Homeland Security Search Results

How To: Find an IP address in hotmail

In this tutorial, we learn how to find an IP address in Hotmail. First, open up your Hotmail in box and right click on the email you want the IP address of. Now, select "view source" and find where it says "received: from" or "X-Originating IP". This will give you the exact IP of where this email was sent from. You can use this for any email you receive and the best part is that it only takes a few simple clicks of the mouse and a few seconds out of your day! This can help you bump up securit...

News: Best Hacking Software

When i went to class today, a good friend asked me a question. He wanted to know what the best hacking software was to basically do everything. What i told him was this: Well there isn't an "Ultimate" tool boot there are a number of tools which deserve a "Medal." So what i'm trying to say here... What are some of the best hacking tools available right now? For starters i created a list with some of the tools.

News: Danger Ehren kills Jimmy Kimmel

Prank is played on Ehren: Have Johnny knoxville and Danger Ehren on Jimmy Kimmel with the premise that Johnny is going to do some trick with a gun. When Johhny and Ehren are on the set, have a reason for Johnny to give the gun over to Ehren and have Johnny tell Ehren to shoot it at Jimmy with the idea that the gun isn't loaded. The gun will fire a blank and Jimmy will have a blood packet in his chest go off and will pretend to have really been shot and then die. Soon as this happens, Ehren is...

News: This Will Blow Past Airport Security

Papercraft guns are the new origami. The new origami for boys, that is. WonderHowto and YouTube are chock full of paper gun tutorials. Many models are simple, but some are impressively realistic, not to mention functional. My personal favorite (unfortunately no tutorial) is the homemade Desert Eagle .50 cal by YouTube user Changmobile.

How To: Mount a security chain to a door

Middle-aged man goes through the tools and process to install a security chain to a door. Tools include a door chain, screwgun, hammer, chisel and other listed tools. Step-by-step video explains thoroughly how to accomplish the chain installation. Mount a security chain to a door.

News: News Clips - June 6

Collapse At Hand Ever since the beginning of the financial crisis and quantitative easing, the question has been before us: How can the Federal Reserve maintain zero interest rates for banks and negative real interest rates for savers and bond holders when the US government is adding $1.5 trillion to the national debt every year via its budget deficits? Not long ago the Fed announced that it was going to continue this policy for another 2 or 3 years. Indeed, the Fed is locked into the policy.

News: Fallout Inspired underground bunker

As my in game name (TehGeekFather) would suggest I tend to like things on the Geekier side of things. Games being one of them. (duh I'm on a Forum dedicated to Minecraft) That being said I am a huge Fallout fan. (NO! not the band. <Sigh>) I'm referring to the post apocalyptic series first developed by Black Isle Studios, the roll playing game division of Interplay, back in 1997. Fallout 1 and 2 were pretty big back then open game play, being able to complete tasks in different ways depending ...

An App for Stalkers: "Creepy" Geo-Locates Based on Social Networking Activity

With the globally rampant use of such social networking platforms as Facebook, Twitter, and Foursquare, the issue of privacy has become a prevalent concern for many. And for good reason—there's the violation of Facebook employing user names in ads, the Etsy slip-up, and of course, the everyman act of recklessly sharing too much information via common social media outlets: a night of drinking results in morning after embarrassment, or worst case scenario, sloppy Facebook posts and tweets resul...

News: Secure your Wizard Booty!

Hello readers again! Sorry about the long wait (scary computer problems). Today I am going to talk to you about security problems on Wizard101. I have recently encountered many security flaws on Wizard101, including hacking, frauding and other crazy things. Wizard101 is the target for many online predators, many of who are fully-grown adults aged 60 or 70. Here is the link to an article I found about it: Wizard101 Internet Predators

News: Overview of New features in Microsoft Office 2010

Microsoft office 2010 is the successor version of office 2007 and is code named as office 14. It is the first 64 bit version of office which is only compatible with Microsoft service pack 3, Windows vista and windows 7. It was released on April 15, 2010. It is the first Microsoft application which offers free online version of word, excel, PowerPoint and one note. These can be easily used with all the popular browsing software. The various functionality which are added in office2010 are descr...

How To: Join Second Life and Create Your Own Avatar

On June 23, 2003, Linden labs created a free client program known as Second Life. This program allows users, or residents, to interact with each other in a virtual world by using avatars. Thanks to this program, residents are able to explore, socialize, and create and trade virtual property, and services with each other. Second Life has become one of the most popular programs used by various age ranges from 16 to 60, but how do you enter this world and get your own avatar?

How To: Increase FPS (Frames Per Second) in Windows for Gaming

Introduction In the competitive world of today's video game scene, PC gamers are known to squeeze out the best possible visuals in their games. Every few months a new video card rolls out, and RAM is ever increasing; constant upgrading is the norm of staying ahead the curve. One of the most important things a PC gamer looks at is how many FPS (frames per second) he gets. It defines his gaming experience.

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services

For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. Before someone can learn how to root a box, they need to learn how not to be found. I can not stress that point enough.

News: Bullet Hell or Bullet Heaven? The Case of Trouble Witches NEO

The Xbox 360 is America's video game system. It was designed in America, it has better market share in America than anywhere else, and it has the most overtly macho game catalog of any console. For many Xbox fanboys, gaming heaven is shooting hordes of really well-animated things in the most intuitive way possible. Trouble Witches NEO - Episode 1: Daughters of Amalgam, released last week on Xbox Live Arcade (XBLA) for $10 by Japanese developer Adventure Planning Service, is a typical Xbox 360...

How To: Install low-voltage outdoor lighting

One of the most simple and cost effective ways to liven up your landscaping is through subtle illumination. Low voltage lighting is simple to install and offers many benefits including ambiance, safety and security. They can be used to illuminate a walkway or to lighten up your home's street address at night. Today's manufacturers are making low-voltage lighting products geared for the do-it-yourselfer, which makes purchasing and installation easier. These low-voltage kits come with a transfo...

How To: Install outdoor low voltage lighting

One of the most simple and cost effective ways to liven up your landscaping is through subtle illumination. Low voltage lighting is simple to install and offers many benefits including ambiance, safety and security. They can be used to illuminate a walkway or to lighten up your home's street address at night. Today's manufacturers are making low-voltage lighting products geared for the do-it-yourselfer, which makes purchasing and installation easier. These low-voltage kits come with a transfo...

Don't Get Doxed: 5 Steps to Protecting Your Private Information on the Web

If you follow the Anonymous, Occupy, and IT security scenes, you have no doubt heard about a dox release. What is it? How can it hurt you? And most importantly, how can you protect yourself from it? Some of these steps might seem common sense, while others will be an ah-ha! moment. Your private info is both your biggest weakness and your biggest weapon in your battle to remain anonymous. You must learn how to use it as both.