Coverage Protects Search Results

News: Installing Laminate Tile Over Ceramic Tile

I'm starting a laminate tile installation next Thursday. I thought I will show what is involved from start to finish. It's going in a kitchen and two bathrooms. There is ceramic tile in these rooms now and I'm installing the laminate tile right over the ceramic tile. The problem with the ceramic tile is it has white grout and my client can't keep the grout clean.

How To: Defeat SSL in Practice with SSL Strip

SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, whenever you see "https://" in front of the URL in your browser, you know you're safe... or are you?

How To: Make Your Laptop Theft Proof

The dreaded moment you hope never happens—someone has stolen your laptop. You could have private information, pictures, or even private information belonging to the company you work for, all lost forever. It can cause you pain, money, or even a job.

News: Minecraft, Meet Terraria

Minecraft was first released just a few years ago, but when a paradigm-shifting piece of media comes along the rest of the world is quick to take inspiration from it. The absolutely terrible XBLA knock-off FortressCraft was the first, and last month a much more interesting game called Terraria came out on Steam for $9.99. It is clearly inspired by Minecraft, and there is a long checklist of identical features. It is, nonetheless, a very different product, and just might be called the first in...

News: Richie Hayward Benefit in San Jose, August 13, 2010

DRUM! Magazine — the leading magazine for drummers and percussionists worldwide — has announced the biggest drumming event ever to take place in Northern California. On Friday, August 13, drummers will descend on the San Jose Repertory Theatre in the heart of Silicon Valley to witness three of the world’s most exciting drummers — extreme drumming sensation Marco Minnemann, Tower Of Power funk master David Garibaldi, and former Mars Volta wunderkind Thomas Pridgen — for an evening of mind-blow...

News: Opening game in 3D. First impressions.

I've been curious to watch one of these famed '3D' games for a while now. Last April at NAB, I attended several 3D panels and folks from ESPN suggested that one of the strongest experiences that would bring 3D into the home would be live sports. I've missed opportunities to watch the PGA Masters broacasts, and NCAA games, but being a hardcore Soccer (Futbol) fan, I've been most excited about this possibility. It did not disappoint, but not without some concessions. I will be as detailed as po...

How To: Add a Non-Stick Surface to a Cast Iron Skillet

Many cooks refer to well-seasoned cast iron skillets as the original non-stick pan. A cast iron skillet is a versatile piece of cookware, going from the top of the stove to the oven with ease, provided the handle is also cast iron. The secret to a non-stick skillet is in the seasoning and cleaning process. Improper seasoning, cooking acidic foods and incorrect cleaning methods can all remove the non-stick capabilities. Achieving and maintaining a non-stick cooking surface is uncomplicated and...

How To: Stop Facebook's Facial Recognition Software from Automatically Tagging You in Photos

It seems like nowadays, whenever Facebook rolls out a new feature, it's immediately controversial. Social Ads put your name and face in the spotlight, Instant Personalization shared your information with partner sites, third-party apps were allowed to access your home address and phone number, and now Tag Suggestions implement facial recognition software to automatically identify your friends in uploaded photos. Most are calling it problematic or creepy, some insinuate CIA involvement, and it...

Windows Security: Software Level

As many of you know Windows is not the most secure Operating System in the world, but then again no OS is really secure if the user doesn't know how to protect themselves. Later I will show you how to lower the risk even more on your (the user's) end.

WTForeign Fridays: 9 Crazy Festivals from Around the Globe

In many ways, we center a large portion of our lives around festivals. They provide us days off from work, allow us time to be content with our families and loved ones, and a give us a chance to eat as much as we want without Aunt Carol saying something about our necks (it's thyroidal, Carol). However, some festivals are determined to push the needle to crazy. Here, for your consideration, are those offenders.

News: Flaw in Wal-Mart Returns System Allows Major Thefts to Go Unnoticed

We love tearing apart security here at Null Byte. Several years back, upon returning items to Wal-Mart due to a malfunction, I noticed something very peculiar about the way their overall procedure goes. I brought the item up to the desk, and the woman asked if it didn't work, which I responded affirmatively. Without a moment's notice, she takes it right off to the defective items area and asks if I would like cash or store credit.

Scrabble Bingo of the Day: FINNESKO

Scrabble Bingo of the Day: * FINNESKO [n/pl.] A finnesko is a boot made of tanned reindeer skin, with the reindeer's fur on the outside. It's an especially good, warm boot for subarctic regions. These boots originate from the Sami, indigenous people from the cultural region of Sápmi, located across four countries in the Arctic Circle; Norway, Sweden, Finland, and Russia. This area is also referred to as Fennoscandia.

How To: Defend from Keyloggers in Firefox with Keystroke Encryption

Null Byte is looking for moderators. More threats to computers exist every day. Not only do we have computer viruses and malware, but we have rootkits and other nasty pieces of code that can log your keyboard strokes or even add your computer to a botnet to attack other websites. Your computer can be infected even if you have anti-virus software installed. I can't stress enough how easy it is for a hacker to write a piece of code that gets around every piece of anti-virus software.

News: Tips on Car Windscreen Maintenance

Most of the car owners pay attention to the maintenance of the vehicle but among them, many forget to include windscreen maintenance in their periodic checkups. Car windscreen maintenance is quite simple and can be done on your own. In order to maintain car,the drivers should treat this with utmost care as they do for tyres because neglecting small issues in windscreen can land you in deep trouble and on safety prospects as well,it is unsafe.

How To: Use Wireshark to Steal Your Own Local Passwords

Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their computers to protect from various threats. Here are a few things that should always happen when doing business on computers:

How To: Prevent Post-Earthquake Nuclear Meltdown in the US

After getting slammed with a crazy-big earthquake/tsunami, the Japanese nuclear plant Fukushima Daiichi might be on the brink of meltdown. Not as bad as Chernobyl, but maybe as bad as Three Mile Island. Nobody wishes such a disaster on anyone...anywhere in the world. In the US, there are about 100 nuclear facilities, about 8 of which are located near hot beds of seismic activity.

News: iPhone App = Confessional Aide = Absolution (Yeah, Right)

I'm not going to lie. I was Catholic. But one of my reasons for my faithful departure was having to tell my innermost secrets— my sins— to a silhouetted figure behind a latticed screen. With the creepy enclosed booth structure and separation of sinner and confessor, its anonymity was clear, yet deceiving. You always knew the priest and he always knew you. If I wanted total privacy, was there really a need for this intermediary to God?

Blue: The Color of Dishonor and Subterfuge

When I used to play Magic every day during 7th grade, one of my regular opponents was a kid named Eddie. He played an all-Blue, deck, the first I'd ever seen. At that point I was even more creature-obsessed than I am now and my deck were unwieldy hulks practically begging to be shamed by an all-Blue deck. I couldn't hurt him. Every time I tried to do something he had a response, a way to negate what I was doing. He would barely ever hurt me. He would win games just by making me play for so lo...

News: Windows Live SkyDrive

Windows Live SkyDrive which is initially termed as Windows live folders is one of the parts of Microsoft Windows online service. It is a password protected service that allow users to store file and share them with others. Here the windows live id is required to access the users profile. Anyone can make his/her files private or public. Public share file are easy to access without requiring any Windows live id.Initially it was available only few states in United States. But nowadays it expande...

News: "How I’d Hack Your Weak Passwords"- The Art of Cracking

Lifehacker posts an article on the art of cracking weak passwords, courtesy of Internet standards expert, CEO of web company iFusion Labs, and blogger John Pozadzides. Pozadzides certainly knows a thing or two about password logic. (Note: this information is not intended to hack into accounts, but rather to protect you from using weak passwords).

How To: Curl hair with tongs

In this video Robert Ashforth shows you how to curl hair with tongs. Product such as spray net protects hair and encourages curl. Wrap hair from top to bottom. Open your tongs and without closing them wrap the hair around from root to tip along the length of the tongs. Let the hair cool. After the hair has been curled around the tongs slide them out and hold the curl to allow hair to cool and set.