Data Network Search Results

How To: Move data from an SQL database to a Silverlight DataGrid

In this clip, you'll learn how to use the Entity Framework and RIA Services to migrate data from an SQL database to a Silverlight DataGrid (data grid). Whether you're new to Microsoft's popular web application framework or a seasoned web developer merely looking to improve your chops, you're sure to find benefit in this free MS Silverlight programming lesson. For more information, including a complete demonstration and detailed, step-by-step instructions, take a look. Move data from an SQL da...

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Two: Onions and Daggers

In the first part of this series, we learned about darknets, as well as how they came about. But these patches of forgotten Internet are not the oasis of free information you might think. Despite being hidden—or just harder to come across—these networks are no more safe then anywhere else on the 'clear' Internet. The nature of networking and routing means your location is always known in server logs. It only takes one phone call to your ISP with your IP address to obtain both your physical ad...

Secure Your Computer, Part 3: Encrypt Your HDD/SSD to Prevent Data Theft

Welcome to Part 3 in my series on protecting your computer from prying eyes (Part 1, Part 2). In today's segment, we will be going over drive encryption using the TrueCrypt program on Windows OS. Drive encryption is a technique that masks your data with a cryptographic function. The encryption header stores the password that you have entered for the archive, which allows the data to be reversed and read from. Encrypted data is safe from anyone who wants to read it, other than people with the ...

How To: Download Your Data with Google Takeout

While we're waiting for Google to sort out the mess over suspended Google+ accounts, it's a good reminder that you have the option to download much of your Google+ data with Google Takeout. Google Takeout, created by an internal Google engineering team marketed as the Data Liberation Front, is a free service that provides a handy and easy way to download data from your Google+ stream, your contacts and circles, and other information in a zip file.

How To: Catch Your iPhone's Hotspot Data Thief Red-Handed

I use my iPhone's personal hotspot all the time. Whether I need a connection on the train, in a coffee shop with no Wi-Fi, or when my friends don't have service, my personal hotspot is a lifesaver. But all that data comes from somewhere, of course, that somewhere being your cellular plan. Luckily, you can see how much data your hotspot has used, as well as who or what used more of it.

How To: Use the ObjectDataSource for ASP.Net

In this ASP.Net video tutorial, Chris Pels will show how to use the ObjectDataSource as the intermediate layer between data bound user interface elements and a custom data access class for a business object. Uses of the ObjectDataSource in the GUI Design mode and declaratively in the source view of an .aspx page are discussed. In addition, the considerations for design of the data access class and business object for use with the ObjectDataSource are covered. Use the ObjectDataSource for ASP....

How To: Detect hackers on your network with Ettercap

Most of you are familiar with using Ettercap for attacking systems, but what about using it to find attackers? This tutorial will cover using Ettercap to find people sniffing on your network. The plug-ins we will be using are search_promisc, arp_cop and scan_poisoner. Have fun detecting network sniffers. Detect hackers on your network with Ettercap.

How To: Set up a network tarpit or teergrube

A network Tarpit, sometimes know by the German word Teergrube, is a service or set of hosts that deliberately try to slow malicious network connections down to a crawl. The idea is to put up unused hosts or services on the network that respond to an attacker, but do things to waste their time and greatly slow their scanning (or spreading in the case of Worms). To follow along with this video tutorial, you'll need a package called LaBrea by Tom Liston and an unused IP address to tarpit. Set up...

How To: Open and edit DICOM files in Photoshop CS3 Extended

This video shows you how to import frames from a DICOM file into Photoshop CS3 Extended, and manage import options. You also learn how to remove personal data, export the frames as JPEG files, and display time series data as an animation that can be exported as an AVI, MPEG, or FLV file. Open and edit DICOM files in Photoshop CS3 Extended.

How To: Hack a Smartphone Using SMS

How many of you have or know people who have a smartphone? There's a lot of you, right? Well, depending on how most of you use those smartphones, there could be all kind of sensitive information stored on it, and that doesn't just mean sensitive personal information, but it could also contain all sorts of sensitive corporate data for work.

How To: Don't Get Caught! How to Protect Your Hard Drives from Data Forensics

With the mass arrests of 25 anons in Europe and South America, and the rumors of an FBI sweep on the east coast of America floating around, times look dicey for hackers. Over the past few days, a lot of questions have been posed to me about removing sensitive data from hard drives. Ideas seem to range from magnets to microwaves and a lot of things in-between. So, I'd like to explain a little bit about data forensics, how it works, and the steps you can take to be safe.

Hacker Fundamentals: A Gentle Introduction to How IP Addresses Work

Imagine you're in Paris and you need to get to Versailles. Looking around for directions, you come to a cold realization—you do not speak a lick of French! How are you going to get to Versailles and what happens if there is a detour? It will be a difficult struggle, and you'd probably get lost and eventually fail. This is why it's important to know some of the country's language before taking that trip in the first place.

How To: Backup All of Your Xbox 360 Data to Your Computer

Flash memory can be a tad unpredictable at times. I have had 4 flash drives die out on me over the last few years, and they usually die without warning. When a flash memory based device dies, the data is likely impossible to recover. Adversely on an HDD, or Hard Drive Disk, even if the disk dies out, someone will probably be able to fix it and get it back to working order—at least long enough for you to back up your data. Hard drives are a bit more forgiving. As you can guess, due to the unpr...

News: Should Kids Be Allowed to Use Facebook and Google+?

It's a question I've been pondering a lot lately. Technically, children under the age of 13 are not allowed to join Facebook. But according to a Consumer Reports in May, 7.5 million children 12 and younger are already on the site. Currently, federal law prohibits websites from collecting personal data from children without parental permission. The Children's Online Privacy Protection Act, or COPPA, as it is more commonly known, has been in effect since 1998, but has not been updated since.

News: Holy Pac-Man! DIY Light Painting Saber Is Pure Awesome

A few months ago, we showed you a pretty awesome light painting project that visually captured invisible Wi-Fi signals around town using a Wi-Fi detecting rod filled with 80 LEDs. With some long exposure photography, the results were pretty amazing. This project was inspired by those crazy Norwegians, but this build lets you do something even more amazing—capture pictures of colorful written text and drawn images, frozen in midair.

HowTo: Stay Safe Using Public WiFi

For travelers on-the-go, or penny pinchers who like to surf the web for free in public places, there are necessary precautions one must take when accessing sensitive information over a public WiFi connection. For advice on doing this safely, check out Glenn Fleishmann'sguide to staying protecting your private information. Fleishmann outlines how to:

How To: Use Wireshark to Steal Your Own Local Passwords

Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their computers to protect from various threats. Here are a few things that should always happen when doing business on computers: