Informed Choice Search Results

How To: Convert Protected M4P Files to MP3 Songs with iMovie and iTunes

I'm not sure exactly when it happened, but it's awesome that you can now download music from the iTunes Store that's free of DRM (digital rights management) limitations. That was always my biggest problem with buying music from iTunes. Paying a buck for a song that I can only play on Apple devices? Really? That's what finally led me away to other legal music downloading services like eMusic and Amazon.

Chess: The Ultimate PvP On-the-Go

Sitting in the dentist’s waiting room, I found I couldn’t browse the internet on my smartphone anymore. My eyes were tired from reading and there were no headphones to listen to music. There are no magazines at this dentist’s office, just an old TV playing Russian music videos ad nauseam. Mostly female Russian singers, and curiously enough they all shared similar traits: they can’t dance. They look gorgeous, but the best they could do is small movements and two slow moves at best- a huge diff...

News: Friday Indie Game Review Roundup: Old-New School

This week's FIGRR is all about games that are old-new (or new-old, if you like) school. Each celebrates a different vital, yet largely taken for granted, aspect of video game history in the decidedly new-school world of indie games. Their titles betray them. Blocks That Matter is all about blocks. Recettear: An Item Shop's Tale is all about item shops. Neither are particularly sexy aspects of gaming, but both are ubiquitous elements of great games that can stand on their own.

How To: Bypass Windows and Linux Passwords

If you're interested in bypassing Windows and Linux passwords, there is a great tool from the good people at Kryptoslogic. Have you ever forgotten your administrator password? Have you ever bought a used computer with a password on it? Well, Kryptoslogic have created a boot-disc call 'Kon-Boot', which allows you to bypass any Windows 32 or 64 bit OS, as well as Linux passwords. There is both a paid and freeware version available.

News: Friday Indie Game Review Roundup: Grand Theft Auto's Sci-Fi Genesis Granddad

Grand Theft Auto 3 was the biggest video game of the last decade, by far, introducing open-world adventure games to consoles, a genre that now rivals shooters and sports games for market dominance. A huge map, decentralized narrative, and myriad of interlocking quests and objectives that happen in a flexible order all became hallmarks of the "new" genre, along with the ability to shape the morality and reputation of your character. And most importantly, all of the quests and stories are compl...

News: The Morals and Dangers of Public Art. (A Warning)

I've decided to write this post so some of the fledgling street artists who may or may not follow this world in the future are informed about two things in the urban art world that are either not discussed at all, or distorted (intentionally or otherwise) to the point of misinformation. Those two things are, as the title says, the dangers of street art, and the morals of street art.

News: Final Fantasy 14 Final Thoughts

Spending five days with the game is enough to know it's not to my liking. Is it a horrible MMO? Yes, yes it is. There are better Free to Play MMOs launched years ago that are better than this. As a fan of the Final Fantasy series (I am currently playing and liking Final Fantasy 13), this MMO is so bad that at some point I couldn't justify the awful environment, game play, and interface.

How To: Use the Location Bar (aka Awesome Bar) to Search the Internet Faster in Firefox 4

Getting used to your new Firefox 4 web browser? If so, you might have seen some improvements in the Location Bar. The updated features make browsing the web a cinch, so it's no wonder why more and more Internet junkies are calling it the Awesome Bar. It's faster and easier to use, and there's even some optional tweaks that you can employ to make your Internet experience smooth and effortless.

How To: Get Free Food and Discounted Deals on Veterans Day 2011

This coming Friday, November 11th, 2011 is Veterans Day and everybody's celebrating! But only veterans and active military personnel can get the great deals being offered at restaurants and retail outlets across the country. If you need help locating some of those deals, below are all of the nationwide and local deals found across the Web. If you know of any more, share the spots in the comments below!

Null Byte: Never Let Us Die

If there ever was a time for Null Byte to need people to contribute, it's now. Let's make Null Byte a place where anyone, from novice to master computer user, come and learn. It has been sometime since the last "Call to Arms" for Null Byte, and even longer since the last "Weekend Homework". We all know that this time of year is busy for everyone, but that didn't stop occupytheweb otw from creating a great article in his continuing "Hack Like a Pro" series.

News: Obama's Rise

So far, I've talked a lot about what's going on in the world around us, but it's time I come back to politics for a bit. That said, the name of this world is somewhat misleading, in the sense that I talk about everything, not just politics! But I digress again.

Hide Your Secrets: How to Password-Lock a Folder in Windows 7 with No Additional Software

Today's guide is on creating a password protected folder on Windows 7 without any additional software. Yes, you heard that right. No extra software at all! This guide is intended for beginners. But please note, this method should not be used to store financial or otherwise highly confidential material. It might be a good place to hide a planning document for a family member's birthday party or similar occasion where you need to keep something secret temporarily.

Community Contest: Code the Best Hacking Tool, Win Bragging Rights

Here's something fun for the Null Byte community to do—a coding competition! This week, I wanted to get everyone involved by offering you all a nice library of possible program types to choose from and try to code. At the end of this competition, all of the submitted programs will be reviewed by the community and myself. The coder that receives the most votes will be dubbed THE BEST.

Weekend Homework: How to Become a Null Byte Contributor

We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowledge. There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials...

News: Null Byte Is Calling for Contributors!

We're officially seeking Null Byters interested in teaching others! Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowledge. There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials of any skill level, and anything you feel like...

How To: Create a Free SSH Account on Shellmix to Use as a Webhost & More

Having an SSH or Secure SHell to tunnel your traffic through is something we have talked about many times at Null Byte. As we know, it allows us to securely route and encrypt our traffic through a remote server, effectively anonymizing us and protecting our traffic from all forms of analysis—simultaneously. We have gone over how to make a home SSH tunnel. However, the question has come up, "How can I get an SSH tunnel to somewhere other than my computer?" This would be useful in a situation w...

Scrabble Challenge #18: Can You Win at Scrabble Rack Attack?

As touched upon in the past, knowing all of the possible words you can play is key to being a better Scrabble player. If you don't have the vocabulary, then you can't compete against the best of the best, and you'll never even get the chance to spar against professionals such as Nigel Richards, Joe Edley, Andrew Fisher, and Wayne Kelly.

How To: Make a Thanksgiving Turducken

Ah, turducken. The fondest of all portmanteau words and the tastiest of all Thanksgiving day meals. Turducken is a turkey stuffed with a duck stuffed with a chicken—three glorious poultry meats molded into one marvelous, boneless hunk of flesh that any sane carnivore wouldn't dare resist. It's slapped together with pork sausage stuffing, sometimes even three different kinds, and caked with Cajun seasonings.

How To: Run an FTP Server from Home with Linux

File Transfer Protocol, or FTP, is a network protocol made for transferring files in a client and host fashion over a Transmission Control Protocol (TCP) network, such as the internet. FTP is integrated into most browsers, and you have probably used it before. It is a common way to host files and transfer them easily. To access an FTP, a login is required, unless the server is configured to use anonymous logins (like the Arch Linux mirrors).

Social Engineering, Part 2: Hacking a Friend's Facebook Password

Welcome to the second Null Byte in a series educating you on Social Engineering awareness and techniques. Today, I'm going to show you how a saavy Social Engineer would trick a friend into unknowingly surrendering their Facebook password. My intent is to warn and demonstrate how easy it is to succumb to phishing via Social Engineering, and therefore expose yourself.

News: Is HP touchpad 64GB a possible rival to iPad 2?

The HP Touchpad 64 GB is out in action with a robust processor and additional applications in the market. Using the best technology on earth, it is looking forward to give a tough fight to the Apple’s iPad 2. The 64 GB HP TouchPad sound more promising to its predecessors. The experts feel that the two device, HP TouchPad 64 and Apple’s iPad-2 is more or less the same. Let’s have a glance over the device by discussing the various features it encompasses.

How To: Use Cygwin to Run Linux Apps on Windows

You'll see a lot of Linux action going down here at Null Byte. We use Linux for hacking-related stuff because it provides a more relaxed programming environment, making it easy to write exploits and tools. Linux has many features Windows is lacking, such as full control over the OS right down to the Kernel and massive availability of mature, open source (read: free & tweakable) tools & projects.