Conveniently Close Search Results

How To: Make an Invisible, Reusable Trapdoor to Hide Secrets or Char Unsuspecting Cows

There are a few ways to make trapdoors, but out of all of them, this one is my favorite. It's fast, completely hidden, and both opens and closes. This particular trapdoor can be used for a variety of purposes, such as hiding your valuable possessions, having a secret entrance to an underground lair, or maybe even taking care of obnoxious cows. What you'll need to make it are 12 sticky pistons, 8 redstone repeaters, 32 redstone, the switch of your choice, and whatever blocks you want to use to...

Hack Logs and Linux Commands: What's Going On Here?

This morning, I received a message from a friend who was reading a hack log, and she had some questions about the commands used. This got me thinking, as Linux has a ton of commands and some can be archaic, yet useful. We are going to go over everything you need to know to read a hack log and hopefully implant the steps in your head for future use.

IPsec Tools of the Trade: Don't Bring a Knife to a Gunfight

Pull up outside any construction site and you'll see tools scattered about—hammers, jigsaws, nail guns, hydraulic pipe benders—these are the tools of the trade. You would be hard-pressed to build a home or office building with just your hands! On that same page, security professionals also have their own go-to tools that they use on the job site, only their job site is your server.

How To: Recognize Crowd Control - Part 3

For our final part of recognizing crowd control, we shall look at the mind. It's the most complicated thing in the universe, but also the most easily influenced. What makes us to gullible? What methods to commercials, companies and the media use to influence our position on things? These are just a few of the questions we will answer.

How To: Don't Get Caught! How to Protect Your Hard Drives from Data Forensics

With the mass arrests of 25 anons in Europe and South America, and the rumors of an FBI sweep on the east coast of America floating around, times look dicey for hackers. Over the past few days, a lot of questions have been posed to me about removing sensitive data from hard drives. Ideas seem to range from magnets to microwaves and a lot of things in-between. So, I'd like to explain a little bit about data forensics, how it works, and the steps you can take to be safe.

Force Lightning: How to Make a Shocking Cookie Jar Any Sith Lord Would Be Proud Of

There is nothing more annoying than a greedy roommate. It's absolutely infuriating to wake up and find the cookies your mother just made for you gone without a trace. Your favorite drink is empty and the homemade meal you worked so hard on the night before is nowhere to be found. This irked me so much that I made this shocking cookie jar. When a cookie burglar touches the side and the lid of the jar simultaneously, a small electric shock stops them in their tracks.

Uncrackable: Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt and decrypt as you need. GPG is a great open-source version of Pretty Good Privacy (PGP), a similar application used for encryption, but licensing and patent problems led to the development of GPG in its wake.

Making Electromagnetic Weapons: EMP Generator, Part One

In this series, I'll be exploring electromagnetic weapons, how to build them, their function and application to the future, and the amazing possibilities electromagnetism has to offer. First, the electromagnetic pulse generator, or EMP. You've probably heard of these before, and their devastating effects on electronics. A simple EMP consists of a capacitor, transformer, trigger, and coil of copper wire. This, when triggered, would produce an intense magnetic field for a brief period, similar ...

Lockdown: The InfoSecurity Guide to Securing Your Computer, Part II

This is Part II in the Lockdown: The InfoSecurity Guide To Securing Your Computer series. Before beginning, check out Part I. This article will cover using alternate software to increase your security and will provide you with some information about websites and programs that test a computer's security. It will also guide you to software you can install or follow so you know what programs need to be updated on the computer. Lastly, I will talk about some features that should be disabled when ...

How To: Create a Redstone Clock in Minecraft

Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Real time redstone clocks are a marvel of redstone technology. Not only can they keep track of time, they are capable of powering other more complicated redstone machines. Regardless of whether a redstone clock runs a ten second or twenty-four hour time span, they operate on the same principles, which can be easy and straightforward to understand.

How To: The Social Engineer's Guide to Buying an Expensive Laptop

Laptops are almost a necessity in today's society. It doesn't help that a laptop that can actually increase your work productivity will put at least a $1,500 dent in your wallet. I'm sure you have searched around to try to find factory direct deals, or (shiver) even looked at used laptops, but that isn't the way to go. You need something that actually has a warranty, and good performance, but at the same time, doesn't require you to sell a kidney. This can cause quite a dilemma, as it can tak...

News: Minecraft World's Minecon Wrap-Up

Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Minecon 2011 went really well. If any of you World Members attended, please post about your experience to the community corkboard. The opening ceremony was amazing! Here's a video of the release: After the release, we attended the panels for Scrolls and Cobalt. We then attended the Official Mojang Panel.

How To: Convert Protected M4P Files to MP3 Songs with iMovie and iTunes

I'm not sure exactly when it happened, but it's awesome that you can now download music from the iTunes Store that's free of DRM (digital rights management) limitations. That was always my biggest problem with buying music from iTunes. Paying a buck for a song that I can only play on Apple devices? Really? That's what finally led me away to other legal music downloading services like eMusic and Amazon.

How To: Download and Install Minecraft 1.0: The Final Pre-Release

Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Well this is it folks, the final Pre-Release before Minecraft officially launches! These changes should be the final game changes until it releases in Vegas this Friday. Mojang has made it clear, however, that they will continue making changes to the game while it's released.

News: Kaplan University Adult Continuing Education Online Business School–Complete Y

Carol Platt was caught in the middle of the economic downturn with no backup plan. Searching for a stable job in an unstable economy proved to be difficult without a college degree. Her work history and past successes were overlooked. It had always been a dream of hers to complete her degree; after a failed first attempt, she was unsure of her ability to follow through. She began researching online education options and felt that Kaplan University stood out; she decided to complete her colleg...

News: Friday Indie Game Review Roundup: Pennies, Alliances, and Choices

Like a great acting performance, making a really good game is all about choices. While creating or playing a game, those involved have to constantly make small choices that will affect the outcome, either positively or negatively. And the only thing worse than choosing wrongly is not choosing at all. Too many games, especially today, stick to what they're supposed to do from the get-go and avoid making difficult, small, meaningful choices to differentiate themselves and make their performance...

News: Does the World Really Need Anymore Zombie Games? Yes, If They're Like These Ones…

The war between horror movie monsters has been going on for the better part of the last century. We're talking vampires, werewolves, ghosts, zombies and mutant flying creatures, each of which has had their fair share of the limelight in film. But it comes and goes. Once moviegoers get an overdose of a particular monster, they aren't scared anymore, meaning it's time to move onto the next. So, Dracula goes away kicking and screaming, just to be replaced by Frankenstein and then werewolves. But...

How To: How Businesses Can Prepare for Google+

WonderHowTo welcomes guest contributor, +Ryan Crowe - formerly the man behind GPlusTips. Crowe will be providing tips and tricks on how to use Google+ in interesting and innovative ways, and the self-proclaimed Google+ User Experience Enthusiast is nearly ready to launch a website examining social interaction on Google+ called SocioloG+.

News: Friday Indie Game Review Roundup: Arcade Games Are Dead

If you're between the ages of 20 and 40, then video arcades probably hold a special place in your heart. Whether you all but lived in one (me), wished you could, or detested those with a liking for them, there's no denying that arcades were a ubiquitous part of American culture. They were everywhere, from big chains to little mom-and-pops, housing better systems than gamers had at home and with all the best games and newest titles.

News: Canon's 5D Mark II Invades Hollywood

Since its release three years ago, Canon's EOS 5D Mark II has been the most sought out digital SLR for photographers everywhere. But it's also becoming a favorite amongst cinematographers, thanks to its compact size and high-def video recording mode, seeing action in everything from independent features to Hollywood blockbusters and even big network TV shows.