Interfaces Search Results

How To: Play Music With Your Mind

Tired of getting calluses from incessantly strumming along to 'No Woman No Cry'? Just hook up to the brain-music system and use your brain power to play a tune instead. I'm not talking—humming along in your head. The machine, created by composer and computer-music specialist Eduardo Miranda of the University of Plymouth, UK, is composed of electrodes taped directly onto your skull that pick up tiny electrical impulses from neurons in your brain and translates them into musical rhythms on a co...

News: 11 Dirty Tricks Played by Crooked Web Designers

Ever been Privacy Zuckered? Roach Moteled? Friend Spammed? If you've been on the net long, odds are you have — and worse! Fortunately, there's a new resource for keeping track of the web's worst design practices; it's called "Dark Patterns" and it aims to "name and shame" sites that employ "user interfaces that have been designed to trick users into doing things they wouldn't otherwise have done."

News: Apple iTravel to Eliminate Airport Torture

The folks over at Patently Apple have uncovered some very promising looking plans for a future iPhone app called iTravel. iTravel plans to cover ticket-buying, electronic check-in, car rentals, and possibly even Apple designed airport kiosks. Fingers crossed it comes out soon. Apple excels at making dummy-proof, intuitive, easy-as-pie user interfaces, and man, the airline travel process sure could use a little streamlining.

How To: Use Wireshark to Steal Your Own Local Passwords

Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their computers to protect from various threats. Here are a few things that should always happen when doing business on computers:

News: The "411" Film Production Bible Finally Hits Android Devices (For Free)

If you work in the film industry, are currently in film school, or have aspirations of being involved in the movie making process in some way, shape or form, you're probably very familiar with a certain set of books published by 411 Publishing that are commonly referred to as the "production bibles". If you live in the Los Angeles area, LA 411 is a valuable source of information when it comes to fulfilling your production needs. And if you're in New York, the NY 411 book is just as crucial fo...

UDP Flooding: How to Kick a Local User Off the Network

Only so much data can be passed through the network and to your computer's networking interfaces. This is limited by the amount of bandwidth you have. The more bandwidth you have, the faster your network connections will be. Not only this, but your transfers will be more parallel and distributed so that all of your speed isn't taken up by one transfer. When all of your bandwidth is sapped and unable to be used, this is called a denial of service, or a DOS.

News: Will Games Ruin Google+ Like They Ruined Facebook?

Last week, Google+ took a crucial step towards becoming exactly like Facebook. As of now, there are games available for download within the service, most notably Angry Birds, which is already available on at least one of the devices owned by everyone in America today. Some of the other popular games include Bejeweled Blitz and Zynga Poker, and out of all of the available titles, all come from four companies that have come to form the four-headed dragon of U.S. casual gaming: EA, Zynga, PopCap...

How To: It's Easy to Stop Apps from Automatically Updating on Your iPhone

Since iOS 7, your iPhone automatically updates all of your apps, which is a wonderful thing ... until it's not. Not only does this feature drain the battery quicker when enabled, it can also bring changes to features, settings, and user interfaces in the apps that you already know and love. That's why you can easily disable the feature and stop apps from automatically updating.

Uncrackable: Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt and decrypt as you need. GPG is a great open-source version of Pretty Good Privacy (PGP), a similar application used for encryption, but licensing and patent problems led to the development of GPG in its wake.

News: Networking Virtual Machines Using VDE

I've struggled for a long time trying to set up a virtual network between my KVM virtual machines. I tried several forums and tutorials on the web, but still on my system it just wouldn't work. I eventually got it owrking, so I've decided to make some notes of my own. Hopefully it will be helpful to you as a reader as well.

Chess: The Ultimate PvP On-the-Go

Sitting in the dentist’s waiting room, I found I couldn’t browse the internet on my smartphone anymore. My eyes were tired from reading and there were no headphones to listen to music. There are no magazines at this dentist’s office, just an old TV playing Russian music videos ad nauseam. Mostly female Russian singers, and curiously enough they all shared similar traits: they can’t dance. They look gorgeous, but the best they could do is small movements and two slow moves at best- a huge diff...

Next Page