How To: Get lithium metal from an Energizer battery
Watch this science video tutorial from Nurd Rage on how to get lithium metal from an Energizer battery. They show you how to get Lithium Metal from an Energizer Ultimate Lithium battery.
Watch this science video tutorial from Nurd Rage on how to get lithium metal from an Energizer battery. They show you how to get Lithium Metal from an Energizer Ultimate Lithium battery.
This new episode of Full Disclosure shows you how to use a SSH Tunnel to secure your data when you are on an untrusted LAN (ex. Coffee Shop, School's network, or Defcon). Furthermore, you can use the SSH Tunnel to bypass the LAN's internet filters. The SSH tunnel protocol works by encapsulates your data into an encrypted payload and transmitting it to the SSH Server which is setup on a trusted LAN.
In this clip, you'll learn how to get started using Secure Computing's Secure Web Protection proxy service. It's easy! So easy, in fact, that this helpful how-to can present a complete overview of the app in just over five minutes. For more information, including detailed, step-by-step instructions, take a look.
In this video tutorial, viewers learn how to secure a home wireless network. There are 3 types of security protocols for connecting devices. The 3 types of security protocols are: OPEN, WEP and WPA. Users should use passwords that are secure but no so obscure that they are unusable. The password should not be dictionary words. They should be mixed with casing and contain the user's phone number. Go to your router's website and log into the website. Find the setting for wireless security and e...
Have important files that you want to put on a USB drive but do not want anyone else to be able to access them? Put a password on it using USBSecure.net free resource.
Use three tools to create a simple ponytail. Use a hairbrush, a bobby pin, and a bungee band holder for this look. Using a bungee band instead of a standard ponytail holder eliminates some of the issues typically caused by pulling hair through ponytail holders. Start by using a bristled brush to brush the hair to one location on the head. Secure one hook of the bungee band in the ponytail and wrap the tail around the rest of the hair. Wrap it around again, and secure the other bungee band hoo...
Using ASP.NET Secure Services and Applications Services
Need to know how to tie a Bowline with a few ways of securing it? This way shows you how to secure it with a seizing so that it won't accidentally come undone. Included is a little variation of the bowline with a built-in seizing. If you don't have electrical tape to secure the bowline feed the bitter end back through the hole. It also makes it so you don't have a tail line dangling if you're towing something.
In today's time of rampant information crimes, including identity theft, security is more important to the average computer user than ever. This tutorial from Linux Journal Online shows how you can use GnuPG to secure and verify data on your Linux box. (This video was created using only free and open source software tools: TightVNC, pyvnc2swf, ardour2, audacity, jackd, LAME, kolourpaint, cinelerra-cv, mjpegtools, and ffmpeg.)
Buns and updos are gorgeous hairstyles, with one caveat: If they're not pinned perfectly and securely in place, all your hard work braiding and curling will go to waste as your hair slowly unravels.
Are you secure when downloading security software? Sounds like quite the conundrum, but CNET has answers. See if you're really secure when getting that software, and telling the difference between a rogue antivirus website versus a legit site. See how not to get scammed and destroyed!
Cavities are an unfortunate sideeffect of our sugar-infused society, and getting them filled is time-consuming, expensive, and requires a trip to the dentist. Do you have some serious courage and want your dental work done on the cheap? Watch this video for an amazing guide to filling your own tooth cavity at home using simple and cheap ingredients. It's amazing what you can do with a little DIY know-how.
This by far one of the most elegant and beautiful cards we've ever seen in a card making tutorial, and we've seen a lot of cards. Rather than tacking on cheesy mass-produced floral prints and little butterflies and other odds and ends that just distract, this Christmas card focuses on minimalist beauty.
In this video, we learn how to make raw vegan vanilla extract. First, take whole organic vanilla beans and chop them into small pieces. After this, place the pieces of vanilla into a high speed blender along with 1 c of purified water. Start blending this on high until you have a pure vanilla liquid and there are absolutely not bumps or husks left in the blender. There should be no fibers or husks on the side of the blender. Place your hand on the side of it to make sure your blender isn't ge...
Despite being a product of the Disney machine, Miley Cyrus ain't one tame babe. Whether it's pole dancing on an ice cream stand or wearing a revealing $25,000 corset dress for her "Can't Be Tamed" music video, she's recently been reveling in her bad girl side.
Can't seem to win at the craps tables? How about any other dice game? There are a ton of fun dice games out there, but rolling the number you need to win is pure luck, or is it?
The world has gone Lady Gaga MAD! Run for cover! ... But run for cover in STYLE with this makeup tutorial by makeup master, Michelle Phan. In this video, Phan re-creates the "big eye" look for Lady Gaga's "Bad Romance" music video.
These are way better than normal potato chips, big chunky cassava chips is one of the simplest recipes you can do with the cassava root. This is a delicious and simple to make Brazilian Cuisine recipe. Cassavacan be used as a replacement for potatoes, into the dough of several kinds of bread, it makes great moist cakes other desserts. And the fresh cassava is only the start. A lot of Brazilian recipes also used the dried roast cassava flour. Cassava is one of the only plants cultivated by Bra...
Don’t play Russian roulette when it comes to your wheels. Keep your bike secure with these precautions.
A formal occasion calls for a classic look. You Will Need
No downloads or extra programs needed! This video is pure cheat codes, all for playing on Poptropica! You can do fun things like change your skin color, change your hair color and even get the elusive pumpkin hat to wear!
ProjectKinectMagicMirror combines augmented reality and CT-scan imagery to create a virtual "X-ray machine." Another amazing Microsoft Kinect hack to add to the vault. The ingenuity is infectious... Get inspired. Make-your-own.
In this tutorial, we learn how to lash a bamboo tripod. First, you will tie a clove hitch by taking one piece of bamboo and wrapping the rope around it, then crossing the two sides of the string together to make a hitch. Next, you will secure the clove hitch around the third piece of bamboo. Now, you will rap all the pieces of bamboo together with the rope. Continue to do this until all the pieces feel secure together. Wrap the rope several times around each of the pieces, then wrap it in the...
Petyon Manning is the greatest pure passer of the football playing quarterback in the world today. In this short video, Peyton offers some tips for aspiring quarterbacks on how to grip a football correctly, how to handle a snap, and how to throw a tight spiral. You may not do these things as consistently as Peyton after watching this video, but if you practice enough, who knows?
Video: .
Picking a secure password is not only important for protecting your privacy, it's also very easy. Provided, that is, that you know how to go about it. This free video lesson from CNET TV will walk you through the process. For more information, and to get started creating and using high-security passwords yourself, watch this video tutorial.
Kandee, a makeup, artist demonstrates a Gwen Stefani up do that was from an Elle magazine cover. Rub hair paste into your hands and smooth it through your hair. Then section crown to forehead and twist it counterclockwise until it starts curling up. Keep twisting and wrap it around into a tight knot. Use a bobby pin to secure it at the base. Then take another section of hair and repeat. Split the bottom section of hair that is left asymmetrically and twist each of those sections halfway and t...
TrueCrypt is a free application that lets you encrypt designated programs on your Ubuntu system to prevent unwanted access. Provided you select a strong password, intruders will not be able to open your personal files and documents. This instructional video walks you through the process of installing TrueCrypt on your Ubuntu operated machine and demonstrates an example on how to create an encrypted volume within a select partition.
The Clinch Knot is used to secure your fishing line to your fishing lure. In this video, learn how to tie a secure clinch knot, step by step. You can't fish without a sturdy lure, so watch the video and practice until you master the knot on your own. Once you've got it, attach your bait and you are on your way! Happy fishing!
Attention jewelry makers! When making your own unique jewelry designs, one must learn how to secure the end crimp beads with crimping or chain-nose pliers. Crimp beads can be used for finishing off your strung jewelry or as "stoppers". In this tutorial, learn how to hone your jewelry-making skills!
Email is one of the least private and least secure forms of communication, although few people realize this. MixMaster is one way to allow secure, anonymous communication even over the very public medium of email. This tutorial will get you started with MixMaster quickly and easily.
This video tutorial will show you how you can apply an Arab music inspired makeup look. Products on Eyes
A little precaution can go a long way to securing your online banking experience. Use these tips from Tekzilla.
Secure a square knot with tips from this video.
Video: . This video will show you how to secure your kayak to a J bar roof rack carrier.
Hi again! Here's another dessert recipe—today it's a custard cream recipe, or what is also called creme patissiere.
Yup, so I turned them vegan. The full recipe can be found here, or you can watch the video that I made on YouTube. Take a look at the ingredients below the video.
The advantages of rooting are vast. From free wi-fi tethering, being on the latest and greatest software, theming all aspects of the OS, to ditching Touchwiz for a pure Google experience and much much more.
Like everyone, you're on Facebook. And, also like everyone, you'd like to control the access your Facebook apps have BEFORE you even install them. Well, you can, with a sweet little Firefox add-on called FB-Secure. Take control of Facebook app privileges before they read your secret diary.
In this clip, you'll learn how to secure a new Microsoft Windows desktop or laptop computer. For more information, including a complete demonstration, and detailed, step-by-step instructions, as well as to get started protecting your own new Microsoft Windows PC, take a look.