The Play Store hasn't been the most secure place for apps lately. A quick Google search for "Play Store malware" will give you a taste of some of the malicious apps that snuck their way onto Android's official app store. Google is aware of the problem and they're tying to fix ...more
Trying to figure out which music streaming service to subscribe to can be a difficult task when the playing field is so crowded. Each has its benefits, as well as downsides, so finding the right one for your needs and wants can take a lot of overwhelming research. But we've do ...more
Using a strong password is critical to the security of your online accounts. However, according to Dashlane, US users hold an average of 130 different accounts. Memorizing strong passwords for that many accounts is impractical. Fortunately, password managers solve the problem. ...more
Signal is one of the best end-to-end encrypted messengers on the market. It offers robust security, keeps minimal information about its users, and is free to use. Switching to it as your main messenger can be a bit daunting, so to help, we created a guide to walk you through t ...more
Android comprises an entire ecosystem of apps, games, functions, and features, so it would only make sense that it has its own lexicon. Words, phrases, and acronyms that didn't exist ten years ago are now used in an off-the-cuff style by developers and support technicians acro ...more
Let's say you want to download an Instagram video to your iPhone. What do you do? While Instagram doesn't offer an official solution, there are backchannel methods that exist to get the job done. However, if you want native support for downloading Instagram videos directly to ...more
There's never been a better time for streaming movies and TV shows on the go. With so many services available, the only limitation to your enjoyment is your phone's accessories. Whether you're buying for yourself or someone else, here are some of the best gifts that improve th ...more
Whether it's the new iPad Killer or not, one thing's for sure—the Motorola XOOM is hackable. Just hours after its release last week, Verizon's new Android-based tablet (running Honeycomb) was rooted by hacker Koushik Dutta, which seems easy enough. "Since it’s another Google ...more
New to Ubuntu Linux? This computer operating system could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to install GRUB 2 and apply themes on Ubuntu Linux. GNU GRUB is a multiboot boot loader. It was derived from GRUB, GRand U ...more
Taking screenshots in Windows isn't as easy as taking screengrabs in Mac OS X, but Microsoft sure is trying to resolve this issue. Their idea -- Snipping Tool. The Snipping Tool is available for both Windows Vista and Windows 7 operating systems. Snipping Tool captures a scre ...more
Windows is a mess sometimes, full of problems. And your password just might be the biggest problem of all, if you've lost it, of course. What should you do when you forget the password to login to Windows system? Ask an administrator to reset the log on password for you. If y ...more
Systm is the Do It Yourself show designed for the common geek who wants to quickly and easily learn how to dive into the latest and hottest tech projects. We will help you avoid pitfalls and get your project up and running fast. Search Systm on WonderHowTo for more DIY episod ...more
Have you ever wondered how to create an invisible folder? I mean an invisible folder, not a hidden folder. Nowadays, we are facing lots and lots of problems requiring us to keep our data safe and secure. There are millions of hackers all around the world that are trying to ste ...more
Tired of seeing all of those ads in your browser? The flashing ones make for a terrible browsing experience, and those rollover ones are just downright annoying. If you don't want to be bothered by them again, you've got a few choices, depending on what web browser you're usin ...more
You've had a massive hard disk failure.. ...in your PC or laptop and like a large number of people who think it will never happen to them...you did not have a backup of those 2000+ family pictures, those hundred of important Word documents, those family videos that you downlo ...more
System Tool. It sounds like something your Windows computer might need, but it's the exact opposite. System Tool is a computer virus masquerading as a free antivirus program. But don't be fooled, System Tool Antivirus might as well be called System Tool Virus or even System T ...more
Warnings i cant be held responsible for any illegal act done by anyone but myself and there are copyrights so notise that taken the trademarks or copyrights are strigtly prohibeted by law and will be punshied by law and i or my partners cant be held responsible for sudo camma ...more
Sometimes managing your calendar in Microsoft Outlook 2007 can be a tough job. Finding the information you need in Microsoft Office can be more than a chore, even when it comes to menial tasks, like adding a holiday to your calendar. But don't worry. There's an easier solution ...more
Twitter has consumed the world, so make sure you're up to date on your Tweets. One way to do that is with Gwibber 2.0 on Ubuntu Linux, the computer operating system that could be a bit tricky for beginners, but fret not, help is here. Check out this video tutorial on how to re ...more
This video shows you how to effectively print a Photoshop image to a desktop printer. You learn how to manage settings and options for both Photoshop and the printer. Check out this tutorial created by Chris Orwig now! Print photos from Photoshop CS3. Click through to watch th ...more
In this how-to video, you will learn how to set up Windows 7 that system alerts will come up as images rather than sounds. First, go to start, control panel, and click on ease of access. Next, at the top of the window, click replace sounds with visual keys. Check the box that ...more
This video shows you how to upload, encode and organize assets in the console. We have a new, faster and easier way for you to encode and upload content into Brightcove. It's a free desktop application called the Publishpod. If you have a small batch of files you need to uploa ...more
In this how to video, you will learn how get VMWare Fusion on your Mac. This will allow you to install Windows and run them on the same computer. First, go to the mediafire page and download the files. Next, download and install Unarchiver to join the files together and extrac ...more
Wouldn't it be nice to just sit at your buddy's house, plug into his network, and see exactly what he's doing? What if it was as easy as that? What makes packet sniffers like Wireshark such potent tools is that a majority of local area networks (LANs) are based on the shared E ...more
Download the software from Imgburn. Choose mode, build, advanced, bootable disk. Go to allbootdisk to get a bootable image of your operating system. Choose from Windows 95 through Vista. Download the diskette image. Name and save to desktop. Choose volume and label. Click ok. ...more
In this video tutorial, viewers learn how to light-scribe with a Nimbie BB11 disc burner. This device is an auto disc loading system that allows the user to light-scribe multiple disc without manually inserting them one-by-one. Simply load the disc into the machine with the la ...more
This video will show viewers how to make an icon for a computer program on a Windows operating system. In order to perform this, you will need two programs, IcoFX and GIMP. First, open GIMP and create the icon which you would like to use by drawing it on the program. Make sure ...more
The video shows you how it is possible to be running windows and mac in parallel. Both operating systems, mac and windows, are installed in the computer and the video shows us how one can flip back-and-forth between operating systems. First the video shows us the desktop for m ...more
This video demonstrates how one might be able to successfully create an Ubuntu Bootable CD-ROM. The procedure described involves downloading the Ubuntu Desktop Edition Operating System image off the Ubuntu web site. In order to successfully create a usable disc, one needs to b ...more
Remember what life was like before your iPhone? Before there were palm-sized smartphones with seemingly endless features, there were phones like Motorola's RAZR that peaked with its embedded camera. Before that, there were simple flip phones with texting capabilities, bulky tw ...more
Connecting your new smartphone gadget to your desktop isn't just connecting these products with a USB cord. It is important to sync them to allow the transfer of data from your smartphone to your computer and vice-versa. This is desired if you wish to transfer information incl ...more
GRUB, or the GRand Unified Bootloader, is a program that installs to your Master Boot Record and controls what operating system you load at boot time. Normally, it is used for multi-boot systems. Multi-boots allow you to switch between operating systems installed on seperate d ...more
USE WINDOWS 7 ULTIMATE x64 w/ all the latest updates always OF COURSE AND... USE THE ASTON 2 SHELL REPLACEMENT, MENU, DESKTOP, W/ THEMES... USE EASEUS DATA RECOVERY WIZARD V5+... USE FROSTWIRE P2P FILE SHARING CLIENT... USE INCREDIMAIL 2 (LATEST)... USE SAFARI (ONE OF THE ...more
This video describes basics about using Wubi installer for Ubuntu in Windows operating system.Wubi installer is usually used for Ubuntu family distribution installations.You can download Wubi installer from the Internet and then it will install all desired distribution automat ...more
In this Know Your PC video the instructors show how to perform a recovery on your computer by demonstrating it on the HP TouchSmart PC. This recovery process will work on any HP desktops, HP Pavilions, Compaq Presarios. Your PC might get corrupted if you recently made any chan ...more
Pull off this easy prank, and – without causing any permanent damage – watch your coworker squirm with frustration. You Will Need * Access to a coworker's computer * A phony desktop graphic * A flash drive Step 1: Create a phony desktop Create a few on your desktop and give t ...more
Pygame! And what you can accomplish with it. Another python article... (Blame Alex for getting me hooked on yet another coding language...) This little article will cover "Pygame", the set of modules that were designed with game developers in mind. Specifically ones who code ...more
This is Part II in the Lockdown: The InfoSecurity Guide To Securing Your Computer series. Before beginning, check out Part I. This article will cover using alternate software to increase your security and will provide you with some information about websites and programs that ...more
As many of you Null Byters may know, I was planning on writing this article a week or two ago. Better late than never! So, let's get right to it then—choosing the right Linux distro for your needs. First off, you need a base for your search. Picking a Base Right now, there ...more
Your best friend's on Yahoo!, your daughter's on AIM, and now your co-worker wants to connect with you over Windows Live. Before you know it, your desktop is overflowing with buddy lists and message windows. Mismatched alert sounds are dinging and buzzing incessantly. Your com ...more
Flash video. It's what all smartphone users have been waiting for. Why has it taken sooo long? And why is Apple still resistant? Here's the scoop, via Wired: "Adobe is releasing Flash Player 10.1 for mobile phones and desktops today. And it is piggy-backing on Google’s fast ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week has been an exciting one. The com ...more
Skyrim really took the cake this year. With its awe-inspiring gameplay, much improved combat and leveling system, and a fresh new look, it's no wonder the game has already received a Game of the Year award. But for hardcore gamers, the fun may be over. You've played the game f ...more
A lot of different places have computers with controls on them for several things; some have controls for installing software, some for running software, blocking websites, opening certain file formats, etc. Obviously, not all places use the same methods, and not all of the m ...more
If you have made the switch from Windows to Linux, I want to congratulate you in advance. I'm sure you have noticed a huge performance increase when using Linux over other operating systems. This is only half the battle, though! Most users who are new to Linux end up using Ubu ...more
Over the past few years, I have downloaded several third-party web browsers for the iPhone, iPod touch and iPad, and the one I have found most advanced and feature rich is Atomic Web. While many mobile browsers have their unique features, Atomic Web could well be considered th ...more
Thanks Anonymous User For This Article, Not Bad Ok SoftzZz...!.!.!.: Step 1 Antivirus The best freeware antivirus is AVG Anti-Virus Free Edition 2011, and you can get him from this site. Step 2 Optimizing tool For me CCleaner is the easiest way to do some things, like: 1. ...more
This German video is amazing. A joyously analog interpretation and deconstruction of the digital gaming experience. Malte Jehmlich is as primitive and inspiring as the the Vanuatu natives who devoted themselves to cargo worship after World War II! Try to imagine. It's 2010 an ...more
Kick Ass Review Part 3: Conclusions [Spoiler Alert! Plot points are discussed from the movie and comic in this section!] Big Daddy as a selectable character presents problems for the story in the game. In the movie and in the comic, Bid Daddy dies. As a playable character th ...more
I have an absolutely wonderful time making projects and writing articles for all of you mad scientists! Today, I will bring you behind the scenes for a look at the workbench, tools, and software that make the Mad Science World possible. Above is my beautiful workbench! My who ...more
You're sitting in front of your grandmother's Windows XP machine that has the worst infection you've ever seen. Safe mode? No dice. Restore points? They're compromised. Even worse, all of the files are hidden and none of the executables will run! This leaves her computer in a ...more
When your computer first connects to a nework, it sends out a request on the network to lease an IP from the router. The router then leases your computer an unused IP address, which is used as a unique routing address for sending traffic that is meant for you, to you. As every ...more
Backing up your files is a requirement in today's world of tech. In an instant, your storage device can fail. This is an unacceptable situation that should never happen to anyone. Storage is cheap, and backups are easier than ever to perform. Most of the time, this can be comp ...more
No doubt you've seen some of the hack logs being released. One part that stands out over and over again is the heavy database usage. It used to be early on that virus and hackers would destroy data, usually just for lulz. However, with the explosive commercial growth of the In ...more
In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and m ...more
Today's post is a small go-to guide for beginner programmers in Null Byte. With many of our community members picking up programming from our Community Bytes, it only makes sense to lay out a one-stop guide for your reference. Hopefully this guide will help you make an educate ...more
It may not be your number one spot for finding cool apps for your Android device, but the Amazon Appstore for Android is running a new promotion this week called "Geek Week," where eight of the most popular productivity and utility apps are now on sale for 48 percent off or mo ...more
Okay, stop me if you've heard this one. You have a document that you want your co-workers' advice on. You attach said document onto a mass email. The first reply comes back with an edited version of the document. You begin to make changes, but another email comes in, with yet ...more
Making your own circuit boards can be a daunting challenge. You have to design a schematic, test it on a breadboard, design the board layout, and then after all of that, you still have to print and etch a board! Luckily, we have Fritzing. Fritzing is a free open-source PCB d ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more