Signing Search Results

News: Set up Jackass autograph signing but it wont be Jackass when people get there

So this one is going to be a prank on hundreds, maybe thousands of people. What you're going to do is advertise a Jackass autograph signing somewhere. Put up flyers or posts on Facebook or something like that to get people to come. Have a long ass table set up with a bunch of chairs so people think its a seat for each member of Jackass. Make people wait a little telling them the Jackass crew are running a little late. Then after a little while you can announce that Jackass has arrived and the...

How To: Tell a number story in American sign language

One of the fun and special traditions enjoyed and shared by the Deaf Community is signing stories using number or alphabet hand shapes. In these stories, various hand shapes do not stand for the numbers and letters themselves, but are used as signs or gestures to convey concepts. They are signed in alphabetical or numerical order, and used in amazing ways to sign or act out a story.

How To: Tell an American sign language abc story

One of the fun and special traditions enjoyed and shared by the deaf community is signing stories using number or alphabet hand shapes. In these stories, various hand shapes do not stand for the numbers and letters themselves, but are used as signs or gestures to convey concepts. They are signed in alphabetical or numerical order, and used in amazing ways to sign or act out a story.

How To: Secure MS Word documents with Digital Signatures

Securing Microsoft Office Word 2007 documents with Digital Signatures - When you receive a document that has been signed by someone you know, you are more likely to trust the contents than those of a document that has not been signed, or has been signed with an unfamiliar signature. Signing a document validates it to someone who recognizes your signature, now add the same degree of integrity to your documents in Microsoft Office Word 2007 thanks to the new Digital Signatures feature. For more...

How To: Sign up to become a mystery shopper and earn money for shopping

Mystery shopping is a great way to make money on the side while getting a chance to shop, check out new stores and restaurants, and over all improve the quality of service at these locations. The key is to not let them know that you are there evaluating them. If you think you've got a knack for blending in, then check out this video. In it you will learn the process of signing up and becoming a secret shopper, what to expect, and some tips for how to carry out your jobs.

How To: Digitally sign and encrypt your email messages

The only people who should read your emails are you and your intended recipients. Protect your privacy with this simple crytography guide, which shows how to obtain a free certificate for signing and encrypting email messages, how to download and install the certificate on Mac OS X 10.5, and how to use the newly installed certificate in Apple Mail.

How To: Digitally sign PDFs in Adobe Acrobat

Want to know how to set PDFs up so that they can be digitally signed? In this Adobe acrobat tutorial you'll see how to set up a PDF to accept a digital signature. You all also see how to create your own digital signature for signing and a strategy to work with your clients so that you know who is signing those documents.

How To: Use 'Sign in with Apple' on iOS 13 for Better Security & Privacy

We've all seen the login pages that allow you to log in to third-party accounts using your credentials from Facebook, Google, or Twitter. It saves you the trouble of creating another account and remembering more passwords — but it can also become a privacy and security issue, which is why Apple created the "Sign in with Apple" feature for iOS 13.

How To: Hack SAML Single Sign-on with Burp Suite

Single sign-on (SSO) lets users login across different sites without having to manage multiple accounts. I'm sure most of us appreciate the convenience of seeing "Sign in with …" buttons that let us login with a single username. Hackers, however, see a possible avenue for exploitation, and you'll soon learn how an attacker can exploit a SAML vulnerability to assume another user's identity.

How To: Understanding Signature Schemes: How Data Sources Are Authenticated, Secured, & Spoofed

One of the biggest problems in data security is authentication of data and its source. How can Alice be certain that the executable in her inbox is from the venerable Bob, and not from the not-so-venerable Oscar? Clearly Alice wants to know because if this file is actually sent to her by Oscar, the file might not be a game, but a trojan that can do anything on her computer such as sift through her email and passwords, upload her honeymoon pictures, or even turn on microphones and webcams. Thi...

How To: Find and Manage Your 'Sign in with Apple' and 'Hide My Email' Accounts on Your iPhone

The "Sign in with Apple" service lets you create accounts with third-party apps and websites more easily using your Apple ID. More importantly, it can hide your personal email address using auto-generated disposable email addresses. However, it's easy to lose track of the accounts you use with Sign in with Apple, as well as any throwaway email addresses you used to hide your actual address.

How To: Sign up for, and use, YouMail visual voicemail

Ever wished you could check your cell's voicemail online? You can, for free, with the YouMail web application. In this tutorial, you'll find step-by-step instructions for signing up the the YouMail service. For more, or to get started signing up for you own YouMail account, take a look! Sign up for, and use, YouMail visual voicemail.

How To: Use Vonage anonymous call blocking feature

If you are looking for a way to prevent telemarketers and nothing else is working, consider signing up for Vonage's call blocking feature. In this tutorial, brought to you straight from the professionals at Vonage, learn how to set your phone to block any incoming call without a number attached to it.

How To: Forward Yahoo! Mail email to Gmail for free

Ever wish you could automatically forward your Yahoo! webmail to Gmail without signing up for their premium email service? It's easy. So easy, in fact, that this free home computing how-to can present a complete (and somewhat talky) overview of the process in just over a minute's time. For specifics, and to auto-forwarding mail from your Yahoo! Mail account with signing up for Yahoo! Plus, watch this clever guide.

How To: Respond to a CAPTCHA challenge on a website

Even if you don't know what CAPTCHA stands for, you've more than likely run into them while browsing the Internet. It is actually a test to differentiate between humans and computers. In this clip from the folks at Butterscotch, you'll learn how to respond to CAPTCHA challenges when, for example, signing up for a website. For more information, including detailed, step-by-step instructions, and to get started asserting your own humanity, watch this home-computing how-to.

Prev Page