How To: Use OptiFine to Boost Mincraft's Visual Performance to Eliminate Lag and Speed Up Rendering
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server!
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server!
Oh yeah, this is a big topic, at-least for me. All the frequent flyers will/should be interested in this topic. I'm sure all of you have heard at-least something about the TSA, and most of it should have been bad. Complaints, lawsuits and general disgust surround this organization. Is there a reason, or are the 'extremist liberals' at it again? Let's find out!
I recently posted a link to what seemed to be a very useful guide on Lifehacker for creating a TOR button in Chrome. However, when I tried it myself, it did not work. Also, it lacked a warning on the limits of Tor, which I think are important. Therefore, I decided to create an updated and more comprehensive tutorial.
Skype is a great service. It allows a free solution for VoIP to VoIP calls, and cheap VoIP to landline calling. However, a very disturbing, little known fact that might push you away from Skype does exist. If you closely read the terms of service agreement, it clearly says that Skype is allowed to decrypt your messages whenever they please. Here at Null Byte, we tend to enjoy our anonymity, don't we?
Big name individual hackers and hacker groups everywhere in the news are getting caught and thrown in jail. Everytime I see something like this happen, I won't lie, I get a little sad. Then I wonder, how are these guys getting caught? If a group like LulzSec, with all the fame and "1337-ness" can get caught, I think my hacker comrades are doing something wrong.
Facebook has been "improving" their interface in several different ways in attempt to combat the threat of Google+. One big change is the introduction of a news ticker in the top right corner that constantly feeds updates from friends and organizations you are connected with on Facebook. Not only do some people find the ticker annoying due to the constant stream of text flowing across it, but many felt unnerved by the fact that every “Like” or comment on a profile could instantly be seen acro...
This tutorial will walk you through the steps required to install the Ubuntu 9.10 operating system (Karmic Koala) on your computer. I have a Suzuki Kuiper 1411 HKS notebook computer with 2.1 GHz Intel Dual Core processor, 4GB RAM and 320GB hard drive. It has a dedicated 256MB Nvdia GeForce 9300M GS graphics card and 1270++MB of VRAM in SLI mode.
If you want to install laminate flooring on your stairs I would recommend that you do a lot of research and find the information you will need to do it correctly. Installing laminate flooring on stairs can be tedious and time consuming and is a lot different than installing laminate flooring on a floor.
Reduce the risk of blown fuses, blown sensors, shorted wires, and even possibly increase shift times on an automatic and possibly increase horsepower with a grounding kit! All you need is some wire, terminal ends and electrical tape or heat shrink. To make this work, all you have to do is run ground wires from essential components to a good ground area, such as the strut tower.
Check out this computer hardware tutorial from Dummies.com. This tutorial is made for PCs. Upgrading your laptop computer's memory is a simple, do-it-yourself process. This video shows how to open your notebook and install more RAM to give your laptop a performance boost. Upgrade memory or RAM on a laptop.
This PhotoTools tutorial shows you how to create your own presets as well as use them. PhotoTool presets are a great way of saving adjustments you make all the time when editing images in Photoshop. You will also learn how to share your PhotoTools presets and install presets from friends within Photoshop. Use presets in the PhotoTools plugin for Photoshop.
Learn how to build and install a kitchen island from ready-made cabinets; watch a video that demonstrates construction and assembly tips. Design and build a kitchen island.
Learn how to build and install a wrap-around tree bench; watch a video that demonstrates step-by-step construction and installation tips. Design and build a custom tree bench.
Check out this video to learn how to install a garage door opener. Take advice from the guy with the cool accent. Mount a garage door opener.
Watch this video from This Old House to learn how to install attic stairs. Steps:
Learn step-by-step how to replace a split circuit electrical outlet including safety tips and what to watch for to make sure an outlet is installed correctly. Replace a split circuit electrical outlet.
Video demonstrates how to install a new toilet handle if the present one is broken or needs to replaced. Using a new toilet handle, wrenches, screwdrivers and a bit of patience, this easy project can be accomplished in no time. Replace a toilet handle.
"Connect via Facebook" — these words are coated on over a million websites nowadays, but Facebook Connect poses a risk of leaking personally identifiable information to those third parties. If you're not convinced Facebook Connect is safe, then turn off the flow of personal data to those websites!
Watch this "Grease On Your Hands" video tutorial from the Washington Post to see how to change your dead car battery properly.
I was big into comic books when I was younger. I'd even create my own, though my drawing skills were not as good as the greats, such as Kirby or McFarlane. Hell, I still even have a couple DC and Marvel comics laying around somewhere, though I'm more likely to go watch a comic-based movie than buy an actual comic book. But there's nothing like "free" to get me back in the game.
Watch out Macs. Flashback is back. Variations of the trojan have reportedly infected 600,000 Mac computers around the globe, with about 57 percent in the U.S. and another 20 percent in Canada.
Mitt Romney has been on a winning streak recently, with small breaks by Rick Santorum. Ron Paul is slowly coming in third, but it's hard to say he's making a dent in those who support the top two contenders. Newt Gingrich has gone down, down to the bottom. He's still fighting to make another break in the race.
There are many websites that let you watch videos, but that don't let you download it for later viewing. Even if there is a download option, most of the time it requires you to pay some amount of money. Luckily for Mozilla Firefox users, there is a way to download the videos you stream for free.
When it comes to webcams these days, most people are using their laptops over desktops. The cameras are centered, integrated, and require no configuring. They're a cinch and usually have great resolution. So, then what do we do with all of those old wired desktop webcams that we've accrued over the years? Even if you still use an external USB one, chances are you're not using it daily, so why not come up with a better use for it?
Have you ever had this happen? Your main OS is windows, and you just istalled a nux dualboot. But when you installed GRUB to the mbr, your windows loader got deleted! Hence you are not able to get into windows anymore... Sucks. But there's also a solution!
Ever since kernel 2.6.xx in Linux, a lot of the internet kernel modules for wireless interfaces ended up becoming broken when trying to use monitor mode. What happens commonly (to myself included) is a forced channel that your card sits on. No good! For users of airodump and the aircrack-ng software suite, the software has become unusable.
Many users of the virtualization software VirtualBox may have noticed that the USB system has been pretty buggy for quite a long time. I've had my USB randomly duck out on me way too many times to count. This can really be difficult to deal with when you require access to the devices and files from the host system.
Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their computers to protect from various threats. Here are a few things that should always happen when doing business on computers:
To the displeasure of many loyal Firefox users, Mozilla has been deploying what seems like a new marketing strategy to "catch up" to Google Chrome. I have no idea if this is because the version number is higher than theirs, but it is downright annoying. It's not all complaints, though. Firefox has done an amazing job at completely revamping its source code and redesigning all of its engines, making it a more than worthy competitor to Chrome. However, we are displeased with Firefox because eve...
As we all know, security is a big thing here in Null Byte. We've talked quite a bit about ways to encrypt traffic and become anonymous on the internet, some of which entail using proxies, VPNs, and SSH tunnels. We've also talked about preference using SSL pages in practice for safe logins. These are all great protocols and tools, but aren't without their flaws and inconveniences.
This is the Windows OS counterpart to my tutorial on how to burn the new XDG3 formatted games on Xbox 360. Microsoft invented a new disc format system to trump piracy, it's called XDG3. XDG3's standard is to burn a whole extra gigabyte of data to the disc, to allow more content, but more importantly for stopping piracy. This extra gigabyte of data makes it impossible to burn or rip a game the traditional way. So how on earth can we burn our fully-legal back-ups that we should rightfully be ab...
Welcome to Part 3 in my series on protecting your computer from prying eyes (Part 1, Part 2). In today's segment, we will be going over drive encryption using the TrueCrypt program on Windows OS. Drive encryption is a technique that masks your data with a cryptographic function. The encryption header stores the password that you have entered for the archive, which allows the data to be reversed and read from. Encrypted data is safe from anyone who wants to read it, other than people with the ...
Encryped traffic and tunneling is a must when away from home to keep you and your information safe. SSH tunnels can be slow, and are heavily encrypted. VPNs are an all port solution, and proxies are just not what we need in most cases. Then, there is Tor.
"How do I install Arch Linux?" That question was bound to come up eventually. And with me using Arch, it's no coincidence that all of you want to use it as well. Arch is arguably the best Linux distro available. Distros that come close are Gentoo and some aspects of Ubuntu, but Arch is meant for building your OS from the inside out. Arch is built around minimalism, so you won't get anything by default. It doesn't even come with sound!
Archiving and compression is a great way to store and prepare files for sending. You can reduce the size of a file, turn a group of files into a single file, and even encrypt and password the contents! Just take a look at this image to see how much it compressed a 28GB text file.
A proxy is a server that lets a client to connect to it and forward its traffic. This enables a certain "layer" of protection by masking your IP. An IP address can be used to learn your location and track you on the Internet, thus eliminating any form of anonymity that you may have.
Often times when staying at a hotel or anywhere for that matter, you'll whip out your laptop and check the local area for Wi-Fi. I know you've all been in my shoes when you find an unsecured network that appears to be public Wi-Fi belonging to the hotel or airport, and you connect to it. You connect fast and perfectly, only to find that when you open your browser, it says you don't have an account, and are filtered from accessing the web. This is because the owners of the network want to keep...
Do you think humans are the only ones who like the challenge of a good word game? Well, think again, because homo sapiens aren't the only ones up for stimulating their brains. Other species on planet Earth like to play Scrabble, too, and they're the ones most likely to actually play the words HOMO and SAPIENS in a game, both totally legit Scrabble words... by themselves, of course.
One of the biggest video games events of the year is about to happen in Japan tomorrow, when the Tokyo Game Show (TGS) kicks off. If you've never heard of it, just think of it as the E3 of the East—a video game extravaganza open to both businesses (Thursday and Friday) and the public (Saturday and Sunday). And even though it hasn't officially started, TGS has already released some grand announcements, specifically about Nintendo's future lineup and a precipitous drop in their share prices.
There's still about eight months before the final chapter in the Mass Effect series comes out, but some trigger happy fans are already building replica costumes and prop weapons to celebrate the upcoming release. BioWare themselves recently commissioned some of these projects, which were shown at their booth at Comic-Con 2011 a couple weeks ago in San Diego. One of these projects was the armor that turian Garrus Vakarian sports in Mass Effect 3, by Kommissar Props. But even more impressive wa...