In this video "A better way" presenter Chuck Miller demonstrates a method of how to create a job site pipe holder (clamp hold-down) as opposed to a c-clamp, bar clamp or blocks of wood. It involves use of a pipe flange of the same diameter as the pipe being held. It shows you ...more
In this tutorial, we learn how to check if someone has blocked you on an IM program. To do this, go to Yahoo messenger, because it allows you to add yourself and block yourself. If someone has suddenly showed up as offline on your list and you want to check if they blocked you ...more
Pixelated photos are always a site for sore eyes. When you crop your photos in Photoshop you can keep your aspect ratio to stay wayward of the "pixelation desecration". When you hold down Shift during your crop it will retain the aspect ratio so you have nothing to worry about ...more
The metalx1000 shows how to install Linux the on a phone. He talks about the Openmoko operating system. The first thing he shows is where to download it from and which one to download. The next thing he talks about is a tool that he will be using called "dfu-util" which he sta ...more
This video tutorial shows you how to block any website on a Windows xp operating system by simply using notepad. First the URL to the site that needs to be blocked should be located by visiting the website form your browser and copying the URL from the address bar. Next close ...more
If you want to learn how to block websites in Windows, just follow these few simple steps. Watch this video for more information! 1. Go To Start And Run. 2. Enter This in The Run Box: C:\WINDOWS\system32\drivers\etc 3. Open Host With Notepad. 4. Type In 127.0.0.1 and the webs ...more
In this tutorial the author shows how to use a proxy at your school and get on the blocked site like MySpace etc. Now he points to the Dot.tk website and how to access it from Google.com. Now if you want to access any website you just need to copy the link and paste it into th ...more
In this article, I'll show you how to make a simple Gmail notifier. Python can do various things in terms of notifications; sending commands to an Arduino unit, playing sounds, opening windows, etc. The code below simply plays some music, but the possibilities of notification ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Redstone can add a lot of exciting effects to your gameplay, but not all usage of redstone has to be flashy to achieve a cool effect. For this Saturday's Weekly Workshop, we're goin ...more
This article relates to changing the settings in Adobe Flash so that you can improve your overall computer security and privacy. Changing these settings might have a negative performance impact on your computer - but it is worth while. How to Amend Adobe Flash Settings Adobe ...more
Something that can shy a user away from making the switch to Linux is not having the option to go back to Windows. Luckily, there are solutions like dual-booting, where you can have both OS's installed right next to each other. However, Windows 8 appears as if it will block du ...more
Matt Reed, a web developer at Nashville interactive ad agency Redpepper, built a massive, real life Facebook Like "button" out of Legos, which lights up whenever someone clicks Like on his Facebook page. The programmer loves LEGOs, and draws an affinity between the legendary b ...more
Warnings this only for educational use i dont take responsiblety for any use of this article if you want to use this for use at a school plz contact me at sebzy4@hotmail.com hi im a computer enginer/programmer (NOT games) but i am good at hacking and i want to help. notise th ...more
This is the GetNetWise video guide on how to set up Internet Explorer 6.0 for Windows to allow cookies from some sites. This is useful if you wish to block cookies by default, but allow for certain sites. The procedure is simple; firstly, select "Internet Options" from the "To ...more
With social networking systems, YouTube comments chains, chat rooms, bulletins boards, Twitter updates... It seems as if almost everyone has at one time publicly stated an opinion on the Internet. Nearly half of all prospective employers research job applicants online. Make su ...more
Systm presents this detailed tutorial on how to make a custom Star Wars style light saber. Luke, Darth and Obi-Wan's Lightsabers were pieced out of junk piles. David shows you how to build exact replicas and an original design from The Custom Saber Shop. Then he picks a fight ...more
This Rhino 3D software tutorial will take you through the process of creating a plan drawing of Mies Van Der Rohe’s Barcelona Pavilion. The tutorial teaches you the fundamentals of creating plan drawings in Rhino and issues of doing 3D work for the plan drawings. PART 1: will ...more
To those who may not know about this, the UK high court has ruled that all UK based ISP's are to begin blocking Piratebay. This comes in retaliation to Piratebay's action to take down all torrents and provide only magnet links to the pirated content - a move which releases TPB ...more
Backing up your files is a requirement in today's world of tech. In an instant, your storage device can fail. This is an unacceptable situation that should never happen to anyone. Storage is cheap, and backups are easier than ever to perform. Most of the time, this can be comp ...more
It's an ambitious How-To project to say the least, or more specifically, an over-the-top political art installation by San Francisco artist Brian Goggin. You may have previously heard of Goggin for his "Defenestration" project—an installation of "frozen" furniture, being tosse ...more
Stuck on one side of a river or ditch? If you are stranded with no other way to get to your destination you will need to build a bridge! Without many supplies, your best bet is a beam bridge which can be made with just a single piece of wood. This video will show you how to ge ...more
The video is about how to change the IP address. MAC address is the unique identifier a site of the most network adapters. MAC address is used to determine what IP address the computer will have and one way to change the IP address is by changing the MAC address. The method is ...more
Finding Linux hard to handle after using Windows? Well this should help, here is how to install software on Linux. Start off by clicking on application launcher. Here go into applications, then into 'system' where you should find software management. In this program go straigh ...more
Hack Mafia Wars. Mafia Wars hacks, glitches, cheats. Mafia Wars is a popular facebook app / game. Watch this video tutorial to learn how to mass add hundreds of Mafia Wars family. Learn how to mass add your new friends into Mafia Wars - automatically and also w/o Facebook pin ...more
Learn how to tie the Boy Scouts trucker's hitch knot. The Trucker's Hitch (Lorry Knot in the UK and parts of Canada) allows the scout (or sailor or whatever) to easily tighten a rope, yet easily untie the knot. Its most common use is for tying loads (thus the trucker moniker) ...more
Looks like Minecraft is getting some cool new features, including editable books and colorful wooden half slabs. Check out the video below to see the newest Minecraft Snapshot 12w17a in action. Warning: This release is for experienced users only! It may corrupt your world or m ...more
Here is our entry for the Greek building contest. It is a model of the theater at Epidaurus. Here are our favorite images and descriptions out of those we used to build it: 1 2 3 4 And here are just a few screenshots. (I promised myself not to get too carried away with signs ...more
To the displeasure of many loyal Firefox users, Mozilla has been deploying what seems like a new marketing strategy to "catch up" to Google Chrome. I have no idea if this is because the version number is higher than theirs, but it is downright annoying. It's not all complaints ...more
"Google+ is dead." How many times have you read that in the past few weeks? It seems like I can't get away from this notion that Google+, as a social network, is a total failure. Don't feel too sorry for them, though. +Bradley Horowitz isn't worried. In an interview with Ventu ...more
Leaving your wireless router at its default settings is a bad idea. The sad thing is, most people still do it. Once they've penetrated your network, hackers will change your router settings so they'll have an easy way back in. This allows them to change your network into a she ...more
Like the recent XSS 0day exploit found in the Mac and Windows versions of Skype, a similar one has been found in the Skype app for iPhone. The vulnerability allows an attacker to send a message that contains malicious JavaScript code in the "Name" parameter. This code can stea ...more
The Free Art and Technology Lab (F.A.T.) has provided three different energetic and passionate methods for voicing support for Ai Weiwei, the famous Chinese artist and activist who has been detained without known reason by the Chinese government since March 31st. First, the C ...more
FV Extender for Chrome This is an extension you can download for your the Chrome browser. At this time the extension only accepts and sends back gifts but may do more in the future. See developer's site for more information, and a quick video showing this feature in action. ...more
Dating sites are getting more and more culture specific, and this week's brand new girl + guy site offers a very specific service. Cute girls are paid to play video games. Gamer dudes pay to play with them. GameCrush is already so popular, the server is currently down due to ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Minecraft 1.2.5 has been planned for a few days now, but Jeb wanted to wait for modders to catch up to the new changes. This time around, things should run ...more
In this article, I'll show you how to send SMS messages with Python. You'll need Python 2.7 or later, urllib and urllib2. The code basically uses an online text messaging service to "POST" html data, as if a person was entering the data themselves. The uses for something like ...more
The already robust and ingenious Nmap tool has received a whole slew of new scanning scripts that can be used to do all sorts of naughty endeavors. Notably, the SQLi module, since it is a necessary evil that we must cover here at Null Byte. This major update is going to fuel t ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. So you have a deep mine, an epic home, a bountiful farm, and mob traps galore, but have you ever considered linking them together into one cohesive unit? With the use of a minecart ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Missed the other guides? Click on the links! Contents Starting off & Mobs Combat Food Mining Survivability Welcome back! Today we're going to look at the most important aspect to ...more
"How do I install Arch Linux?" That question was bound to come up eventually. And with me using Arch, it's no coincidence that all of you want to use it as well. Arch is arguably the best Linux distro available. Distros that come close are Gentoo and some aspects of Ubuntu, bu ...more
Last week's Community Byte we got off to a great start! We had a few people build our IRC bot, and all went well. We had some great contributers, ideas, and people willing to learn. So, needless to say, we will be having another. Let's try to get a few more people involved thi ...more
Cross-Site Request Forgery (CSRF, pronounce "sea-surf") is a common web exploit. However, for unknown reasons it's not used very often. It plays on a given website's trust in a web browser by executing another website's form action, for example, sending money to another person ...more
Your IP (Internet Protocol) address is your unique ID on the internet. It's synonymous with your home address. Anyone in the world can contact your computer through its IP address, and send a retrieve information with it. I'm sure at one time or another you've heard that hack ...more
Minecraft has been out nearly two years now. Hard to believe, isn't it? Fans of the game have been spoiled with a lot of new content over that span from its creator Notch, as well as its modders. A couple months ago, Notch tortured the Minecraft community by tweeting some scre ...more
Over the past couple of weeks, there have been a series of high-profile hacks and leaks. From the rooting of CombinedSystems, to a secret FBI conference call leak, all the way to the distributed denial-of-service (DDoS) attacks on U.S. government sites—with a lot in-between. A ...more
As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt ...more
There are so many hackers around these days, and they are becoming very smart. So smart that they have successfully taken down many government websites. The most recent attack was on the Department of Justice (DOJ). To read about the history of these hackers, check out Wikiped ...more
Today's article serves as a general guide to keeping Windows 7 and Vista clean. The goal is to clean up your messy computer and have it running at maximum performance in no time. The question at hand is—what is your computer's performance like? Not great? Do you think it coul ...more
This is Part II in the Lockdown: The InfoSecurity Guide To Securing Your Computer series. Before beginning, check out Part I. This article will cover using alternate software to increase your security and will provide you with some information about websites and programs that ...more
The United Kingdom has long been known as an international hub of yellow tabloid journalism. The News Of The World, one of the nation's largest tabloids, is famously in court right now because of the deplorable methods it used to acquire salacious information about interesting ...more
G+Me is one of our favorite Chrome extensions here at Google+ Insider's Guide. We love it because it's one of the most comprehensive extensions out there. It attempts to address the "noisy streams" issue, with list mode, and collapsible posts and comments. The creator, +Huy Zi ...more
Last week's round up was all about third party services that sprang up to fill any Google+ voids. This week, I'll let you know how to keep up with the latest Google+ updates, and give you some great tips for interacting with your followers. Although Google+ updated its naming ...more
If you want more people to follow you on Google+, you'll have to work for it. Not everyone can be +Tom Anderson or +Robert Scoble overnight, you know. Invite People The first thing you should do when you get into Google+ is to invite people to add you to their circles. After ...more
Many folks seem to treat their computers as a sort of mysterious alien technology that only the shamans of the IT Department can comprehend. You might have gotten it into your head that you're just not good at computers and will never understand them. On the contrary, getting ...more
Business owners and marketeers are diverting from traditional marketing techniques, including billboards, radio and TV advertising, brochures, and any other outdoor promotions, to cheaper but effective Internet marketing strategies. Under the new arrangement, business owners r ...more
I'm sure everyone has heard about Google's changing privacy policy on March 1. It's scattered everywhere, with notification bubbles on Google Search, YouTube, and the rest of their products. Click here to see the new privacy policy that will take effect on March 1, 2012. What ...more
Here's something fun for the Null Byte community to do—a coding competition! This week, I wanted to get everyone involved by offering you all a nice library of possible program types to choose from and try to code. At the end of this competition, all of the submitted programs ...more
Paying for web hosting isn't ideal in most situations. If you have your own website, hosting it yourself is very acceptable and easy to do, assuming your internet bandwidth permits. Most people want to run a personal site, nothing crazy, so hosting from home on low-bandwidth i ...more
Skype is a great service. It allows a free solution for VoIP to VoIP calls, and cheap VoIP to landline calling. However, a very disturbing, little known fact that might push you away from Skype does exist. If you closely read the terms of service agreement, it clearly says tha ...more
You may have asked yourself, "How do hackers take my password, if the website owner can't?" The answer is simple. When a website stores your login password for the site, it is run through a cryptographic hash function before it enters the database (if the website isn't Sony). ...more