OpenVPN is the open-source VPN (Virtual Private Network) client, used over the PPTP (Point to Point Tunneling Protocol). It allows you to connect to a remote network over a secure, encrypted connection and mask your IP addresses over all ports. Since there is only one "hop," the network speeds are barely effected and are far more secure.
There are seemingly endless photography apps for the iPhone—it is perhaps one of the most popular arenas for application developers. We've covered a few in Giveaway Tuesdays, but nothing comprehensive.
Source: http://www.cracked.com/article_19048_6-important-things-you-didnt-know-were-running-out-of.htmlIf all news are absolutely true, then we are in deeper trouble than we previously thought. Read full articles by clicking on the link above. I know this is a bit late but the thought takes time to sink in and it makes me shudder at the thought.Source: http://holykaw.alltop.com/brace-yourselves-for-possible-chocolate-short
Hard disk problems are quite common these days, and when they fail you have no other option but to replace it. Fortunately, Ubuntu has been designed to run on your USB stick!
It sounds like Samsung is impressed enough with Apple's 3D Touch feature on the iPhone 6S models that the company is planning on implementing a similar feature on its upcoming Galaxy S7 handsets. A source told The Wall Street Journal that the latest iteration of Samsung's flagship will feature a similar design to this year's Galaxy S6, and will again feature both standard and curved AMOLED models. It's also rumored that the standard design will once again support microSD cards, which should p...
The latest update to Google Search, which is rolling out right now, brings automatic parking spot pinning through its Google Now platform.
In this video tutorial, you'll learn how to use Trapcode Sound Keys to control a video clip with an audio source — a song, for example — within Adobe After Effects. For all of the particulars, and to get started using this effect in your own projects, take a look! Control time with audio in Trapcode Sound Keys for Adobe After Effects - Part 1 of 2.
Garry's Mod is one of the most popular mods of all time, and has extended the life of the SOURCE Engine family of games by years despite their fairly outdated technology. THis video will teach you how to pull a great prank on your fellow multiplayer players online by creating a level full of comical traps for them to trigger and be confounded by while you laugh and enjoy your pwnage. Pull a prank on your fellow players in Garry's Mod.
In this video tutorial, viewers learn how to use the Digital Lux meter. The meter is packed in a carrying case. Begin by removing the unit and the plastic cover from the sensor. Then install the 9V battery. This device has 3 settings and has a hold function. To use it, move the sensor underneath a light source until your receive the highest reading. It is recommended to have 8000-12000 SI for a reptile's habitat. This video will benefit those viewers who have a reptile and Digital Lux meter, ...
This video will take you through a detailed example using the clone stamp and healing brush tools. You will learn how to use the Photoshop’s clone source panel to remove an unwanted section of a picture and then clean up the image using the healing brush. Whether you're new to Adobe's popular image editing application or simply looking to brush up on Photoshop CS4, you're sure to enjoy this free video tutorial. For detailed instructions, and to get started touching up your own images with the...
It appears there are endless things you can do with Coke. The Nokia Coke-powered phone is not in production, but certainly an interesting idea. Designed by Daizi Zheng, the Coke phone is an eco-friendly solution to charging your cell.
Record stealthily, in the dark. This hack is simple and will turn any LED flashlight into an infrared night vision light you can use with any video camera.
The awesome kite in this how-to video has a long tail just like a dragon and is traditionally flown to celebrate the Chinese New Year! You will need RSN, tyvek, heavy duty plastic garbage bag, cloth tape, a bamboo stick - 48" long (window blind source), magic markers, a ruler (yardstick), objects to make 2 circles i.e. pot lid, string, a pencil, a toothpick, a hobby stick, and the step-by-step instructions in this video kite-making tutorial. Make a dragon kite.
An RSS feed is a dynamically generated XML summary of information or news published on a website. The Feed2JS tool provides an easy way to display RSS feeds on your website, all without knowing the least bit about XML. All you need to enter is the URL for the RSS source and decide how you'd like it to be formatted. For more on using the Feed2JS tool, watch this video tutorial. Display RSS feeds on your website with Feed2JS.
PostSharp is an free, open-source and extensible platform for enhancement of .NET assemblies, that is: PostSharp transforms assemblies after compilation. Pretty abstract, isn't it? Not so much. It has great applications. PostSharp Laos, a Lightweight Aspect-Oriented Solution, provides aspect-oriented programming (AOP) to .NET Developers without the learning curve. This tutorial presents an introduction to the PostSharp programming language, one that's more than sufficient to get you started. ...
This tutorial will show how to use GPG and the FireGPG plug-in to encrypt and decrypt messages in Gmail. GPG is an open source implementation of OpenPGP (Pretty Good Privacy) , a public-key-encryption system. With public key encryption you don?t have to give away the secret key that decrypts data for people to be able to send you messages. All senders need is the public key which can only be used to encrypt, this way the secret key never has to be sent across unsecured channels. Encrypt Gmail...
Creative Cow Leader Jeff Bellune demonstrates how to use the tools available in particleIllusion and After Effects to get a particle emitter source to track an element in a video clip. Part One details how to animate the Layer Offset in particleIllusion to eliminate motion in the clip that is caused by movement of the camera that filmed the scene. Part Two concerns the animation of the emitter itself so that it accurately tracks the video element. art Three shows how to mask the emitter layer...
Bushcraft and Survival Skills Magazine and Videojug team up to bring you this informative video demonstrating how to find water from your surroundings. You will need: plastic sheeting, a plastic bad, a small spade or digging stick, containers that will hold water, a filtration device, a means of water purification. Tips for finding water in you environment are discussed in detail. Condensation and dew can also be good sources of water. All these and other practical situations are discussed. F...
Think you have what it takes to amputate your own arm? What about somebody else's foot? Now, thanks to the wide array of mobile apps available from the iTunes App Store, you might not need to attend medical school to perform a tracheostomy.
On its quest for online domination, Amazon.com continues to expand past its basic web marketplace to fulfill the needs of everyone and anyone with a little cash to spend.
Whether it's the new iPad Killer or not, one thing's for sure—the Motorola XOOM is hackable. Just hours after its release last week, Verizon's new Android-based tablet (running Honeycomb) was rooted by hacker Koushik Dutta, which seems easy enough.
WikiLeaks. In recent weeks, it's been the hottest topic on the web. It's been attacked on a multinational level by political influence peddling.
Just a few days after a senior US counter-terrorism expert warned that US drone strikes were turning Yemen into the “Arabian equivalent of Waziristan”, US drone strikes yesterday aped the tactic of ‘follow up’ strikes used by the US in Pakistan.
Despite endorsing Obama in 2008, JFK’s daughter Caroline now considers Obama a “liar,” according to a family source in Edward Klein’s new book on Obama called “The Amateur.”
Multiple airport screeners have been arrested for allegedly taking handsome bribes to look the other way while loads of illegal drugs slipped through security at Los Angeles International Airport, federal officials announced today.
Spring has sprung, which means it's time to plant all those delicious vegetables and lucrative cash crops. If you are like me, every year you meticulously plan every aspect of your garden before dutifully neglecting it all summer. I decided enough was enough and built this simple automatic watering system.
Whether you just got a brand new laptop or you've had an old notebook for several years, it's in your best interest to maximize your laptop battery life so you get the most out of your computer.
Don Williamson shared his real-time web-based code editor & interpreter for the DCPU-16 Virtual Machine. It makes nice use of the canvas tag for a beautiful blue console, features a real-time recompile as you type, and thanks to some custom DCPU-16 support for Marijn Haverbeke's wonderful CodeMirror syntax highlighting textarea library, it'll give you real-time error feedback as you type.
Christian Cantrell, Adobe's Air Product Manager and Evangelist, has released a video to demo websites that take advantage of the motion sensors in a mobile phone, tablet, or laptop via JavaScript. Now, let's take a look through the code and break down the core pieces that you'll need in order to build your own sites that can determine the 2-axis tilt, 3-axis gyroscope, and compass direction of the mobile device it's being displayed on.
Science-fiction writer Jules Verne predicted many scientific breakthroughs, including the moon landing, tasers, and nuclear submarines. In his 1874 book The Mysterious Island, Verne writes:
The United States asked Russia to send Iran a message that the upcoming round of nuclear talks is its last chance to avoid a military confrontation this year, Russian newspaper Kommersant reported Wednesday according to a diplomatic source.
Wouldn't it be nice to just sit at your buddy's house, plug into his network, and see exactly what he's doing? What if it was as easy as that? What makes packet sniffers like Wireshark such potent tools is that a majority of local area networks (LANs) are based on the shared Ethernet notion.
So, as you guys may or may not have read... 1.2 will be officially released tomorrow (March 1st). (YAY!)
The back row is black wool. The table lamp is a glowstone with trapdoors, sitting on a nether fence.
The link to this site takes you to the official website of the Supreme Court of the United States. It is a useful source for information about Supreme Court cases, journals, and orders of the court. The US government is separated by three branches of government one of them being the judicial branch. The power of the Supreme Court is to uphold the law and they make final decisions. To be part of the Supreme Court the qualifications are: if the president likes you, needs to have a law degree, a...
If you've ever heard software piracy terminology being discussed, I'm sure the term KeyGens came up. KeyGens is short for key generator, which is a program that exploits algorithmic faults in software by generating software license keys that appear to be genuine. Normally used as a technique to protect the source code software and prevent piracy, a key generator exploits the key algorithm to effectively nullify the need for any software licenses. For example, we must try to find patterns in t...
After becoming addicted to basic sonobe modular origami, I decided to make ornaments for relatives as Christmas gifts. I tried using fancy paper from stores like Paper Source, and cutting it to proper origami size, but I could never get the tight folds I wanted with non-traditional, non-origami paper. I ended up using this metallic origami paper that folds beautifully, and I'm pretty happy with the tiny models I ended up with. Forgive these pictures (iPhone/Instagram), I don't have my regular...
A source of inspiration... Models folded and photographed by Michal Kosmulski. There are only two sets of instructions on the site, but they are very well done. I wish he had covered more of the models. Here are a few I would like to tackle (I'll admit my eyes are bigger than my plate):
Friday's Community Byte was weird. The intent was to do a HackThisSite mission, but upon time to begin, everyone in there was programming without my assistance, with the help of Sol Gates. This is great! It's really awesome that everyone enjoys programming that much and will make the effort to learn even when I am not present. So, a tip of my hat to Mr. Sol Gates and the rest of you fine people.
Welcome to the second Null Byte in a series educating you on Social Engineering awareness and techniques. Today, I'm going to show you how a saavy Social Engineer would trick a friend into unknowingly surrendering their Facebook password. My intent is to warn and demonstrate how easy it is to succumb to phishing via Social Engineering, and therefore expose yourself.