Usually our 5-Minute Projects involve soldering and LED lights and other such electronic accoutrements, but this week we decided to skip the fancy stuff in favor of an old-school science project: making rheopectic slime from Borax and glue. This is a pretty safe experiment even for kids--just make sure to do it with parental supervision and keep the Borax, slime, and any fingers that have been touching the aforementioned items out of eyes, noses and mouths.
Know someone who's full of hot air? Grab them and make a heat motor with this cool home science experiment with Mr. G. When air is heated, it rises. This experiment uses that natural law to create a simple, spiraling heat 'motor'.
A (harmless) explosion a day keeps the police away. Indulge your rambunctious little boy in some scientific fun by helping him build an overhead water rocket launcher, which shoots recycled plastic bottles.
Learn to breathe fire safely using corn starch instead of a flammable liquid. Using only a mouthful corn starch and an open flame, it's possible to breathe fire and impress your friends and family. This trick must not be attempted without professional supervision.
Students show how mercury thiocyanide or "rock from mars" burns. First and foremost, make sure you are outdoors and with a considerably large space. Spread a non-flammable material over the space you decide to work on and place a small fragment of the mercury thiocyanide in the center. Keeping a respectable distance from the "rock" touch the "rock" with a lighted match. Watch as a substance oozes out from the rock. Make sure that the process has ended or that no movement can be seen from the ...
Most people have scrap wood hanging around in their garage collecting dust - so why not make a cool gift out of it? This picture frame box can be made in a couple of days and with a little elbow grease. It is a lovely gift for any occasion, and basically free to make.
This is an exciting video for kids of all ages! Do you know what atmospheric pressure is? You will after watching this video. Know any fancy names for water? You will after viewing this fascinating experiment. Mr. G gives you a list a supplies you will need and then he shows you how to do the experiment. The supplies are easy to obtain. You will need a lighter or matches, so adult supervision is required, but the experiment is easy to do.
The next time you hit a dance floor, show that crowd what you're made of with an impressive head spin! Head spins are dance moves that should be done under the supervision of an instructor, and a beanie or skull cap should be worn to avoid injury. Discover why wood flooring is the best for head spins with help from these two experts. Bliss & Zetta are professional hip-hop dancers and choreographers. Learn more dance moves from these two by searching WonderHowTo! You're only practice time away...
John shows us how to do the "Attitude Adjustment" pro wrestling move. Remember not to do this at home, only under the supervision of professionals! What you do, is start off by kicking them in the stomach, then throw their arm over your shoulder. Reach in under their knee to get a good grip, then carry them over your shoulders. You should have one hand on your shoulder and one on your hip. Then, when the other person gives the signal, you can throw them down to the ground. This will look like...
Bill is in fact an expert in this field and refers to his book. He knows potato guns. So many small and not so small boys and girls would like to make a potato canon or bazooka. This is taken from the Backyard Ballistics book. Not only is this a fun activity, but it also teaches you about physics. You need some PVC pipe, glue, a hacksaw, and, of course, some potatoes! You also need an igniter and some hairspray. The potato fires out with some force and speed so adult supervision is required. ...
We have all experienced a screwed up heart, and in this episode of "Look Learn & Create" we learn to turn that experience into some cute art!
Check out this instructional science video to learn how to make a soda pop can implode. You will need a torch, a Bunsen burner, or stove; a soda pop can with a tiny amount of water in it; tongs, or something to hold the can; and a bowl of ice water. This is a cool science experiment to perform, but adult supervision recommended. Follow the tutorial video's simple instructions and watch the soda pop can implode.
Ice in placed on a sealed FLASK and the water inside starts to boil. Great science fair experiment.
A jewelry box is not just a great way to keep your jewels safe, it is also a beautiful addition to your decor. In this video, learn how to make a gorgeous, professional looking jewelry box from walnut, maple and cherry woods. This in depth, seven piece series takes you from selecting your wood, through the finishing touches. These boxes are lovely enough to compete with anything on a store shelf.
Here is a step by step tutorial for making a swimmable mermaid tail. Check out Video #2 for a demonstration of the tail in use!
Learn how to use the BIG-IP Edge Client and its Smart Connect, Location Awareness, Customization, Deployment features. Whether you're new to F5 Networks' popular network appliance or are a seasoned network administrator just looking to better acquaint yourself with BIG-IP, you're sure to benefit from this free video software tutorial. For more information, including detailed instructions, take a look.
Watch how the F5 Networks BIG-IP Edge Client solution gets you connected automatically when you boot/start up your computer along with seeing the browser based version of the F5 BIG-IP Edge Gateway. Whether you're new to F5 Networks' popular network appliance or are a seasoned network administrator just looking to better acquaint yourself with BIG-IP, you're sure to benefit from this free video software tutorial. For more information, including detailed instructions, take a look.
Most of the home wireless networks are not set up by professionals and hence they might lack in security features. People just set up the wireless networks by connecting the devices and powering them up and never care to apply security settings to the network. This may result in your wireless network being compromised by unwanted external entities. How ever you can do a web based configuration settings and secure your wireless network by password protecting it. This settings differ from the m...
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to turn a Fon+ wireless router into a network tap.
Network mapping lets PC users organize multiple computers into a system that provides informational data access. This video tutorial shows how to set file sharing permissions and assign users designated privileges within a network. Establishing a network provides functionality within a workplace and facilitates virtual communication among users.
The Nessus vulnerability scanner, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks. In this network security video tutorial, you'll learn how to hack a network using Nessus 3.
Linux comes with a powerful built-in firewall, although the interface can be a little intimidating. With this multipart GNU/Linux networking video tutorial, you'll master basic and not-so-basic IPTables functionality and create the perfect firewall for your home network. For detailed, step-by-step instructions, watch this Linux how-to.
A DeAuth hack attack against a wireless network, as shown in this how-to video, will disconnect any and all users on a given WiFi network. The attacker does not need to know the WEP or WPA key or be connected to the network. For step-by-step instructions on running a DeAuth hack yourself, watch this simple how-to guide.
Interested in finding out just how secure your WEP-protected wireless network is? Let this video be your guide. It's a simple process and this home-networking how-to will teach you everything you'll need to know. For specifics, including detailed, step-by-step instructions, and to get started cracking WEP networks with BackTrack yourself, watch this helpful video guide.
This clip discusses how authorization roles work and their role in the security of the latest release of the F5 Networks Management Pack suite. It also touches on the creation and use of user roles within Operations Manager console and how to apply the authorization tasks to those roles. Whether you're new to F5 Networks' popular network appliance or are a seasoned network administrator just looking to better acquaint yourself with F5 Networks Management Pack suite, you're sure to benefit fro...
In this tutorial, Peter Silva talks with F5's Sr. Field Systems Engineer, Michael Falkenrath about the new BIG-IP GTM v10.1 DNSSEC feature. Whether you're new to F5 Networks' popular network appliance or are a seasoned network administrator just looking to better acquaint yourself with BIG-IP, you're sure to benefit from this free video software tutorial. For more information, including detailed instructions, take a look.
See how to use the PCI compliance reporting functionality within BIG-IP v10. Whether you're new to F5 Networks' popular network appliance or are a seasoned network administrator just looking to better acquaint yourself with BIG-IP, you're sure to benefit from this free video software tutorial. For more information, including detailed instructions, take a look.
See how to enable Layer 7 DoS and brute-force protection within DoS within BIG-IP ASM. Whether you're new to F5 Networks' popular network appliance or are a seasoned network administrator just looking to better acquaint yourself with BIG-IP, you're sure to benefit from this free video software tutorial. For more information, including detailed instructions, take a look.
First of all there is warning that nothing that you are going to see in this video tutorial should not be done at home without the supervision of the trained professionals. The opponent kicks you in the gut with his toe. Now you have to bend down and this pose is also called ‘classic bent over position’. Now you have to stick your head into the opponent’s thigh. Now you have to force the opponent to land on his face in spite of him trying to avoid the fall. In the first place you have to hold...
First of all you have to understand that these stunts are dangerous and they need supervision of trained professionals while performing them. 'Hip toss' is a very basic move of wrestling. Your opponent goes to the ropes and then takes a thrust towards you with full force. You have to move your body sideways and step your right foot forward in front of your opponent. Now let your opponent place his hand on your right leg. You have to place your right hand under your opponent’s arm. Now both of...
Want to learn what it really means to put your faith in someone else? Try a trust fall, where one person falls backward, depending upon another to catch them.
Odds are you have more computers on your network than printers. This video lays out the steps for sharing a printer over a network. This tutorial assumes that the printer is installed on another computer and not connected directly to the network. Take a look!
No wireless router? There is a way to network your computers by using your existing power-line. This CNET video will show you how to set up a power-line network - it's not as sexy as a wireless network, but it's easy and reliable!
This video tutorial is in the Computers & Programming category where you will learn how to secure your wireless internet connection. If you don't secure your wireless internet connection you are allowing others to enter in to your network. Open the set up CD and first change the network name from the default name to anything that you like. For this go to step 3 of 'naming your network', type in your network name and click 'next'. Then you enable security on the network by choosing 'WPA2'. Nex...
Whether you are sharing an internet connection, working together or just playing group video games, you will need to network your computers. Check out this tutorial and learn just how easy it is to create a home network.
Have you ever thought of building your own social networking site? Before you get to making websites like Facebook, you need to start off smaller, and this 29-part video series is where to begin with developing a social networking community website . Before you start with these lessons though, make sure you have all the following:
Check out this video tutorial on how to hack into WEP encrypted wireless networks. The aim of this video is to show people how easy it is to crack a wireless network with WEP encryption. Seriously, if you know how to do it, even a little kid could if you showed them how. Now that you know this, you should upgrade to WPA! It is much harder and takes much longer to crack.
This video tutorial presents instructions on hacking a weak Wi-Fi Protected Access, or WPA, wireless network. To follow along, and replicate this hack yourself, you'll need knowledge of the deauthentication, or DeAuth, process. For more information, and to get started hacking WPA networks for yourself, watch this hacking how-to.
The Lab Rats, Andy Walker and Sean Carruthers, explain Media Access Control (MAC) addresses. Filtering MAC addresses allow you to very specifically control access to your wireless network.
Want to test the security of your WEP WiFi wireless network? In this clip, you'll learn how to use the Backtrack Linux distro and the Aircrack-ng WiFi security app to crack a WEP key. The process is simple. For more information, including step-by-step instructions, and to get started testing the security of your own WiFi networks, watch this hacker's how-to.