Analyze Data

How To : Analyze Wi-Fi Data Captures with Jupyter Notebook

When it comes to sniffing Wi-Fi, Wireshark is cross-platform and capable of capturing vast amounts of data. Making sense of that data is another task entirely. That's where Jupyter Notebook comes in. It can help analyze Wi-Fi packets and determine which networks a particular p ...more

How To : Make PivotDiagrams in Visio 2007

A PivotDiagram is similar to an Excel PivotTable report: It arranges data in a visual way. Check out this tutorial and learn how to look at the same data from different angles to establish and analyze relationships that you might miss in a table or a worksheet.

How To : Create a pivot table in Excel 2007

This video demonstrates how to create a pivot table in Excel 2007. From the people who brought you the Dummies instructional book series, brings you the same non-intimidating guides in video form. Watch this video tutorial to learn how to create a pivot table in Excel 2007, Fo ...more

How To : Jacmel crochet a granny square

In Access 2010 you can now create a navigation form (like a home page) for your database without writing a single piece of code or logic! Great for busy people who need to organize their database quickly, but who don't have code writing skills. It's just drag and drop. There a ...more

How To : Connect data to your Visio diagram

Take a look at this instructional video and learn how to analyze how a process or other area is actually performing by connecting data to the shapes in your diagram with Microsoft Visio 2007. You can also add different visual effects based on the data values. For example, you ...more

How To : Add comments to cells in Microsoft Excel

Microsoft Office Excel 2007 spreadsheet manager is a powerful tool that enables information workers to format spreadsheets, as well as analyze and share information to make more informed decisions. In this MS Excel video tutorial, you'll learn about adding hidden comments (and ...more

How To : Concatenate in Microsoft Office Excel

Microsoft Office Excel 2007 spreadsheet manager is a powerful tool that enables information workers to format spreadsheets, as well as analyze and share information to make more informed decisions. In this MS Excel video tutorial, you'll learn about stringing text and data tog ...more

How To : Shorten URLs from the Command Line with Python

Shortening URLs has become a necessity in this age of Twitter and limited-character status updates. It not only allows us to cram more words into our oh-so-important Twitter statuses, but it also helps us with a few other things. Some Benefits of URL Shorteners We can create ...more

Gomez PEER : Paid Distributed Computing

Have you ever left your computer one all night? Maybe downloading something, or just out of habit? Well there is a way you can turn that unused CPU usage in to cold hard cash: Distributed Computing. The Gomez PEER computing project sends data to your computer to be analyzed w ...more

Strengthen Your Password : Watch an 8-Bit Striptease

About two months ago, the massive Gawker Media hack was a wake up call for many web denizens on the importance of proper password security. Data analyzed by the Wall Street Journal revealed the three most popular passwords recovered from the hack were downright idiotic—123456, ...more

How To : Write a DBQ (or document-based question) essay

In this video tutorial, viewers learn how to write a document-based question essay. Data base question essays evaluates student ability to formulate and support an answer of documentary evidence. Each document based question is broken into 2 parts: short answer and essay. The ...more

How To : Use Motion Tracker in After Effects 6

Discover how After Effects redesigned Motion Tracker (After Effects Professional only) gives you more power to synchronize motion between two elements in a composited scene. Learn how Motion Tracker works by analyzing the moving pixels in each frame and then using that data to ...more

News : Microsoft SharePoint 2010

Microsoft SharePoint is a business management system introduced by MICROSOFT. It has many build in functions to work in web based environment easily. Microsoft SharePoint 2010 is released on April 17, 2010. It is introduced with the promise of better performance than its prede ...more

How To : Analyze packet captures and network taps

Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to analyze p ...more

How To : Use Wireshark to Steal Your Own Local Passwords

Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their c ...more

News : Do Real Science. No Degree Required.

What's the next best thing to being an official scientist? Being a non-official one. A new website called Science for Citizens helps you find the science experiment of your dreams, hook up with the scientists involved, and actually take part in the experiment itself. Here are ...more

How To : Map Wardriving Data with Jupyter Notebook

With the Wigle WiFi app running on an Android phone, a hacker can discover and map any nearby network, including those created by printers and other insecure devices. The default tools to analyze the resulting data can fall short of what a hacker needs, but by importing wardri ...more

How To : Exploit Development-Everything You Need to Know

Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more

How To : Use SpiderFoot for OSINT Gathering

During a penetration test, one of the most important aspects of engaging a target is information gathering. The more information you have coming into an attack, the more likely the attack is to succeed. In this article, I'll be looking at SpiderFoot, a modular cross-platform O ...more

News : Doctors Are Wrong to Call Zika Mild

Even as health authorities describe the symptoms of Zika infection in the general population as mild, a new surveillance study finds serious side effects are more common, and serious, than previously thought. The Centers for Disease Control and Prevention (CDC) notes that man ...more

Prev Page
  • Hot
  • Latest