
mistermobiless.blogspot.co.uk/2010/12/how-to-check-basic-ele...
Basic electronic components such as resistors, capacitors, diodes and transistors are widely used in any electronic devices and gadgets. Knowing how to conduct a test on this components using a multimeter would give you an idea on how to trouble shoot ...

www.labnol.org/internet/check-email-address-exists/28453/
Learn how to check if an email address is valid and really exists without sending a test mail to that address. Works for Gmail, Outlook and Yahoo addresses.

docs.joomla.org/How_to_check_if_mod_rewrite_is_enabled_on_yo...
This article gives you a simple method to see if mod_rewrite is installed and working on your server.

www.artpromotivate.com/2011/12/art-copied-stolen-google-imag...
Did you know Google image search has the capability of scanning your images, just like a finger-print reader? It scans the actual image and finds any identical copies throughout the internet. Using this technology, artists can use an i ...

www.mydigitallife.info/how-to-check-test-and-validate-spf-re...
SPF record in the domain DNS tree level is the new tool to combat email spam that trying to forge or spoof sender SMTP MAIL FROM and Return-Path from your domain zone. However, incorrect or misconfiguration of SPF definitions may lead to email been dis ...

www.dummies.com/how-to/content/how-to-choose-a-good-twitter-...
On Twitter, your username, or handle, is your identity. If you can, sign up for Twitter by using your name or a variation of it as your username (assuming somebody else isn't already using it).

www.youtube.com/watch?v=VYzguTdOmmU
ophos's Graham Cluley explains a simple way of creating a complex hard-to-guess password - and how you should never use the same password on different sensitive websites.

blog.hubspot.com/blog/tabid/6307/bid/33098/How-Not-to-Steal-...
Learn how to properly cite internet sources to avoid stealing people's content.

yesmissy.com/how-claim-a-username-twitter/
After patiently waiting for 6 months I finally have my twitter name @YesMissy! I started my blog just over half a year ago, and didn’t think of starting a Twitter account until about a month or two into it. Unfortunately, at that time @YesMissy w ...

louisem.com/3474/facebook-page-url-vanity-url
Whether you call it your Facebook Page URL or Vanity URL – Here's why and how to claim it, plus important considerations before setting it!

www.brighthub.com/computing/windows-platform/articles/29403....
this article tells you how to removed cached password from windows, especially useful when you have connected to a NAS device with the wrong password. One way is using the keymanager. Although this article is for XP it is similar for the other operatin ...

line25.com/tutorials/how-to-code-up-a-web-design-from-psd-to...
This article goes through how to change a PSD file into a working website theme. It is based on an ongoing project but can be read on its own.

www.ablebits.com/office-addins-blog/2014/01/31/stop-junk-ema...
This article explains how to configure Outlook Junk Mail Filter to block as many junk emails as possible. You will also learn how to keep your filter up to date, how to move a good message from the Junk folder and ensure that no legitimate e-mails gets ...

kb.worldsecuresystems.com/kb/configure-ssl-encryption-your-e...
With today's email clients, it's possible to use secure SSL connections for added security. Doing so ensures that if another person somehow has the ability to eavesdrop on your Internet connections, that person won't be able to view your password or th ...

ticket.tp-link.com/index.php?/Knowledgebase/Article/View/272...
If you have a cable modem broadband service and you still want to use TD-W8960N as a pure wireless router, you can follow the steps below to configure one of the LAN ports working as the WAN port (We call it "EWAN"---Ethernet WAN).

techblog.aurionpro.com/2013/03/how-to-configure-virtual-box-...
I have had such a hard time locating the information I needed to get a VirtualBox VM to use both NAT and Host networks so that the VM could see the internet and the host could see the VM with a known IP address that I decided to write this post.

www.resellerspanel.com/articles/dedicated-servers-articles/d...
Configuring WHMCS to work as a billing system for web hosting explained in a couple of steps. This is more of a checklist.

www.youtube.com/watch?v=_PQhITHhWUk
A YouTube video on How to configure your categories and attributes for layered navigation in Magento.

magazine.joomla.org/issues/Issue-May-2012/item/740-How-to-co...
In this tutorial, we will show how to convert a Joomla 1.5 template to Joomla 2.5 template. We will take default Joomla 1.5 template "rhuk_milkyway" as an example and convert it to Joomla 2.5 native compatible template.

forum.xda-developers.com/nexus-4/help/how-to-copy-cwm-backup...
So, CWM saves its backups and blob directory in /mnt/shell/emulated which is not accessible via MTP. I've started using TWRP for all my new backups but I would like to copy the existing CWM backups to my PC before wiping the directory on my phone. It's ...
Page 10 of 27