With give or take 250 million cars in America, odds are most city dwellers waste time hunting for parking spots. And while a smartphone app can't make free parking spots magically appear, it can aid in the searching process. The Parker app isn't new to the iPhone, but its fou ...more
Yale University has opened up its museum archives to the public in digital form, providing free online access to high-resolution images from its cultural collections, making it the first Ivy League school to do so in this fashion. Currently, there's over 250,000 "open access" ...more
These are the KGB Agent Guidelines as taken from 542542.com/guidelines. kgb Guidelines The Ten Principles of kgb’s 542542 text answering service We are in the answer business because we believe in the value of building a collaborative knowledge community where every member ...more
Type: Digital and traditional photography Theme: Wildlife Categories: Special Award Category: Veolia Environnement Young Wildlife Photographer of the Year Three age categories: 10 years and under 11-14 years 15-17 years Deadline: March 18, 2011 Eligibility: Internation ...more
Type: Digital and traditional photography Theme: Wildlife Categories: Animals in their Environment Behaviour: Birds Behaviour: Mammals Behaviour: All Other Animals Underwater World Animal Portraits In Praise of Plants and Fungi Urban Wildlife Nature in Black and White Creat ...more
Sometimes you come across problems and glitches when you're playing FarmVille, FrontierVille, any of your facebook games, or even just using the internet for ordinary purposes! It might just be getting really slow, or you might start losing data or in-game items. As the Zynga ...more
Tom Green shows how to make your life easier using these Fireworks productivity tips. This tutorial includes things like sharing layers between pages and creating dummy text. For more Adobe software tutorials from Layers Magazine, search Layers Magazine on WonderHowTo. Wonder ...more
Starting up a website can be daunting if you know nothing about web design or setup, but there are some tips to get the right people finding, looking, and returning to your site. A good landing page gives visitors exactly what they are looking for, and converts them from brows ...more
There's a new way to shop, and it's called your phone! On an Android mobile device, there'a handy shopping application called Shop Savvy, found in the Google Marketplace. Okay, so you can't actually buy things with it, but you can scan barcodes of products to get more informat ...more
1. Open the web browser and type www.facebook.com and press enter. 2. In order to be a member you will have to first sign up as a facebook member. a) Fill in the necessary detail such as the required username, password, date of birth, email id etc. 3. After signing up you w ...more
First of all you need to have a DVD. Now insert your DVD into your system. Now open your torrent movie from your folder. Click ‘ok’ for the DVD. Now you also need a 'Xilisoft DVD creator'. Search in the ‘Google’ to download it to your computer. It shall only take around ten mi ...more
... Describing the style of John Bonham's drumming instantly conjurs up visions of the thunderous power he created. His contributions to rock music were revolutionary, and his talent unmatch ...more
The video is about how to change the IP address. MAC address is the unique identifier a site of the most network adapters. MAC address is used to determine what IP address the computer will have and one way to change the IP address is by changing the MAC address. The method is ...more
There's a great new web game called Epic Duel out on the internet, and everybody's playing it, but not everybody's hacking it, except you! Outshine them all with this EpicDuel cheat with Cheat Engine 5.5. Learn from this video cheat: how to hack EpicDuel for money (12/31/09). ...more
Eagle Lake Woodworking, hosted by John Nixon, offers great do-it-yourself guides for building your own furniture, especially in the American Arts and Crafts style, and turning your garage into an amateur woodshop. Search Eagle Lake on WonderHowTo for more carpentry tutorial vi ...more
If you have any problems you can email me or visit my website at www.gapto.webs.com!!! This video shows you how to hack into Restaurant City using Cheat Engine and Restaurant Tools v5. Restaurant City is a Facebook game that allows you to create your own restaurant. Descrip ...more
Bejeweled 2 is a famous web-based free game. Bejewel 2 Deluxe is not free and is available for PC, Xbox 360, Apple's iPod and iPhone, PlayStation 2, smartphones, and Macs. Learn how to hack Bejeweled with tricks, cheats, hacks. This video tutorial will show you how to unlock a ...more
Bejeweled 2 is a famous web-based free game. Bejewel 2 Deluxe is not free and is available for PC, Xbox 360, Apple's iPod and iPhone, PlayStation 2, smartphones, and Macs. Learn how to hack Bejeweled with tricks, cheats, hacks. This video tutorial will show you how to change p ...more
Hey, hackers! Now that you've hacked/owned your first "box" in my last article, let's look a little closer at another great feature of Metasploit, the Meterpreter, and then let’s move on to hacking a Linux system and using the Meterpreter to control and own it. Why Meterprete ...more
Oh yeah, this is a big topic, at-least for me. All the frequent flyers will/should be interested in this topic. I'm sure all of you have heard at-least something about the TSA, and most of it should have been bad. Complaints, lawsuits and general disgust surround this organiza ...more
How many of you know all the amendments of the Constitution? Do you even know how many there are?? Well, many of the people I speak to don't. And let me tell you, that's a bad thing. Knowing even the basics of the Amendments can have a profound effect in your lives. Ever got p ...more
Today's digital cameras record not only the images themselves, but also the metadata behind the scenes, like camera settings, location, date, time, etc. But there's a lot more to say about a photograph. What's the subject? Is it night or day? Outside or inside? Person, place o ...more
Business owners and marketeers are diverting from traditional marketing techniques, including billboards, radio and TV advertising, brochures, and any other outdoor promotions, to cheaper but effective Internet marketing strategies. Under the new arrangement, business owners r ...more
If you live in an urban environment, chances are that you've seen this: It's a program started by the FBI to prevent terrorism and general thievery in peaceful and innocent communities all around America. I myself have seen a lot of these, and my previous apartment community ...more
For any of you not in the loop, last week marked our first ever WTFoto Challenge. The goal was to find the craziest, most absurd stock photo on the web we've never seen before. There were a lot of WTF images submitted to our community corkboard, and now it's time to announce t ...more
I recently posted a link to what seemed to be a very useful guide on Lifehacker for creating a TOR button in Chrome. However, when I tried it myself, it did not work. Also, it lacked a warning on the limits of Tor, which I think are important. Therefore, I decided to create an ...more
Your first, very basic web crawler. Hello again. Today I will show you how to code a web crawler, and only use up 12 lines of code (excluding whitespaces and comments). Requirements Python A website with lot's of links! Layout the logic. OK, as far as crawlers (web spider ...more
Watch out Instagram, there's a new free, sociable photography filter app that hit the iTunes App Store recently, and it just might be some good competition. It's called PicYou and might sound familiar to some of you photo sharing fiends out there. That's because it's been a su ...more
As we all know, security is a big thing here in Null Byte. We've talked quite a bit about ways to encrypt traffic and become anonymous on the internet, some of which entail using proxies, VPNs, and SSH tunnels. We've also talked about preference using SSL pages in practice for ...more
There are a lot of things on your computer that can reveal information about you when you are surfing the Internet. If you are like me, then you will do anything to maintain your privacy and prevent those little leaks of information from happening. Here's a list of a few of th ...more
Our mission for this week's Community Byte was to create a Python program to crack web-based passwords, like the ones you would see on an email or router login. I wanted it to be universal in the sense that it could be easily modified and adapted to another website just by cha ...more
"Google+ is dead." How many times have you read that in the past few weeks? It seems like I can't get away from this notion that Google+, as a social network, is a total failure. Don't feel too sorry for them, though. +Bradley Horowitz isn't worried. In an interview with Ventu ...more
It’s been a pretty big week for Google, and Google+ itself. There were a number of articles proclaiming the end of Google+, because allegedly traffic dropped over 60% after it opened to the public. Then +Steve Yegge accidentally posted a long rant on Google+ itself, which was ...more
Often times when staying at a hotel or anywhere for that matter, you'll whip out your laptop and check the local area for Wi-Fi. I know you've all been in my shoes when you find an unsecured network that appears to be public Wi-Fi belonging to the hotel or airport, and you con ...more
Public Radio Exchange (PRX) has teamed up with music intelligence company The Echo Nest to bring us music lovers Bandito, an easy way to find out what's going on with our favorite artists. Their new mobile app uses the existing iTunes library on your iPad, iPhone or iPod touch ...more
Exploring a new city is tough if you're all by your lonesome. But if you have your iPhone on you, you're not alone at all... there's tons of great apps available for discovering the city around you. We've previously featured an app that helps you decide on what bar or club to ...more
Have you ever heard symmetrical is sexier? Yep, according to scientists, symmetry is inherently more attractive to the Homo Sapien eye. Back in the days of Helen of Troy, Phidias, Plato and other great philosophers all observed the golden ratio, "a sum where the quantities to ...more
Disk space is a valuable commodity on your PC, and if you're running low, it's time to sell some of that unneeded property! This video shows you the steps to freeing up space on the hard drive of your Windows XP or Vista computer. There are many areas in Windows from which you ...more
With the Kodak Zi8, the power to capture razor-sharp, full 1080p HD video fits in the palm of your hand. Its easy, one-touch operation and incredible versatility make it the perfect camera for beginners, experts, and everyone in between. Step 1: Get started Get started in a s ...more
So you want to learn the basics of the fantastic language Java, but you don't want to search the Inter-webs looking for a great tutorial. Well you came to the right place, now may I present to you JAVA. Before We Begin You must have the latest version of Java Development Kit ...more
In my Wireshark article, we talked a little bit about packet sniffing, but we focused more on the underlying protocols and models. Now, I'd like to dive right back into Wireshark and start stealing packets. The filtering capabilities here are very comprehensive. You can filte ...more
People sometimes ask me about the IT industry here in the states. These folks are usually either trying to get into a certain field, or looking to switch or move into another one. Right now, you may currently be a Computer Science major that will be graduating shortly and are ...more
There are so many hackers around these days, and they are becoming very smart. So smart that they have successfully taken down many government websites. The most recent attack was on the Department of Justice (DOJ). To read about the history of these hackers, check out Wikiped ...more
This week's 6-part series on Making Art on Your iOS Device comes to a close today with our last segment: a collection of useful apps for touring museums, galleries and street art. The apps below cover some of the world's greatest art meccas, so read on if you're planning an up ...more
Now that you can invite anyone you want to Google+, the floodgates are open. If you've been bummed out about not being able to share the joys of Google+ with your friends and acquaintances, make use of that handy envelope icon the right side of your stream page. Just enter the ...more
Real-time strategy (RTS) was the most popular genre in PC games at one time. It put Blizzard on the map—one of the biggest game developers in the world. And it buried the once venerable turn-based strategy genre, the only survivor being the Civilization series. But like hair m ...more
Sputnik was the very first man-made object to be sent into space. Though it was a truly epic accomplishment, all this Soviet sky surfer actually did was transmit a constant beeping noise back to the surface. Your young students can learn about the history of space travel whil ...more
Paying for web hosting isn't ideal in most situations. If you have your own website, hosting it yourself is very acceptable and easy to do, assuming your internet bandwidth permits. Most people want to run a personal site, nothing crazy, so hosting from home on low-bandwidth i ...more
Cross-Site Request Forgery (CSRF, pronounce "sea-surf") is a common web exploit. However, for unknown reasons it's not used very often. It plays on a given website's trust in a web browser by executing another website's form action, for example, sending money to another person ...more
XSS stands for cross-site scripting, which is a form of web-based exploitation that uses client-side vulnerabilities in a web page to execute malicious JavaScript codes. JavaScript is referred to as "cross-site" because it usually involves an external website containing the ma ...more
Welcome to the second Null Byte in a series educating you on Social Engineering awareness and techniques. Today, I'm going to show you how a saavy Social Engineer would trick a friend into unknowingly surrendering their Facebook password. My intent is to warn and demonstrate h ...more
Last week, we discussed whether Google should require you to use your real name for Google+ profiles. Google is working on eliminating fake profiles, and in the process, they've booted some real people, including actor +William Shatner. If you find out that your Google+ accoun ...more
As Google+ is still in its Limited Field Trial phase, joining can feel quite lonely. You can't exactly get all your friends and family in during the brief periods when the invitation system opens up. You can, however, add several interesting people to your "Following" Circle t ...more
Video games consoles have long wanted to be more than just consoles. Nintendo Japan called the NES the Famicom because they wanted to make it the sole family computer. Obviously that didn't work out, and most efforts to make consoles into all-in-one entertainment systems have ...more
Insecticides are widespread products which are used daily in our lives. Organophosphorus is the main compound in these products and has toxic effects on our health that may be fatal in some cases. Insecticides affect mainly the synapses of the nerve cells in our central nerv ...more
HOME AWARDS HISTORY HELP FORUM ...LET'S EVALUATE A Few Of The Best One's... 1> XTREME MOVIE MANAGER V7+ AKA (XXM)< http://www.binaryworks.it/extrememoviemanager/ > PLUSES+ ~~~~~~~ *+ CHEAP PRICE *+ IT HAS MANY OPTIONS!... *+ NICE SELECTION OF INTERFACE THEMES! MINUSES- ~~ ...more
In the first part of this series, we took a factual and technical look at the history of the Internet. I explained how all of these wires and servers got here in the first place. Obviously, a firm did not just create and build the Internet around 1995! Now that we know how the ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more
This morning, I received a message from a friend who was reading a hack log, and she had some questions about the commands used. This got me thinking, as Linux has a ton of commands and some can be archaic, yet useful. We are going to go over everything you need to know to rea ...more
We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no ne ...more