Encryption Technology Search Results

How To: Encrypt Your Notes, Photos & Archives with EncryptPad

For anyone wanting to keep information private, plain text is a format of the past. Instead, cheap, powerful encryption is widely available, but often not easy enough to use to attract widespread adoption. An exception to this rule is EncryptPad, an easy to use application that lets you encrypt text, photos, or archives with strong encryption using a password, keyfile, or both.

How To: Your One-Stop Guide to Secure, Encrypted Messaging

Now that smartphones have ensured that we're connected to the internet 24/7, online privacy has become more important than ever. With data-mining apps hoping to sell your information for targeted ads, and government agencies only one subpoena away from knowing every detail of your private life, encryption has become our last line of defense.

How to Hack Wi-Fi: Getting Started with Terms & Technologies

Welcome back, my hacker trainees! A score of my readers have been begging for tutorials on how to hack Wi-Fi, so with this article, I'm initiating a new series dedicated to Wi-Fi hacks. This will probably be around 6-9 articles, starting with the basics of the technologies. I can hear you all groan, but you need to know the basics before you get into more advanced hacking. Then hopefully, developing your own hacks.

How To: Generate Private Encryption Keys with the Diffie-Hellman Key Exchange

When we are building programs that communicate over a network, how can we keep our data private? The last thing we want is some other lousy hacker sniffing our packets, so how do we stop them? The easy answer: encryption. However, this is a very wide-ranging answer. Today we're going to look specifically at how to encrypt data in Python with dynamically generated encryption keys using what is known as the Diffie-Hellman key exchange.

How To: Use Private Encrypted Messaging Over Tor

Tor is an excellent obfuscation network for web traffic, and while instant messaging over the network is very useful, it can be relatively difficult to configure. In this guide, we'll look at two synchronous communications platforms (instant messengers) which can be routed over the Tor network, Ricochet and XMPP.

How To: Encrypt and decrypt video with a Visual Basic application

In this clip, you'll learn how to implement video encryption and decryption in a VB app. Whether you're new to Microsoft's popular event-driven program language & IDE or a seasoned developer merely looking to improve your chops, you're sure to find benefit in this free Visual Basic programming lesson. For more information, including a complete demonstration and detailed, step-by-step instructions, take a look.

How To: Encrypt and decrypt text in Microsoft Visual Basic 6

In this clip, you'll learn how to implement simple text encryption and decryption in MS VB 6. Whether you're new to Microsoft's popular event-driven program language & IDE or a seasoned developer merely looking to improve your chops, you're sure to find benefit in this free Visual Basic programming lesson. For more information, including a complete demonstration and detailed, step-by-step instructions, take a look.

How To: Install a new single handle Delta kitchen faucet with Diamond Seal Technology

These days, faucets are incredibly easy to install (removing old faucets is the hard part). And if you have a Delta brand single handle kitchen faucet with DIAMOND seal technology, this video will show you the steps to installing it. This is also very similar to other brands of single-handle faucets. This video from Lowe's and Delta will help you with your installation. You'll need a screwdriver, adjustable wrench and allen wrench.

How To: Make crystal iodine

MAKE brings the do-it-yourself mindset to all the technology in your life. Make Magazine celebrates your right to tweak, hack, and bend any technology to your own will. In this tutorial, Robert Bruce Thompson shows you how to make crystal iodine. As Thompson says in the video, crystal iodine is currently a schedule one compound, and in order to buy you have to fill out a lot of paperwork and you'll end up on a DEA list. This tutorial gets you around that, but proceed carefully.

How To: Protect your computer from snoops

Keep private info from prying eyes and earn some peace of mind when you safeguard your PC or Mac against nosy intruders. You will need several great passwords, virtual desktop software, snoopware blockers, a screen filter, a mirror, a healthy sense of paranoia, WPA encryption, and an understanding IT specialist.

How To: Hack a VHS Camcorder into a Night-Vision Headset

Watch as Kipkay hacks a bulky VHS camcorder and turns it into a night vision headset. This video tutorial will show you that old technology can still be useful in today's world. Just think, you might not have ever been able to see in the dark corners of the night without this hacked VHS camcorder. Night vision isn't just for the military, it's for you, and me, and your dog...

How To: Use a Newstweek to change the news read by others on a wifi network

The Newstweek might be the coolest new device of 2011 that no one is talking about. It's a pocket-sized device that allows you to access the data streaming through a wireless internet access point and change the news being read by fellow users at the hotspot, from any site, however you want. It allows you to do some amazingly inspiring and sinister things, like any really progressive technology, and this video will show you how to use it.

How To: Remove nitrile exam gloves properly and safely

Nitrile exam gloves are the latest in disposable medical glove technology. They withstand stress well and won't trigger latex allergies, making them a great choice for first aid work. Watch this video to learn how to remove them properly, ensuring that your skin is not contaminated by whatever you were trying to keep off them with the gloves.

How To: Play galloping harmonics on the guitar with Jude Gold

A cool technique on the guitar is Galloping Harmonics, combining the galloping rhythmic figure with harmonics and making it a little funky with some slap guitar, originally made famous by Regi Wooten! In this video, Jude Gold, head of GIT (Guitar Institute of Technology) at Musician's Institute completely breaks down the entire process of learning how to get the sound, the feel, and the technique down.

How To: Make pneumatic dust system for blood and dust hits in film

Have you ever wondered how all of the blood and dust that flies from wounds and bullet holes in Hollywood films gets shot through the air so convincingly? The answer is a pneumatic dust system. This video will show you how to make one yourself for almost no money, allowing you to achieve all sorts of cool special effects without any expensive digital technology.

How To: Protect your Wordpress blog from hacker attacks

Google is one of the most powerful forces on the Internet, and their technology can be the key to helping you find success in whatever your online endeavor might be, from web design to filmmaking. This video is a part of their Google Webmaster Series, offering help to webmasters the world over on how to best utilize Google in their work. This video will show you how to ensure that your Wordpress blog is safe from the hacker attacks that are so common for Wordpress users.