Children under the age of 13 possess insight that can blow the minds of their elders, but not the wherewithal to make important life choices for themselves. This is exactly why there are strict rules against marketing cigarettes to them. In 2000, a law went into effect called ...more
It's been a long time coming, but Microsoft has finally released a software development kit (SDK) for the Kinect on Windows 7 PCs. The word "hacking" is no longer needed, thanks to the free beta download available at Microsoft Research that allows anyone with a Windows compute ...more
In this tutorial, we learn how to start a Twitter account. First, go to Twitter, then click on 'get started'. From here, fill in the blanks and hit 'create account'. After this, you can scan your e-mail contact list to see if anyone you know is on Twitter. Now you can personal ...more
I'm particularly interested in his point about 3D being darker. I saw Avatar in 3D with 2 different projection systems: RealD 3D and 3D at the Arclight Dome. Both times, throughout the film, I snuck a peak over my glasses and saw the colors and exposure at the saturation and b ...more
You could read through Facebooks Privacy Guide, but I found it a little confusing and a lot of people have been asking me for specific settings. SO here are some screenshots of the privacy settings so you can find where everything is located really easily! Click privacy setti ...more
Windows Live SkyDrive which is initially termed as Windows live folders is one of the parts of Microsoft Windows online service. It is a password protected service that allow users to store file and share them with others. Here the windows live id is required to access the use ...more
Facebook is one of the most popular Social Networking Sites around. Watch as this video shows you how to make your very own Facebook page so you will be included in one of the biggest things around! First, you want to sign up for an account. "Its free and anyone can join" is t ...more
This video will show you how you can easily find out what your IP address is for a computer which is running the Windows XP operating system. You will first need to go to the start bar and click on the button which says "Run". Choose to run a program called "cmd" by typing thi ...more
This video is a quick and easy guide on how to unlock the Ghost achievement in Call of Duty: Modern Warfare 2 in the Cliffhanger mission. If your goal is to get this achievement, it's recommended that you play the level on Recruit to make it harder to be detected. Remember: St ...more
Call of Duty 4: Modern Warfare 2 is considered one of the best first person shooters of all time. Released for the Xbox360, Playstation 3, and PC, Modern Warfare 2 provides an excellent gaming experience for action lovers. Whether you are new to the game or have completed it o ...more
A PDF file is a great way to share your documents with anyone. Both Macs and PCs can read them and it's very easy to create them in Mac OS X. From any application that you can print from, go to File–Print–which will open up the print dialogue box–and find the PDF button in the ...more
Accounting and Finance Degree Are really a person one of all those folks who dread going to university? It's ok in case you are. In any case, I take into account it's important to keep throughout mind just how a lot University lifetime has developed over time just within the ...more
Dealing With Stress My senior thesis project is going to be about stress. I want to learn how to educate others (my peers) throughout a web site about stress, what it is, how serious it is and how to deal with it. I will create a Wonder How To account where I am going to upda ...more
After the media outcry of Google Buzz's privacy issues, Google has set its goals on making the privacy parameters of Google+ simple to learn and as explicitly manageable as possible. No small feat. The approach has been to make the process of organizing your friends, contacts ...more
We're officially seeking Null Byters interested in teaching others! Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowle ...more
Anonymity is very important to many internet users. By having your "e-identity" exposed online, you can be stuck with a number of unwanted issues, such as: Privacy invasion. Internet tracking. Exposure to being hacked. However, what if we wanted to spend money anonymously? T ...more
Your IP (Internet Protocol) address is your unique ID on the internet. It's synonymous with your home address. Anyone in the world can contact your computer through its IP address, and send a retrieve information with it. I'm sure at one time or another you've heard that hack ...more
For a long time, video games manuals were serious business. Especially for strategy games and RPGs on the PC, the manuals would often run to a hundred or more full-color pages in length. They explained in vivid and well-written detail the history of the game world and every fa ...more
Do you know how you are perceived by your peers? In real life and online? In the physical world, you could be seen as intelligent, thoughtful and hard-working, but on the Web you could be looked at as irrational, selfish and slothful. There's just something about the Internet ...more
You've had a hard day at work and need to get out of the house, have a few drinks, but you don't want to go just anywhere—you want the right crowd and the right bar. For those nights, barhopping just isn't the answer, it's SceneTap. It's a new free mobile application coming s ...more
Do you ever wonder if the files you're trashing on your Mac are actually trash? Let's say there are 80 million computer owners running Mac OS. If each user trashes at least 10 files each day, that's 800 million deleted files that cease to exist every 24 hours. If that doesn't ...more
By now, you probably know that your iPhone secretly tracks and stores the locations you've visited in a backup folder on your computer's hard drive. The files are unencrypted, which means anyone with access to your computer or device can retrieve the information, which is down ...more
April is poetry month! During April Planet Poem will host the first Planet Poem poetry competition. People will be able to post two poems to our world. Two groups of four students will vote on the winner. The grand prize winner will win a French Beret! People are able to subm ...more
Brainwashing is something that happens to us every day, whether you believe it or not. It doesn't take fancy tools or space-age technology. Even if our country didn't intentionally brainwash people (believe me, they do), our country's media is brainwashing people nonstop. Just ...more
If you've read Alex Long's last two articles in this series (Part 1 and Part 2), you know by now that making money rarely is risk free, and generally plays out to be a high risk-high gain/loss scenario. The best way to make money is to have money, so for this article, lets ass ...more
This weekend, hackers broke into the servers of the popular shoe shopping site Zappos, giving them access to the personal information of 24 million Zappos customers. The user data taken included names, email addresses, billing and shipping addresses, phone numbers, the last fo ...more
Facebook's new Timeline feature has been rolling out gradually since its unveiling in September, but yesterday it finally became available to Facebookers everywhere. It's even available on your mobile device, too. Those who want to upgrade to the radical new profile design can ...more
Since today (11/11/11) is the last 6 digit binary date this century, I thought we should look at some kinetic binary calculators. Matthias Wandel built a beautiful 6 digit binary computer out of wood. If you want to build one, he even gives you some more information and instr ...more
It's a question I've been pondering a lot lately. Technically, children under the age of 13 are not allowed to join Facebook. But according to a Consumer Reports in May, 7.5 million children 12 and younger are already on the site. Currently, federal law prohibits websites from ...more
This Null Byte is the first part in a mini-series on the art of Social Engineering. I will be teaching you how to effectively defend yourself against it. What is Social Engineering? Social Engineering is the art of hacking humans. It's when a person is manipulated into doing ...more
Security awareness seems to be a hot topic these days on the web, with developers making apps and devices that can hack networks and machines with just a few clicks. But these applications aren't only exploiting security flaws in systems and networks, they're being used by ama ...more
Introduction PostgreSQL is a very popular Open-Source database management system. It competes heavily with many proprietary and commercial database management systems. More information on what it is and it's history can be found here and here. This article is intended to get ...more
This class is not only about learning the tools, but having ideas to actually create with the tools. Anyone can learn After Effects but not everyone can express themselves with this tool. Hopefully by the end of the semester will not only your toolset be larger, but your min ...more
I recommend you take a look into this issue and suggest that your friends delete their association with Gamers Unite and any other cheat providing site. This post is meant only as my advice for how to remove Gamers Unite or any other spammy app. This is all based on my persona ...more
Il Duomo's Secret: Super simple. The entrance is on the north end of the Basilica Santa Maria del Fiore. It's on street level, and really anyone could open it but only you're smart enough. In the first hall, wall run up the throne-looking object to the left of the main door a ...more
Play Along: At the start of the mission, you simply need to follow the leader through the city. Do your best not to bump into anyone, as Ezio will drop the chest if you do. Eventually, you read the end of the trail and a cut scene takes over. Now the mission gets serious. You ...more
Learn how to go, stop, and control your speed on the ski slopes with this guide to learning the first skills for snowplough. This is a step by step guide to help you learn to ski. Notice I said help... when you first try skiing you should have an instructor there with you. Yo ...more
Warnings i cant be held responsible for any illegal act done by anyone but myself and there are copyrights so notise that taken the trademarks or copyrights are strigtly prohibeted by law and will be punshied by law and i or my partners cant be held responsible for sudo camma ...more
internet marketing strategy How To Videos Store Rapid Fire Gallery Patterns FAQ Aug15 Custom Paint Your Controller – Check out our latest video on How To Paint a Patriotic Controller! Controllers, General, Painting, VideosNo Comments » I just finished last week the newest ...more
Since the invention of the printing press, books have been a dominant and iconic paradigm in our culture and throughout the world. During my years in elementary and high school, the digital world was on the rise sparking the conversation: Are Books Obsolete. Over the last year ...more
Who hasn't gone mad trying to fix his/her computer, trying to delete all of the harmful software? It may not be funny with a real virus, but a fake one is. Or course, you can make a simple virus just with Notepad. There's no need to download applications to fool others; in les ...more
Injection is an attack vector that involves breaking out of a data context and switching into a programming context through the use of special characters. These characters are significant to the interpreter being used, but not needed for the general user input being asked for. ...more
If you follow the Anonymous, Occupy, and IT security scenes, you have no doubt heard about a dox release. What is it? How can it hurt you? And most importantly, how can you protect yourself from it? Some of these steps might seem common sense, while others will be an ah-ha! mo ...more
US can legally kill Americans in terror groups You read it right. The US can now target Americans who are supposedly part of terrorist groups. Here's my analysis of Attorney General Eric Holder points (keep in mind though, these are point's brought up by MSNBC, original artic ...more
Since the internet is becoming more and more important all the time in regards to overall marketing plans for many companies, it’s imperative that the company website be up to the task of attracting visitors and converting them into customers. There are many methods and techni ...more
Here's a delicious Byte of information for you. A proof of concept program on Linux was coded to exploit a known bug in how the Linux Kernel (versions 2.6.39+) handles permissions for the /proc/pid/mem directory. /proc/pid/mem is an interface for reading and writing directly t ...more
I can't say it's absolutely true, but when it comes to mobile word gaming, there's Scrabble people and then there's Words with Friends people. It feels segregational. Rarely does one play both. At least, that's what I see when it comes to my family and friends. Everyone who l ...more
Social networks like Facebook and Google+ are great for staying connected with family, friends and coworkers—even fans. But sharing and communicating with practically anyone in the digital realm has alienated us from most of the flesh-and-blood beings we see everyday—our neigh ...more
The manual that's included with the Canon EOS 5D Mark II is a great starting point for learning the camera, but it's definitely not the only place you should be getting your information from if you intend to master your 5D Mark II. If you don't have the manual, you can downloa ...more
I have been wanting to share this great menubar app for a long time now (2+ years), but I really didn't know where. Just looking at Mac How-To World made me think to post it here. On to the app! You Control: Tunes is a freeware application that allows you complete control ove ...more
On Thursday, March 9, there was a news story on the evening news about Khan Academy (NBC News). The story began when Sal Khan started tutoring his cousin in 2004. Since he was in Boston and she was in a different city, he decided to make and post videos on YouTube so anyone co ...more
Do plants wilt at the sight of you? With these tips, anyone can keep a houseplant alive, even you! You Will Need * A plant * Knowledge of its native environment * Water * Fertilizer * A soothing voice or a radio Step 1 Pick a plant that’s tough to kill. Hardy varieties includ ...more
Learn how to follow proper netiquette rules. You may be a model of decorum in person, but a bonehead online. Check out how much you know about Internet manners. Step 1. Be clear Be clear in your e-mails and text messages. Don’t include acronyms unless you’re sure the recipie ...more
Over the past couple of weeks, there have been a series of high-profile hacks and leaks. From the rooting of CombinedSystems, to a secret FBI conference call leak, all the way to the distributed denial-of-service (DDoS) attacks on U.S. government sites—with a lot in-between. A ...more
Last time, we looked at archaic cryptography, so you should have a basic understanding of some of the concepts and terminology you'll need. Now, we'll discuss one of the most important advances in computer security in the 20th century—public key cryptography. What Is Public K ...more
With the purchase of my latest computer, installing Linux turned into a nightmare from Hell. The graphics drivers are probably the biggest issue that anyone with a newer computer will run into when installing Linux. AMD and NVIDIA are the dominant ones on the market, both of w ...more
We've all seen the breathtaking, colorful photos of the Eagle, Egg and Cat's Eye Nebulae. You may not recognize them by name, but you've seen them, whether in astronomy textbooks, magazines, websites, album covers, or tee shirts. They are some of the most striking photographs ...more
Now that it's been a week since Google+ rolled out pages, we've gotten over our euphoria at finally getting the feature after a long wait, and reality is starting to sink it. It's not as flexible as a Facebook page, it seems to be time consuming, and you can't even get a uniqu ...more
The game has undergone many transitions over the years, since its days as LEXIKO (1931) to its briefness as CRISS CROSS WORDS to its current and amalgamated, renowned brand of SCRABBLE. There has been many editions of the word board game along that historic metamorphosis, and ...more
Microsoft SharePoint is a business management system introduced by MICROSOFT. It has many build in functions to work in web based environment easily. Microsoft SharePoint 2010 is released on April 17, 2010. It is introduced with the promise of better performance than its prede ...more