Protected Search Results

How To: Password protect a folder in Snow Leopard on your Mac

In this tutorial, we learn how to password protect a folder in Snow Leopard on your Mac. First, go to the finder and click on "utilities". Now go to "file, new, disk image from folder". Now, you can select the folder you want and then click "image". Make it a read/write folder so you still can edit the files and enable the encryption. Save this, then it will ask you for a password. Create a password and then verify it. When finished, uncheck the "remember my password", then click on "ok". Now...

How To: Care for your children's eyes

In this tutorial, we learn how to care for kid's eyes. First, make sure you get an eye exam for your children at a young age. This should occur while they are in pre-school. This can help track any problems with the eyes and see if they are developing correctly. Make sure to have the eyes checked out by a professional every year after the initial visit to the eye doctor. If you don't have insurance, there are many places out there that participate in programs for free eye exams. Next, make su...

How To: Understand how a basement sump pump works

This video is from AskMeDIY and covers how basement sump pumps work to keep your basement dry. The sump pump fits underneath the basement below the concrete slab. The sump pump in the video pumps 2,000 gallons per hour. The presenter turns the pump off to demonstrate how quickly the water would fill in with the pump off. He contends that the basement would be flooded in only three minutes if the pump would malfunction. The pump is plugged into a GFI protected outlet and the pump outlet flows ...

How To: Fix or recover a corrupt Windows registry

Learn how to fix or recover a corrupt windows registry following the steps outlined in this video tutorial. To begin, take the hard drive out of the computer with the corrupted registry and connect to another computer. To find the files you need to replace go to Start and My Computer. Look for the hard drive that you just added and double click on it. Go to Tools and Folder Options. On the View tab under Advanced Settings click Show Hidden Files and Folders, and unclick Hide Protected Operati...

How To: Transfer messages like a spy with dead drop devices

This video discusses Dead Drop Devices and how to use them to transfer messages. The video starts by explaining what Dead Drop Devices are. They are basically common everyday objects that are hollow inside to store a message. The video shows a large lag bolt and a spike that are actually Dead Drops. The head of the dead drop bolt screws off and reveals a hollow cylinder used to store something valuable. The second object is a spike that is supposed to be shoved into the ground so that it will...

How To: Wrap your hands for boxing when fighting

A boxer knows that during and after a fight, their bodies will be aching. As a part of the job, they grit their teeth, focus and get past the pain. The most important part of a boxer's body, though, is arguably his hands. A boxer depends on his hands to win fights and to train. The best thing one can do to protect their hands is to wrap them properly. This video will show you exactly how to wrap your hands so that they are cushioned and protected against injury. An ideal wrapping job would pu...

How To: Password protect and hide your folders on Mac OS X

Watch this video for a helpful tip on how to use secret folder application and protect folders in your MAC PC by hiding it. you could download secret folder application from version tracker.com for free go to the Website and click download button to download the application on your Mac PC open the secret folder application. click on the required password button, put your desired password and re enter to confirm. to access your file, click the plus button at the lower left. choose the desired ...

How To: Skate with a dog

This is a short tutorial on safety on how to start skating hybrid with your dog. Heelys are great because they let you keep control of your dog. You can brake and handle your dog much better than on other skates. Find a smooth, clean street or parking lot, and make sure your dog is just as protected as you are. Learn how to pull a dog on skates by watching this video pet trick tutorial.

How To: Tape an ankle to prevent an inversion ankle sprain

Use tough skin spray adhesive, under wrap or pre-wrap, athletic tape to wrap an ankle. Position ankle in 90 degrees of dorsal flexion. Spray the adhesive to insure tight taping. Heel and lace pads are placed over tendons. Pre-wrap is applied, the goal here is to apply anchors so adhesive from tough skin will adhere to tape. Three layers are applied working towards the calf. Apply heel lock tape from the calf towards the heel, applying tension as you cross the bend in the ankle. The correct lo...

How To: Clean your gutters around your house

Maybe one of the hardest jobs you can do around the house is cleaning the gutters. When cleaning the gutters by hand, you have to constantly keep moving the ladder to get to the various spots of the gutter which contain a mess. If not done properly, the gutters can get clogged, which will not help the appeal of your home. This video explains a simple and easy way to clean the hassle-prone gutters. The powerful leaf blower makes cleaning the gutters simple and easy. Just make sure to keep your...

How To: Pack pots and pans for storage or movement

Moving is such a hassle! Packing is a big job but this video shows and easy way to pack out pots and pans. You will need 4-5 cubit foot cartons. You can get these from your mover or you can purchase them from a moving company. You will also want to get clean newsprint, packing tape, a moving blanket, and a permanent ink marker. Prepare your 4-5 foot carton by putting crushed paper on the bottom. This will act as a cushion for the pots and pans. Put the moving blanket or a protected pad on the...

How To: Use MDK3 for Advanced Wi-Fi Jamming

You may have heard of a signal jammer before, which usually refers to a device that blasts out a strong enough radio signal to drown out the reception of nearby devices like cell phones. Purpose-built jammer hardware is outright illegal in many countries. Still, Wi-Fi is vulnerable to several different jamming attacks that can be done with Kali Linux and a wireless network adapter.

How To: Lock OneDrive Files with Your Fingerprint or Face ID

If you're concerned about someone accessing your OneDrive files, you may want to upgrade your protection by enabling fingerprint or Face ID unlocking. Your sensitive information deserves to be protected, and now you can do so easily. Worry no longer — if you need to let someone else use your phone, with a password-protected OneDrive, sneaky file grabbers will be out of luck.

How To: Hide DDE-Based Attacks in MS Word

In a previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when a Microsoft Word document is opened. The biggest challenge of this attack is that it requires getting the user to agree to a pop-up prompt. Fortunately, since I posted that article, many new obfuscation techniques have been discovered to make this easier. Today, we explore and combine some of them to make the ultimate hidden DDE attack.

How To: Set up an Epson printer wirelessly

Learn how to set up an Epson printer wirelessly when you bring your new printer home you will want to start by installing the software that came with the new printer. You can set up your printer to work without wires and it will print from all over the house. There are 3 ways to set up the printer including the Epson way, with cables, and WPS. To determine is you need to use WPS, which is more complex, check your router to see if it has a sticker on it that says Wi-Fi Protected Setup. If that...

How To: Cloak Your Private Email Address into an Anonymous, Disposable One with Gliph

Want the convenience of a throwaway email address without all the hassle? How about anonymous text messaging so you can get to know someone before giving them your real information? Gliph has you covered. Gliph is a service that lets you create an identity around a set of three to five symbols called "artifacts" instead of your name, phone number, or email address. You choose how much information you reveal, and anytime you communicate with someone else who has Gliph, the data is protected us...

How To: Use U2F Security Keys on Your Smartphone to Access Your Google Account with Advanced Protection

Security-minded users can reduce the risk of phishing by enabling Advanced Protection on important Google accounts, requiring a U2F security token to log in. Using these keys isn't intuitive on most popular smartphone platforms, and you can find yourself locked out if you don't plan ahead. You'll need to learn and practice using U2F keys on your device before enabling this layer of security.

News: Google Authenticator Is NOT the Best 2FA App Anymore

If you want the best two-factor authentication app out there, our pick is Authy. A close second is LastPass Authenticator. If neither of those is to your liking, try Duo Mobile or Microsoft Authenticator. But if you're fine with missing out on great features, then and only then should you look at using Google Authenticator.