Company's Items Search Results

How To: Disassemble, lubricate, and reassemble a Rubik's Clock

The Rubik's company has a veritable cornucopia of Rubik's cubes and similar puzzles. This is a tutorial video series which will show you how to lubricate a Rubik's Clock. It's important to BE VERY CAREFUL while breaking the glue. It is very easy to cut yourself while doing this. Also, once you open your clock it will be obvious that you have done so, so keep that in mind if you intend to sell your clock.

How To: Install MySQL on Windows 2003

MySQL is a multithreaded, multi-user SQL database management system which has over 10 million installations. It runs as a server providing multi-user access to databases. It is by far the most popular and common database used in web applications throughout the world, and almost all hosting companies provide it free of charge to their users. MySQL AB makes MySQL Server available as free software under the GNU General Public License (GPL). For this tutorial we are going to download and install ...

How To: Easily View & Delete Music That's Taking Up Storage Space on Your iPhone

Apple's two iCloud storage plans have made it easier than ever to free up space on your iPhone to take more pictures, play more mobile games, and download more music. The plan prices range from $0.99 to $9.99, which isn't bad, but not everyone wants to pay for storage. So deleting items becomes a great option to free up storage — especially music and music videos.

Market Reality: Google Updates ARCore & Cuts Glass, Star Wars AR in Japan, & Hands-On Magic Leap for Fashion & Voice

After facing reports of financial troubles over the past month, Magic Leap came out swinging this week with a big push for the enterprise segment of AR, including a repackaged Magic Leap 1, a suite of enterprise apps, and updates to Lumin OS and its supporting development ecosystem. Oh, and its AR headset managed to win a starring role in the marketing juggernaut for the forthcoming Star Wars movie.

How To: Check Your MacOS Computer for Malware & Keyloggers

While you might suspect your MacOS computer has been infected with malware, it can be difficult to know for sure. One way to spot malicious programs is to look for suspicious behavior — like programs listening in on our keyboard input or launching themselves every time we boot. Thanks to free MacOS tools called ReiKey and KnockKnock, we can detect suspicious programs to discover keyloggers and other persistent malware lurking on our system.

News: 15 Awesome 'Reminders' Features in iOS 13 That'll Make You Actually Want to Use the App

While the Reminders app has been largely ignored by Apple for years, iOS 13 finally makes it a force to be reckoned with. The app has been completely redesigned with easier navigation and more useful features that can compete with other task managers. After giving the new Reminders a shot, you may want to ditch that third-party to-do app you've been using.

Apple Card's Fine Print: The Rules & Restrictions You Need to Know Before Applying for Apple's New Credit Card

Apple Card has generated quite the buzz since its March 2019 announcement. The iPhone maker's new credit card pairs with Apple Wallet on your device, is simple to sign up for, includes enhanced security over other cards, has zero fees, and provides daily rewards right to your Apple Cash account. And as good as that sounds, the fine print can complicate things real quick.

How To: Use Reminder's New Quick Toolbar in iOS 13 to Add Times, Locations, Flags & Images to Tasks

The updated Reminders app in iOS 13 makes productivity a little bit more seamless on the iPhone. The overhauled user interface makes it easier to find your reminders, the new Messages integration makes it simpler to remember to-dos regarding your contacts, and the new toolbar provides shortcuts to tasks that were once clunky and confusing.

News: The Enterprise Leap — Robots, Gremlins, & Games Won't Save Magic Leap, but Tapping the Inner Child of CEOs Just Might

Mystery is a tricky thing. Used correctly, it can give onlookers the impression that wondrous and perhaps valuable things are afoot. However, once the veil of suspension of disbelief is removed in any significant way, that same mystery can quickly turn into not just skepticism, but outright anger at what may have seemed like an attempt to dupe trusting onlookers.

How To: Use Maltego to Fingerprint an Entire Network Using Only a Domain Name

Hackers rely on good data to be able to pull off an attack, and reconnaissance is the stage of the hack in which they must learn as much as they can to devise a plan of action. Technical details are a critical component of this picture, and with OSINT tools like Maltego, a single domain name is everything you need to fingerprint the tech details of an organization from IP address to AS number.

How To: The White Hat's Guide to Choosing a Virtual Private Server

Conducting phishing campaigns and hosting Metasploit sessions from a trusted VPS is important to any professional security researcher, pentester, or white hat hacker. However, the options are quite limited since most providers have zero-tolerance policies for any kind of hacking, good or bad. After researching dozens of products, we came out with 5 potentials that are ideal for Null Byte readers.