Costly Errors Search Results

How To: Jailbreak iPhone 4 iOS 4.1

Download Greenpois0n and firmware 4.1! You can download greenpois0n and firmware version 4.1 from JailbreakAndUnlock. If you didn't update to 4.1 you'll need to restore to 4.1 firmware. Don't update to firmware 4.1 if your iPhone is unlocked.

How To: Install a post-form countertop

There are many different types of countertops, but of all those available, post-form countertops are probably the quickest and easiest to install. Post-form countertops consist of a laminate surface that is glued to a particleboard base. Typically, the base is shaped so that there is a curved front edge and an integrated backsplash with either squared off or 45-degree angle ends available.

How To: Sell at Your Local Farmers Market

Are you interested in selling your products at the local Farmers Markets? Many small mom and pop food crafters get started selling their artisan breads, homemade cakes, cookies, pies, biscotti, candy, seasoning mixes or regional barbecue sauces direct to customers who visit local farmers markets and farm stands. What better way to start than with those visiting the local farmers market; a captive audience expecting a wide variety of seasonal fruits and veggies; along with specialty products t...

Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations

Last Friday's mission was to accomplish solving HackThisSite, Realistic 5, the fifth and last in my series of realistic hacking simulation missions. This time, telemarketers are invading people's privacy, and it was up to us to stop them! The job was to get root on the site and delete the contact database in order to return the right of privacy to its victims.

How To: Fix the Unreadable USB Glitch in VirtualBox

Many users of the virtualization software VirtualBox may have noticed that the USB system has been pretty buggy for quite a long time. I've had my USB randomly duck out on me way too many times to count. This can really be difficult to deal with when you require access to the devices and files from the host system.

How To: Make Homemade Nourishing Creams

Homemade nourishing creams are easy and very simple to make. The ingredients are harmless and natural. It costs a fraction of what you would pay in the market. You also know exactly what goes into the product you make. Since homemade nourishing creams do not contains any preservatives, it's better to produce in small quantities and store it in the fridge to avoid waste.

News: Candyland themed party

I had so much fun planning my daughter's first birthday with a Candyland theme. Check out all of the beautiful decorations, party favors, cupcakes, and yummy treats. Have a look at all of the companies and people who contributed and helped make it so wonderful. who contributed to the birthday girls special day. Ellie Bellie contributed the adorable crown the birthday girl wore for the cake and “birthday” song, she truly was a princess. Sugar Mohawk contributed delicious treats for the party f...

News: This game is awesome!

FrontierVille reminds me of FarmVille's land design, Treasure Isle's collectibles, Mafia Wars energy consumption all wrapped up with an Oregon Trail theme. I like very much that when I need energy, it's actually available to find or earn and that there's really very little to wait for. The 5 and 15 minute crops keep you coming back to harvest. The bonus meter keeps you clicking on things as quickly as you can. There's a bit of strategy involved with your space plan and game play. You can real...

How To: Fix Kali 2016 Repository/Mirror Error

Recently, I decided to install Kali 2016 as dual boot on my laptop. Everything install perfectly up until the installer gave me the option to set up the package distribution mirror. No matter what setting I provided, no mirror would set up correctly. I was forced to continue the install without setting up the mirror. If you do not know what this means, I will explain it. Basically, you will not be able to update or install any tools onto your Kali distribution.

News: Null Byte's First Technical Excellence Tutorial Contest Ends Feb. 15, 2016!

As you all know, the first Null Byte Technical Excellence Tutorial Contest ends this coming Monday, Feb. 15, 2016. If you are working on another great article or your first article, try to complete it and submit it before midnight Pacific Standard Time (PST) to be considered in this contest. The winner of this contest will not only receive a certificate verifying the technical excellence of their tutorial, but they will also receive a free copy of the Professional version of the Exploit Pack ...

News: Pushing the First Null Byte Suite Update!

Hello everyone. As many of you know, we've successfully launched the Null Byte Suite for our wonderful community. In addition to the prepackaged tools, there is a dedicated GitHub repository where tools submitted by the community will be pushed to for distribution in the suite. There have only been a couple submissions, and out of them, only one fit the requirements. So, out of anticipation, we've added it to the suite!

Facebook Photo Privacy: Are You Safe?

Almost everyone uploads their very personal photos in facebook trusting facebook's privacy settings. But question is - is facebook's privacy settings really that trustworthy? Few months ago, while browsing facebook, I found that one can easily access your private photos using the same browser you used to browse facebook.

How To: Can't Connect to the App Store in iOS 6 on Your iPhone or iPad? Try This Quick Fix

Since iOS 6 was officially released yesterday, several bugs have been reported, including issues with Wi-Fi, Passbook, and battery life (although Apple has apparently fixed the Wi-Fi bug). Some users are also having problems connecting to the iTunes Store, which is probably insanely frustrating because the first thing you want to do with a new OS is try out new apps. Luckily, there's a way to fix this by tweaking the date and time settings. Open Settings, then go to General >> Date and Time. ...

News: The Money Making Macro

In Google definitions a macro is defined as "a single computer instruction that results in a series of instructions in machine language". Basically a macro is a programming script that tells the computer what to do. You can tell a computer (via a macro) to move a mouse, click, type or do any task that a computer can do with automation. There are also many (primitive) computer viruses that are coded entirely in a macro script. There are many ways to create a macro script but I will only go ove...

Xbox LIVE Achievement: How to Earn Free Microsoft Points with Social Engineering

Sometimes, paying for the whole Xbox LIVE service might seem like a waste of money. You're constantly experiencing lag, you've got people modding and cheating, kids are being loud and obnoxious over the mic, and your kill-to-death ratio is getting dumped on. Basically, the whole multiplayer experience just isn't cutting it anymore—you want to go back to the classic world of single player. Well, there's always downloadable content—simply known as DLC.

How to Make a Jacob's Ladder: Chained Lightning

In this article, I'll show you how to create a simple yet accurate demonstration of the "rising ionized gas" principle. In other words, a transformer, two metal prongs and lots of evil laughter. Remember those large "towers" in the background of Frankenstein movies with a "lightning bolt" rising upwards every few seconds? That's called a Jacob's Ladder; one of the coolest awe-inspiring demonstrations of high voltage. Here's a video of the final product: Materials and Tools

News: Block Cell Phone Signals on the Carrier of Your Choice by Hacking a Radio Frequency Jammer

Cell phone jammers, a DIY endeavor for the darker crowd. I'm pretty sure we've all considered having one at some point: whether the obnoxiously loud woman next to you is announcing private bedroom stories to a crowd on the subway, or your kids are grounded from using the phone (and consequently snagged a hidden prepaid phone), sometimes having a cell phone jammer comes in handy.

News: Hack Your Computer's BIOS to Unlock Hidden Settings, Overclocking & More

Your BIOS, or Basic Input Output System, is the firmware on your motherboard responsible for initializing your computer's hardware when it is first powered on. It probes for video adapters, RAM, the whole works. The BIOS provides a small library of basic input/output functions used to operate and control the peripherals such as the keyboard, text display functions and so forth, and these software library functions are callable by external software such as the OS and system software within sai...

How To: Copy & Convert your Skyrim Game Save from the Xbox 360 to your PC

Gamers like myself who have switched back and forth between Skyrim on PC and Xbox lack the ability to share game saves. This really sucks. I love playing Skyrim on a console. It's a very comfortable, easy and relaxed gaming experience. You don't have to worry about your frame rate being optimized, or wrist pains from using a keyboard. However, gaming on the PC can allow you to use texture enhancing mods and get an overall smoother experience due to a lack in glitches and bugs that plague the ...

Goodnight Byte: Coding a Web-Based Password Cracker in Python

Our mission for this week's Community Byte was to create a Python program to crack web-based passwords, like the ones you would see on an email or router login. I wanted it to be universal in the sense that it could be easily modified and adapted to another website just by changing a few variables. That was a success! Even though people weren't on time to the coding session, everything went well.

News: First Steps of Compiling a Program in Linux

This article describes the very basics of compiling a program on Linux. It is targeted at the absolute beginner. Sometimes beginners search for programs on the web for their Linux systems, and is faced with the reality that they have to compile the program themselves, either because there exists no binary for their architecture, or the author of the program just doesn't release any binaries at all, but only sources.