By URL
By Username
By MRSS
Enter a URL of an MRSS feed
 
or

zedaxis1981

Zedaxis1981

0
Viewers

Custom NAS

03/02/14
A basic instructional into the process of building your custom network attached storage drive, and what it entails. Show Notes for this ...

Password

02/22/14
An explanation on why passwords are so weak, what you can do about, passwords to avoid, and how to protect yourself. Show Notes for this ...

Charge-Coupled Device (CCD)

02/16/14
An explanation of the history of the CCD, when and who invented it, how it works, and why it is important for the modern world. Show Notes ...

The Scanner

02/09/14
Learn about the scanner, and how this device will fade into history. Show Notes for this Episode Follow Steve Smith Zed Axis ...

Bluetooth and iTunes

02/01/14
Viewer question answering a music playback, Bluetooth and iTunes issue, and an explanation on how to use the shared library functionality ...

What kind of office do you use?

01/26/14
An in-depth explanation into the procedure required to make an office, mobile. Show Notes for this Episode Follow Steve Smith ...

Wireless LAN Hacked?

01/18/14
Steve Smith explains how to detect an intruder on your wireless network manually and how to kick them off for good. Show Notes for this ...

Optical Drive

01/12/14
An inside look into optical drives, and an explanation into optical drives work. Show Notes for this Episode Follow Steve Smith...

New Year's Blog

01/05/14
An episode explaining how to use a blog to its maximum potential in a method to allow you to converse about your New Year's Resolution, ...

How-to Conserve iPhone Battery Power and Bandwidth

12/22/13
Learn how to prevent your iphone's battery from dying prematurely during the holidays. Show Notes for this Episode Follow Steve...

Power Supply

12/15/13
An explanation into why the power supply is so important, and why wattage is more important than you thought. Show Notes for this Episode

Spyware

12/08/13
Learn about spyware, the types, and why you need to avoid getting them, removing them, and avoid having them transmit collected information ...