IDS) developers. In that way, you can exploit systems with your newly discovered vulnerability with impunity!
"Waka" means "to be lighted" in the African dialect of Swahili, a term designating praise and being in the spotlight. What a perfect word, then, to name a song about the 2010 FIFA World Cup.
Simple SDK demonstrates how to add icons to your iPhone applications using XCode. Find your desired app and right click on it to designate that you want to open it with Gimp. Use the rectangle tool to crop the image to a square size. Add text to the image as desired. Then, scale the image to 57 x 57. Then, save the file as an icon.png in the same application folder. Exit out of Gimp. Next, go back to XCode. Open the icon file in the info list. Type in the icon title in the correct field and d...
In this tutorial, Malou and Bob show tips and tricks to use an HP TouchSmart computer. First, you can touch the house button that will lead you to the home page. The computer is so sensitive, it will detect your touch without even having to touch the screen. When you select an object, press and hold it if you want to move it somewhere else, if you move it to the bottom on your homepage it will go into the designated area. If you press and hold your finger on the screen, it's just like right c...
TrueCrypt is a free application that lets you encrypt designated programs on your Ubuntu system to prevent unwanted access. Provided you select a strong password, intruders will not be able to open your personal files and documents. This instructional video walks you through the process of installing TrueCrypt on your Ubuntu operated machine and demonstrates an example on how to create an encrypted volume within a select partition.
No Southern Thanksgiving is complete without cornbread dressing! In this tutorial, Betty shows us the famous Southern cornbread-sage dressing that has turned her into her family's designated 'dressing-maker' every year! This delicious gravy can be spread over turkey, veggies, potatoes or even used as a dip! However you choose to serve it, you will definitely love this delicious recipe! Enjoy!
In this four-part video, learn how to create a CMS with PHP and MYSQL. The basics of a simple CMS are split up in the following four parts:
A video from PC Mech that shows you how to install application in Sabayon Linux, a Linux flavor that is based on Gentoo Linux and is known for its ease of use.
In order to build Google Chrome extensions, you will need to familiar with scripting and codes. These are small programs that add additional functions for programmers. It is a compressed directory. These files must have a particular name: i.e. "manifest" (manifest.json). An extension will have at least one of the following: browser actions, page actions, content scripts, and utility web files.
This video explains how to use the Resize Windows shortcut in QuicKeys with a dual monitor set up. Basically, you can configure QuicKeys to automatically assign designated windows of any application to resize and appear on your main or secondary monitory. It’s really great for keeping your desktop a little more organized. Whether you're new to Startly Software's popular macro and automation application or are merely looking to pick up a few new tips and tricks, you're certain to be well serve...
IShowU and Shiny White Box demonstrate how to create still image effects in Final Cut Express. First, place your scroll bar in the front of the timeline and click on the clip so that it is selected. Then, click on the motion tab in the preview window. Hit the keyframe button in the scale option. Create a keyframe also where you'd like the effect to stop on the clip. Adjust the line. When you now play the clip, the image's size will be adjusted as you have designated. You can use the same tech...
How to make a bomb in Phun. This video will demonstrate the basics of making a bomb in the Phun program. Phun can be very demanding of your computer's resources so if you go a little bit overboard, don't be surprised if your computer crashes or freezes, or does something unusual. The basic concept here, is to use the circles as designated, and copy and paste exactly on top of each other. The more you do this the bigger the explosion. It also uses basic directional physics so you can incorpora...
In this Visual Basic tutorial, you'll learn to use conditional statements for the push-button validation of a designated text string. The code used in this example is as follows:
Take a look at this instructional video and learn how to create space in your note containers and move pages in Microsoft Office OneNote 2007. See how much control you have over how your notebook is set up, from a few words on a page to entire pages to whole sections. You'll also see the many ways you can find information in your notebook. Search for keywords, which OneNote will find no matter where they are — in text, in hand-written ink, in URLs, in graphics, even spoken in audio files. Or,...
Traditional subdomain enumeration techniques create a lot of noise on the target server and may alert intrusion detection systems to an attacker's intentions. For a stealthier approach, there's a tool with the capability of finding hundreds of subdomains related to the target website without alarming the server administrators.
RouterSploit is a powerful exploit framework similar to Metasploit, working to quickly identify and exploit common vulnerabilities in routers. And guess what. It can be run on most Android devices.
There are two scenarios that absolutely suck when someone calls you. The first is when you accidentally pick up a call you seriously didn't want to take. Debt collectors (thanks college), crazy exes, or that one guy from work. And the other is when you miss a super important call and can't get a hold of them afterwards.
The term "chibi" means "small person" or "small child" in Japanese. While it can be used to designate such personages in real life, it is more often used to refer to small, doll-like characters in Japanese manga, anime, and jewelry/fashion wares.
Steven Bann shows a chipping drill that teaches distance control through the air. Golf clubs are arranged into "zones" which represent the plates of a baseball field, so golf clubs arranged horizontally and evenly distanced apart from the next golf club. This represents "first base," "second base," "third base" and home plate. This is a landing drill where the object of the drill is to land in the designated "first base" zone and then subsequent bases until you get three-in-a-row for each zon...
Long time reader, first time 'How To' poster. This tutorial has been highly requested. Here are the steps to perform a Pixie Dust attack to crack a WiFi password that has WPS enabled.
Managing hard drives in Linux is crucial to understanding your system and its operation as well as understanding the system you are exploiting or conducting a forensic analysis on. Linux has numerous commands that can provide us with information, control, and management of hard drives, and in this tutorial, we will examine a number of the most important ones.
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to install GnoMenu on Ubuntu Linux.
Welcome back, my aspiring hackers! In recent tutorials, I have made reference to the name and location of the Linux devices in the file system, such as sda (first SATA or SCSI drive). Specifically, I have mentioned the way that Linux designates hard drives when making an image of a hard drive for forensic purposes.