When you need to gather information without anyone knowing you will need to utilize covert audio surveillance. There are a variety of ways and technique to most effectively get the information you need. This is part three of four in this free training video wherein Private In ...more
So after being teased last Christmas with an email promising that the Meta 2 was shipping, nearly a year later, we finally have one of the units that we ordered. Without a moment's hesitation, I tore the package open, set the device up, and started working with it. To me, the ...more
We're all looking to meet someone, and in this day and age the easiest way to do that is through one of the various dating apps out there. But we can all admit it can get disheartening swiping through all of those people for the frustration of someone not answering your messag ...more
You may not have thought of dorks as powerful, but with the right dorks, you can hack devices just by Googling the password to log in. Because Google is fantastic at indexing everything connected to the internet, it's possible to find files that are exposed accidentally and co ...more
The threat of an evil access point has been around for a long time, and with the rise of open public Wi-Fi, that threat is often overshadowed by how comfortable we are using third-party Wi-Fi hotspots at coffee shops and public spaces. While we've shown an evil twin attack usi ...more
It's pretty much a given at this point that Facebook has a lot of data on us. While you might be conscious of the data you share with Facebook when you post, upload photos, or chat with friends on Messenger, you might not be thinking about all the data it receives from website ...more
Welcome back Hackers\Newbies! Hey guys first of all I would like to explain my absence here in NullByte. I got a little "occupied" with "other things". When I got back, I saw all these HowTo's, articles, Help Questions, I decided, I need to share more of what I have, to you g ...more
Privacy and security go hand in hand, especially for smartphones. When it comes to privacy, you decide what personal information about yourself is out there to discover. Security, on the other hand, is all about enforcing those privacy decisions. Sometimes privacy and securit ...more
You should feel relatively safe to watch and post videos on TikTok, but like with any online service, you're always at the mercy of hackers. It's unfortunate, but anyone can become a target for arbitrary reasons. Maybe your TikTok videos are controversial. Maybe someone has a ...more
Not everything that Facebook does is in the best interest of its users. Just look at past examples such as social ads, facial recognition, and instant personalization. Users were perfectly fine without these, and they still are. And now there's another annoying problem that Fa ...more
There's three types of animal lovers in the world. The first are your basic pet owners. The ones with a cat or dog in the home, meant to be their cuddly companion. They love and adore it and consider it a member of the family. The second are animal rights activists. They ten ...more
Those of you who are proud to be Libras, well, you may no longer be Libras. You could be Virgos. At least, according to astronomer Parke Kunkle. Due to the current changes in Earth's alignment, the dates of the zodiac have changed, thanks to the inclusion of a long forgotten ...more
Don't want one of your Facebook "friends" knowing your status updates? Prefer to keep a few of those "friends" out of your photo albums? Would you like to prevent a few "friends" from accessing your address? The simple answer would be to remove all of those so-called friends— ...more
Last weekend, some unlucky Gmail users inadvertently had their email accounts wiped out. Actually, it was 0.02 percent of all Gmail users—or roughly 40,000 of the 200 million who use the email service, due to an "unexpected bug" which affected copies of the data. Gmail does ma ...more
Fire. It’s everywhere— always has been. From the Ordovician Period where the first fossil record of fire appears to the present day everyday uses of the Holocene. Today, we abundantly create flames (intentionally or unintentionally) in power plants, extractive metallurgy, i ...more
Ever wish there were a way to upload a video to YouTube without making it available to anyone with an Internet connection? While you might know about the option to make your uploaded clips private, limiting their viewing to 25 users of your choosing, you might not know about t ...more
Facebook is constantly changing, and with this latest updates they made a huge overhaul of their privacy settings. With this change, anyone on the Internet can see most of your information, without even having an account! In this video, you will learn all you need to know abo ...more
This how to video tutorial will show you the basics of knitting. Follow along and see how easy it is to actually knit. Anyone can learn to knit and it's a great craft to know if you want to give handmade gifts! Learn how to do a slip knot, cast on, and how to bind off. For mo ...more
Since its launch in 2001, Wikipedia has become the number one reference site on the web, used by anyone and everyone, written by anyone and everyone. With over 18 million collaboratively written articles, there's backgrounds and descriptions on practically everything—if it exi ...more
WonderHowTo is a great place to find advice and learn things that you want to know, but can't find anywhere else. On this website, there are tons of people who make articles and videos to show you how to do stuff. In this tutorial, you will learn how to make your own WonderHow ...more
This video aimed at electricians, is designed to help employers and employees what is required in the standard that is applied for the control of energy during maintenance and servicing of equipment and machinery. Employers are required by law to develop proper lockout safety ...more
If you've spent a ton of money on your newest smartphone, you will want to make sure it's secure. In this tutorial from the experts at PCWorld, learn exactly how to activate safety mechanisms on your Android. With these options you can set a complicated passcode (so that anyon ...more
Experts say that every house has around 1500 dollars worth of merchandise that could be sold on eBay. eBay is a great alternative to the traditional garage sale these days, and with more and more people joining the site every day - why not get in on the action? eBay is an exci ...more
Remember KODACHROME? That color reversal film from Kodak? The film that was the inspiration for Paul Simon? The only brand of film to have a state park named after it? Soon, that's all you'll be able to do— remember it— because today is the last day that any kind of Kodak Kod ...more
With FarmVille being one of the hottest Facebook games on the market, it's no wonder it's the primary target for scams and virus downloads. Anyone playing FarmVille is at risk, but the primary targets are those looking to improve their gameplay and build their farms and neighb ...more
Imagine a game almost anyone can play that combines the best of skee-ball, bowling, and shuffleboard. Welcome to the ancient sport of bocce. You Will Need: * A set of bocce balls * Open space or a court * Two to eight players Step 1: Find friends to play with Grab as few as ...more
For most people, New Year's Eve means watching the ball drop in Times Square. It means celebrating the New Year with friends and family. Countdown parties, clocks, confetti... passing out before the clock strikes midnight because you drank too much. But there's one more thing, ...more
Move over NASA— SpaceX is taking over. Well, not really. But today, the privately funded spacecraft company broke all expectations when their Dragon capsule fell to a soft landing in the Pacific Ocean, completing an undoubtedly successful demo flight of nearly two full trips ...more
Join the Pilot program and learn how to fly! But you're not going to be flying airplanes in this Pilot program, you'll be trying your hands at Google's first laptop computer. It's called the Cr-48, a black notebook wh ich runs an extraordinary operating system— Google Chrome. ...more
These days, eReaders are everywhere. For die-hard book nerds, eReaders offer the convenience of a full library without having to sacrifice shelf space. Sure, there are the paper buffs who swear that you just can't take an eReader with you into the bathtub, but when's the last ...more
Painting window sash is one of the most dreaded tasks for homeowners but with a bit of information and patience, anyone can do it well.
Industrial espionage, social engineering and no-tech hacking are all very real and there are simple precautions that you can take to protect yourself, which this article will discuss. Whether you are a high-profile businessman or a housewife (or husband), keeping information y ...more
Any talk about privacy is a complicated (usually) and touchy subject. In today's world, privacy is an ever eroding pleasure to be had. Numerous cases, like the monumental Kat'z vs United States, have been fought to hold on to this right. So talking about privacy in the domain ...more
In this video, we learn how to find your IP address. First, start up your computer and open up your web browser. Next, you will type in the site: WhatIsMyIPAddress. Once you do this, you will be led to a new site which will load up your IP information at the top of the page. O ...more
In this video, Jake Allman from Butterscotch.com shows us how to use e-mail on a Blackberry. First, configure your e-mail account onto your Blackberry. You will need your login information as well as internet information to do this. Now, return to the main screen and click on ...more
The cryptology course went live today and is accepting anyone who is interested for registration. Check out the link for more information and to view the other awesome free online courses!
I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to rememb ...more
Every year at the big video game trade shows around the world, like E3 and gamescon, the big three console makers each do a hot-ticket exclusive press conference to let the media know what's coming for their system. Computer games have no such press conference. Who would give ...more
If you've gained entry into Google+, one of the first things you should do is adjust your Google account settings. Your settings will now look quite different, and you can adjust your notifications, password retrieval methods, and more. There are many settings that you may not ...more
Knowing music theory never hurt anyone—not Bach, not Chopin, not Schoenberg. Even if you fancy yourself a musical iconoclast, the better you know the rules of music, the better equipped you'll be to break them down the line. In this free video music theory lesson, you'll learn ...more
Knowing music theory never hurt anyone—not Bach, not Chopin, not Schoenberg. Even if you fancy yourself a musical iconoclast, the better you know the rules of music, the better equipped you'll be to break them down the line. In this free video music theory lesson, you'll learn ...more
Knowing music theory never hurt anyone—not Bach, not Chopin, not Schoenberg. Even if you fancy yourself a musical iconoclast, the better you know the rules of music, the better equipped you'll be to break them down the line. In this free video music theory lesson, you'll learn ...more
Knowing music theory never hurt anyone—not Bach, not Chopin, not Schoenberg. Even if you fancy yourself a musical iconoclast, the better you know the rules of music, the better equipped you'll be to break them down the line. In this free video music theory lesson, you'll learn ...more
Knowing music theory never hurt anyone—not Bach, not Chopin, not Schoenberg. Even if you fancy yourself a musical iconoclast, the better you know the rules of music, the better equipped you'll be to break them down the line. In this free video music theory lesson, you'll learn ...more
Knowing music theory never hurt anyone—not Bach, not Chopin, not Schoenberg. Even if you fancy yourself a musical iconoclast, the better you know the rules of music, the better equipped you'll be to break them down the line. In this free video music theory lesson, you'll learn ...more
Knowing music theory never hurt anyone—not Bach, not Chopin, not Schoenberg. Even if you fancy yourself a musical iconoclast, the better you know the rules of music, the better equipped you'll be to break them down the line. In this free video music theory lesson, you'll learn ...more
There is no better way to amaze people than with a vanishing act. When something tangible is there and then disappears, it is bound to blow anyone's mind. Check out this tutorial for information on how to make a coin completely disappear from your hand. This trick is very eas ...more
A good first project for anyone interested in doing woodworking projects on a regular or semi-regular basis is, naturally, a wooden workbench. This carpenter's guide will help you to build a solid work table without breaking the bank in the process. For more information, inclu ...more
Google Sites makes it easy for anyone to create and manage simple, secure group websites. You can create and publish new pages with the click of a button, edit web pages like documents, and move content and pages around as you please. Information is stored securely online, and ...more
The key to repairing bad credit is to write a properly formatted letter of dispute to one or all of the credit bureaus and send them out via registered mail. Here's a step-by-step guide to writing a letter of dispute to get rid of those black marks off your credit report for g ...more
What happened to please and thank you? When did asking someone to come look at your build degenerate into COME NOW or FOLLOW or sending out teleport requests to any and all currently on the server without asking? Phillip Chan, a yahoo network contributor wrote this back in 20 ...more
In this article, I'll show you how to easily "hack" Facebook, Twitter, YouTube, and any number of similar account types with an Android app called FaceNiff. FaceNiff allows you to sniff and intercept web session profiles over the Wi-Fi that your mobile device is connected to. ...more
I want to write this article because in my childhood, I had experienced internet stalking which ultimately ended in physical stalking which then lead to several attempted abductions. I have now learned how to use the internet safely, who to communicate with and I've learned ho ...more
Pushups are a great workout. But if you think you're ready to take it to the next level, you should consider incorporating backback pushups into your workout. The added weight will give your muscles added strength and give an exciting new take on a simple exercise. scoobyswor ...more
Nexus is a pre-approved trusted traveler program that allows approved people expedited travel between Canada and the US. The card is available to US and Canadian citizens or permanent residents who travel by air or land between the two countries. Anyone traveling between the t ...more
We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job ...more
You've finally got an invite into Google+. Now what? At first glance, things can be a bit overwhelming. We've got some great tips to help you get started. 1. Fill your Circles The circles feature is the core of how Google+ lets you manage your online relationships with your ...more
Yes it’s the 21st century and yes, everyone’s busy, everyone’s connected. Accept it. Move on. Be happy. DON’T BUY INTO THE HYPE—literally and figuratively. I’m here to tell you that YOU do not need all the ‘stuff’ that bogs you down or all the unnecessary information that doe ...more
Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their c ...more
The internet is a scary place, and if you're like me, you don't want anyone tracking you or learning your search habits. It's a blatant invasion of privacy for companies to do this, but at least we have methods of fighting back—one of which is Tor. Tor stands for The Onion Ro ...more