Installing a home security system can be expensive, but it doesn't have to be. This how to video shows you some easy practices that keep your home well protected. All you need is a few inexpensive items such as flood lights, signs, and light timers.
You're sitting in front of your grandmother's Windows XP machine that has the worst infection you've ever seen. Safe mode? No dice. Restore points? They're compromised. Even worse, all of the files are hidden and none of the executables will run! This leaves her computer in a ...more
The German police have their panties in a bunch over a highly inflammatory sculpture of a urinating policewoman by artist Marcel Walldorf. Entitled "Petra", the hyperrealistic figure depicts a female officer crouched, peeing with buttocks exposed. The most chilling detail is h ...more
In this video, we learn how to install chase tail lights on a Mustang. First, you need to remove the rear trunk panel and trim piece. Next, prepare your tail light kit by following the directions that are given to you with the package. Next, cut the tail light wire. Now, put o ...more
One great thing about cars, beside the fact that it can get you from point A to point B, is the fact thatyou can customize it to fit your personality. This can be done in a variety of different ways, but one of the easiest involved the head lights. Before attempting this tutor ...more
In this how-to video, you will learn how to put back a 2 speed central gearbox in your RC vehicle. Take the time to clean your car. Remember that the shorter dog bone goes to the rear and the longer one goes to the front. Slide the dog bone in and make sure that it spins the w ...more
As you may have seen in your city or town, red light cameras are on the rise in the United States. In many instances in my area, these cameras have sprung up seemingly out of no-where, and mostly without any reason. Over use of these systems can make privacy (even on the road) ...more
Welcome to Part 3 in my series on protecting your computer from prying eyes (Part 1, Part 2). In today's segment, we will be going over drive encryption using the TrueCrypt program on Windows OS. Drive encryption is a technique that masks your data with a cryptographic functio ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to backup an ...more
Dropbox continues to make headlines with their recent programming blunder which left the accounts of its 25 million customers wide open during a four-hour time span. During the duration, anyone in the world could access any Dropbox profile by typing in any password. And seeing ...more
On June 23, 2003, Linden labs created a free client program known as Second Life. This program allows users, or residents, to interact with each other in a virtual world by using avatars. Thanks to this program, residents are able to explore, socialize, and create and trade vi ...more
In this tutorial we learn how to change and balance a car tire. First, take the tire and remove the air out of it from all the sides. After this, remove the tire from the wheel. You will need to use a pry bar to help you remove it from the tire completely. It will help out a l ...more
In this video, we learn how to replace the exhaust manifold in a Jeep Cherokee. First, take the bolts out from the collective and set aside. Next, loosen up the collector and take out the bolts that are holding the manifold on. Then, remove the manifold from the vehicle. After ...more
In this video, we learn how to use Google Maps Navigation on Motorola DROID. This is a voice-guided direction navigation system that comes already installed on your phone. When you begin, open up the program onto your phone and look through the features that show you what the ...more
In this tutorial, we learn how to straight pipe your small tractor engine. First, insert a one inch screw pipe to your exhaust, then connect pipes into it so it connects to the back of the vehicle. You will need to install several elbow pipes as well as longer straight pipes. ...more
In this tutorial, we learn how to perform a brake upgrade on a Ford Mustang. To begin, remove your lug nuts and jack up the rear of the vehicle. Next, remove the brake caliper and all bolts around it. Remove your brake pads and remove more bolts from the back as well. Now, tak ...more
In this video, we learn how to inspect and replace rear brake pads. Test your brakes out while driving to see how well your brakes perform. First, check your fluid level for your brakes inside your car and make sure it's full. Now, lift the car up and remove the tire and bolts ...more
Colleges Aren't Just for Learning Our favorite bloggers have compiled a fantastic list of the Top Ten Most Legendary College Pranks. Lots of the legendary hoaxes and wacky pranks come from the notorious Pail & Shovel Party.... And the one's that seem more like impossible feat ...more
If more privacy in your car is what you seek, you may want to consider installing a dark tint to your windows. In this tutorial, Mike Burke of Sunstoppers shows you how car tinting is done right. Mike will show you how to apply a tint just like the professionals do, so that yo ...more
For all you future RC fans out there, if you're having trouble setting the Nitro engine gear mesh up on your RC vehicle, do we have the video for you. This tutorial will give you about 8 whole minutes of how to properly set up this easy task. Although it says it is for Nitro, ...more
Changing the transmission fluid to your car is an important task that every car owner should know how to do. The transmission helps make sure that your car runs smoothly for a long time. So if you want to know how to change the tramsmission fluid to a Tremec T45 transmission, ...more
Astrum Antivirus Pro is a rogue anti-spyware application and a clone of VirusTrigger and Antivirus Trigger. Astrum Antivirus Pro is often downloaded and installed by a Trojan or through browser security holes. Astrum Antivirus Pro may generate large numbers of popup adverts. A ...more
In this video you will learn how to update your version of Windows 7 and how to check the system settings for automatic updates. In order to do this you need to go in the Start Menu and then in the Control Panel. Then you need to click System and Security. The next step is to ...more
In this video NAIT automotive instructor Darren Jones instructs you on how to . First pull over at a safe location where the traffic is less where there is a firm surface underneath the vehicle. Put the vehicle into park and apply the parking break as shown. Use the owner’s ma ...more
This video shows you how to easily remove the Security Tool virus. The first thing you have to do is restart you computer. Once restarted, immediately hold down CTRL+ALT+DEL. In the Task Manager you should see: Security Tool. Quickly end it now. The virus is temporarily disabl ...more
Watch this video to learn how to get Aircrack on your iPhone or iPod touch. You can use Aircrack on your iPhone or iPod touch to recover wireless network keys. The program runs directly on your iPhone or iPod touch device. It is installed as any other third party iPhone app, ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to boot Wind ...more
Infiniti is like no other car, it has emotion, it has soul, it inspires. There's a difference between being physically transported and emotionally moved, and you can tell them apart when you sit inside this magnificent automobile. Although the Infiniti is like a dream car, it ...more
SQL injection is a common web application attack that focuses on the database backend. WebGoat is a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons. I plan to use WebGoat for a few future videos. This first WebG ...more
If you're painting your auto yourself, you might need a little help if you've never done it before, especially when it comes to the primer sealer and apply your first base coat of paint. This video will show you how to do just that. An OEM fender was already prepped by sanding ...more
In this next tutorial, you'll find out what tools you'll need to replace the ball joints on a 1999 Ford Explorer. It's a pretty easy to follow, especially if you know anything about cars, so good luck and enjoy! 1) Remove wheel and all non essential parts (Brakes Calipers, Ro ...more
Systm is the Do It Yourself show designed for the common geek who wants to quickly and easily learn how to dive into the latest and hottest tech projects. We will help you avoid pitfalls and get your project up and running fast. Search Systm on WonderHowTo for more DIY episod ...more
A garage door opener has become an almost indispensable part of modern life. It offers an overwhelming number of convenience and safety features that will make you wonder how you lived without one for so long. On a rainy night, the last thing you want to do is climb out of you ...more
Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their c ...more
As we all know, security is a big thing here in Null Byte. We've talked quite a bit about ways to encrypt traffic and become anonymous on the internet, some of which entail using proxies, VPNs, and SSH tunnels. We've also talked about preference using SSL pages in practice for ...more
Permanently deleting files is something that a lot of people aren't aware of. Actually, most people think that once a file is deleted, it is gone forever. This is not the case. Hard drives write to the disk via magnetic charges, positive and negative correlate to 1s and 0s for ...more
Often times when staying at a hotel or anywhere for that matter, you'll whip out your laptop and check the local area for Wi-Fi. I know you've all been in my shoes when you find an unsecured network that appears to be public Wi-Fi belonging to the hotel or airport, and you con ...more
What is Internet Download Manager? Internet Download Manager (IDM) is a tool to increase download speeds by up to 10 times, resume and schedule downloads. Have you ever wanted to increase you download speed form 4kps to 80kps? If you answered yes then you need Internet Downlo ...more
Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and r ...more
In the last article, we left off with the Tor network and its hidden services. As I mentioned, Tor is not the only option in the game, and I want to offer a general introduction to I2P. For a web browsing proxy and hidden services host, Tor gets the job done well. But if you ...more
SSH is amazing, and we praise its existence on Null Byte for many reasons. Notably, it allows us to reroute our traffic through encrypted ports on our local host to be sent to its destination when on the go. You can even control your home computers remotely over a secure and e ...more
I'm sure we've all heard about MSN and Yahoo! Messenger, right? They can be useful, but the setup can be quite time consuming for those who need to use it just once or twice—and the privacy statements are a real bother. For example, we must provide our real details. You could ...more
As of today (January 18, 2012) many websites have "blacked" out their content for the day, one of the more notable websites is Wikipedia.org. As this can be a small compromise as an act of protesting against the heinous bills going through the United States' Congress. A lot of ...more
This tutorial will be based on creating a partition in Windows Seven. I have seen so many people attempt to do this themselves without guidance. Ultimately, they end up with a corrupt system. The aim of this tutorial is to make sure you don't corrupt your system. What does th ...more
Thanks to Yifan Lu, it's been discovered that the operating system running on the Kindle Touch is written mostly in HTML5 and JavaScript, unlike the previous models which used Java. This is exciting, because when a device is hacked or rooted, that means homebrew programs can b ...more
We love tearing apart security here at Null Byte. Several years back, upon returning items to Wal-Mart due to a malfunction, I noticed something very peculiar about the way their overall procedure goes. I brought the item up to the desk, and the woman asked if it didn't work, ...more
Merry Christmas all! I hope you are all having a very wonderful day! Today we will be talking about further measures you can take to secure your Windows 7 logon screen. To see my previous post on how to add a username and password to your logon screen, see here. Introductio ...more
Big name individual hackers and hacker groups everywhere in the news are getting caught and thrown in jail. Everytime I see something like this happen, I won't lie, I get a little sad. Then I wonder, how are these guys getting caught? If a group like LulzSec, with all the fame ...more
Battlefield 3 officially comes out tomorrow but people have figured out a way to play it today if you have it downloaded (digital pre-install). All you have to do is fake an ip to make it look like your timezone is ready to play. I'll try this when I get home, in the meantime: ...more
Have an HTC smartphone? Chances are that some of your stored personal data has been hijacked by malicious apps on your device. Android apps that have permission to access the Internet, which is pretty much every ad-supported app out there, can snag valuable information such as ...more
The Free Art and Technology Lab (F.A.T.) has provided three different energetic and passionate methods for voicing support for Ai Weiwei, the famous Chinese artist and activist who has been detained without known reason by the Chinese government since March 31st. First, the C ...more
Ever had your car broken into? Or worse, your apartment? Ever been pickpocketed? Handheld electronics—iPods, iPhones, iPads, GPS devices, digital cameras—are easy to snatch, light to carry, and useful to most. And when they're gone, they're gone. Until now. Thanks to develope ...more
UPDATE: Here's the latest on the optical illusion disaster waiting to happen: the "warning illusion" has been installed, and now you can now see it in action below. No car accidents have been reported yet, but it's only a matter of time... Unexpectedly, the illusion appears t ...more
This video tutorial belongs to the software category which is going to show you how to convert a Word document to a password protected PDF file with NovaPDF. Go to NovaPDF and download the program and install it. It is a paid program. Select the word document that you want to ...more
Richpin demonstrates how to remove the inner tie rod end on an automobile. First, get the car up in the air and support it by jack stands. Remove the wheel assembly. Loosen the outer tie rod end next to the steering knuckle. Loosen the jam nut. Then remove the nut that secures ...more
Preserving the environment is not only the right thing to do—it can result in significant cost savings for your business. Step 1: Educate yourself Educate yourself about the local, state, and federal environmental regulations that apply to your business. Step 2: Evaluate you ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to analyze p ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to build a f ...more
K'NEX is one of the most popular construction toys on the market, right next to Lincoln Logs and LEGOs, but what makes K'NEX stand out is the fact that children can build mechanically derived toys. Instead of blocks or little logs, kids use interconnecting plastic rods and con ...more
K'NEX is one of the most popular construction toys on the market, right next to Lincoln Logs and LEGOs, but what makes K'NEX stand out is the fact that children can build mechanically derived toys. Instead of blocks or little logs, kids use interconnecting plastic rods and con ...more