I want to write this article because in my childhood, I had experienced internet stalking which ultimately ended in physical stalking which then lead to several attempted abductions. I have now learned how to use the internet safely, who to communicate with and I've learned ho ...more
In this article, I'll show you how to make a simple Gmail notifier. Python can do various things in terms of notifications; sending commands to an Arduino unit, playing sounds, opening windows, etc. The code below simply plays some music, but the possibilities of notification ...more
Everyone has deleted a file or folder on accident before. Sometimes people even delete stuff on purpose, only to find out that they needed the files after all. If you're experiencing one of these mishaps, don't worry, file recovery is possible in most cases! When a file gets ...more
Welcome to Canon 5D World. Alright, let's face it... there's not much in here right now, but hopefully one day this World will be the go-to destination for anyone with questions on their Canon 5D or 5D Mark II. Maybe the Canon 5D Mark III, if it ever comes to that. And me? ...more
Apple's iPhone is considered one of the best smartphones in the world. Many cell phone makers have tried to take down the juggernaut, with some Android-based devices coming close, but in order to become an actual iPhone killer, something revolutionary needs to happen in the mo ...more
The Lost Thing is a lovely short written by Shaun Tan and co-directed by Tan and Andrew Ruhemann (executive producer of the fantastic doc My Kid Could Paint That). Based on the award-winning children’s book of the same title (also by Tan), the piece was created over a span of ...more
Keyword Research Tool. This tool provides you with the ability to directly query the Google keyword databases and truck load of choices of keywords to use in your campaigns. With this keyword tool you are able to create, manage your keyword list and integrate with other tools ...more
The Writers at io9.com have been running through a fantastic series of blog posts, in which they're teaching their readers about the history of great 80s sci-fi and fantasy. Because so much of this is right up my alley, I though I'd aggregate their aggregations, so to speak, a ...more
Eric Abrahamson, a professor at Columbia University, writes in to Forbes on how to be the Michelangelo of work shirking. The article is intended to help managers better understand their team's lack of productivity, but it also provides 10 simple tactics for all the lazy asses ...more
Missions to Mars are far and few between because the fuel is so costly. Solution? A pair of scientists are proposing that elderly astronauts are sent on one-way missions to Mars, to boldly go... and not come back: "'The main point is to get Mars exploration moving,' said Dirk ...more
Do you ever wonder what we're looking for when it comes to how-to articles? As with how-to video submissions, what we're looking for are great, detailed, and passionate articles contributed by people with deep knowledge in their fields of interests. You'll learn how to: Inst ...more
If you're writing a college essay or report, your bibliography is a painful, yet necessary part. And thanks to all of the information available on the World Wide Web, most colleges and universities accept websites as resources in your bibliography. But citing websites can be c ...more
People sometimes ask me about the IT industry here in the states. These folks are usually either trying to get into a certain field, or looking to switch or move into another one. Right now, you may currently be a Computer Science major that will be graduating shortly and are ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
Warnings i cant be held responsible for any illegal act done by anyone but myself and there are copyrights so notise that taken the trademarks or copyrights are strigtly prohibeted by law and will be punshied by law and i or my partners cant be held responsible for sudo camma ...more
STANDP'S CUSTOM DESKTOP "ASK NOT WHAT YOUR DESKTOP CAN DO FOR YOU...". http://standp-how-to-vidzzz.wonderhowto.com/corkboard/new-post/text/ Showing newest posts with label tips-n-trick. Show older posts DEC 07 Computer Backup If you have taken good care of your computer th ...more
Ink & Paint was originally intended to provide a place for the sharing of graffiti and street art related news and the spreading of the street art culture. However in recent months I have noticed a distinct lack of "lowbrow" art in the WHT community. Don't get me wrong though, ...more
Oh Data, You so Awesome! We are going to use Node.JS to gather us some data. Given nodes plethora of well abstracted network abilities and it's deep evened nature, it will make quick work of plugging into various data sources and gathering / making good use of said data. Dat ...more
US can legally kill Americans in terror groups You read it right. The US can now target Americans who are supposedly part of terrorist groups. Here's my analysis of Attorney General Eric Holder points (keep in mind though, these are point's brought up by MSNBC, original artic ...more
TCP/IP Client / Server Application Hello! Today's blog post will be about coding a very rudimentary Client and Server application duo, which will communicate by using TCP Sockets. It is, as illustrated, in principle, just two cans and a string that ties them together. The se ...more
This week's AON may be a little short, but the ones to come will be packed full with information. I am really hoping for the skies to clear so I can observe soon! Through March 2012—The Garradd comet is getting brighter! It will peak in February. Here's how to observe it! Jan ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more
This article describes the very basics of compiling a program on Linux. It is targeted at the absolute beginner. Sometimes beginners search for programs on the web for their Linux systems, and is faced with the reality that they have to compile the program themselves, either b ...more
In terms of internet, faster = better. We all want faster internet, but how exactly do you get a fast wireless connection? Believe it or not, the answer is quite simple. Here are 4 things that may be slowing down your connection. Interference from Other Devices Interference ...more
Growing up is difficult task. Do you suffering from hopeless? or still don't know what happen in last few years. The reason is you think that you have done all the things you should do. May be you have planed you last year (2010). May be you have achieved some targets. But sti ...more
A couple of days ago, I had some questions regarding the mighty tentacled beast of our oceans— the octopus. Actually, I was just curious as to what an octopus was, and I found the answer, which was a cephalopod mollusk in the order Octopoda. But that's not all I came across. ...more
Blogs are a gold mine Some of the best sentences you will ever get when building your vocabulary can definitely come from blogs. The language and vocabulary usage in blogs is always changing to reflect how people talk in this day and age, and therefore are the perfect researc ...more
Announcement #1: Holiday season is here! Every Wizard101 account that logs in between December 21, 2010 and January 1, 2011 will receive a silent nightcap, which is different for both boys and girls! Merry Christmas and a Happy New Year! Announcement #2: Get yer Crowns for ...more
FV Extender for Chrome This is an extension you can download for your the Chrome browser. At this time the extension only accepts and sends back gifts but may do more in the future. See developer's site for more information, and a quick video showing this feature in action. ...more
National Geographic recently published a retrospective of the lovely Jane Goodall, one of the world's most accomplished conservationists. The feature includes every image of Goodall to ever appear in the magazine for the past fifty years. As a young woman new to the field, Ms ...more
This might be so '2 weeks ago' but I've been away, oh well. In a few short words: The PS3 has finally been hacked via a USB device! Sure it can be possibly used for piracy, but let's not go into that topic. Instead read this nice intro into what an open PS3 can do for you (v ...more
Write about what you LOVE. EARN money for it. In this week's edition of Friday Fresh, we're doing a little something different. You may have noticed our banner touting our Love. Earn program, and a new section called New Articles By You. New articles on topics as varied as sn ...more
James Williamson for Lynda demonstrates designing for multiple browsers. The most frustrating aspects of web design is constantly dealing with the settle and some times not so settle differences in browser rendering. While they moved to a standard spaced, CSS control presentat ...more
Well, why aren't you? They're all the rage in pop culture right now, what with The Avengers blowing away audiences and the finale to the Batman trilogy coming out soon. Not to mention that Marvel is remaking Spider-Man! The original is only like, what, less than ten years old? ...more
In this article, I'll be explaining the basics of how microcontrollers work, physically and virtually. First off, microcontrollers are no simple thing, so don't be discouraged if you find it mind-boggling! The world of microcontrollers is fascinating, engaging, and an awesome ...more
Note: The article assumes that the reader has a fundamental understanding of at least one other programming language and Perl. This is intended serve as a quick reference for Perl's input/output of data to databases. Once you've mastered the basics of Perl, you might want to ...more
Another week has passed on the online battlefield as the CISPA legislation continues to grind away at our freedom. Here at Null Byte, we try to keep our community informed and knowledgeable at the same time—and that means creating content for them to learn from. After last we ...more
In general, hacking and information security is not just one discipline, but a number of them, and today we will look into some of the networking concepts. In the last Hacker Fundamentals, we talked about the OSI model as well as a little on TCP/IP and the protocols that make ...more
Did you know there is hidden data in your digital pictures? Well, there is, and that data might be a security risk to you. Think back at all of those pictures you're in and are connected with. I'm sure some of those you'd like to distance yourself from. And surely you wouldn't ...more
Cryptography is a quintessential part of computer security in the modern world. Whenever you buy something on eBay or log into Facebook, that data is encrypted before it's sent to the server in order to prevent third parties from eavesdropping and stealing your sensitive infor ...more
This article is all about creating content and using it to build links to your website. Content, meaning articles, videos, and even podcasts is now really the new advertising. That’s because people go to the internet to look for information, not look at advertising. So you nee ...more
This article is all about creating content. This is a very important concept to grasp because the content that you create for a website is going to be the basis for how you will advertise and promote that website. Content, meaning articles, videos, and even podcasts is now rea ...more
In this article, I'll be exploring the basics of Python, i.e. variables, input and output. You'll need Python (2.7+), a computer, and some free time. Variables Simply put, variables are like envelopes. They are empty and meaningless until we place objects and meaning into th ...more
Today's guide is on creating a password protected folder on Windows 7 without any additional software. Yes, you heard that right. No extra software at all! This guide is intended for beginners. But please note, this method should not be used to store financial or otherwise hig ...more
We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no ne ...more
We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no ne ...more
At some point, we all go from organized to disorganized. Let's assume you are a business executive working in a busy corporate building. Chances are you are going to get a heavy workload and it will impact how clean your workspace is. However, this article is about keeping you ...more
We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job ...more
We're officially seeking Null Byters interested in teaching others! Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowle ...more
"Google+ is dead." How many times have you read that in the past few weeks? It seems like I can't get away from this notion that Google+, as a social network, is a total failure. Don't feel too sorry for them, though. +Bradley Horowitz isn't worried. In an interview with Ventu ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. For about the past month, the folks at Mojang have been leaking pre-releases of Minecraft 1.9 and they've added many exciting things. Additions to the game include: potions, new mob ...more
By now you’ve heard about the iPhone 4S announcement, possibly through our article about Apple’s newest smartphone. However, the star of the show was not the only announcement, so here are a few other announcements that were served along side the main entrée this morning. Let’ ...more
If you’re unfamiliar with League of Legends, you’re either not into PC gaming or you haven’t spent much time on the internet. Riot Games officially released League almost two years ago, and since then it’s become a huge hit. In fact, the Santa Monica based company recently ann ...more
In a previous article where I suggested 104 photographers to follow on Google+, I received a lot of criticism because over 90% of the listed photographers were men. While women are currently not a majority on Google+, they are a definite presence, and they are active. Today, I ...more
To go Open Source or go proprietary? There is a common conception that open-source is unsafe and insecure and therefore companies should rather go for proprietary solutions. They think that because software is termed "open-source", that the world can see the vulnerabilities of ...more
Whether you're a student, a toastmaster, just writing, or making articles on WonderHowTo, you will have to come up with a topic. The topic should be able to guide you to some of the things you want people to know about. Here are some ways that you can can come up with a topic. ...more
Thanks Anonymous User For This Article, Not Bad Ok SoftzZz...!.!.!.: Step 1 Antivirus The best freeware antivirus is AVG Anti-Virus Free Edition 2011, and you can get him from this site. Step 2 Optimizing tool For me CCleaner is the easiest way to do some things, like: 1. ...more
This article will show how to make a simple, fake computer error message. These message boxes are 100% harmless, and make for funny pranks. They will display any text you want them to. Required: - Windows XP/Vista/7 - Notepad Typing in the Code First, open Notepad, and ty ...more
Beauty and The Beast The Japanese word yugen connotes the sense of subtlety as it relates to beauty. According to Donn Draeger, author of many books and articles on the history of Budo, the definition of yugen includes such ideas as “suggestiveness,” “charm,” and “dynamic sti ...more
I still have hope that this will be a good World Cup... This article aggregates a lot of things that have been said about the World Cup experience this year (South Africa's infrastructure, low scoring games, uninteresting first round match-ups, etc). I've noticed in a few bro ...more