Must Haves Search Results

How To: Download torrents safely

This tutorial shows you how to download bittorents with uTorrent without risking having your IP address get exposed or traced. You will need to find a proxy server for this to work. Download torrents safely.

How To: Clean a Flag

We hang flags to proclaim our patriotic spirit. This is especially true for retired veterans or those who have loved ones serving in the military. Others hang flags representing the seasons, important events, favorite teams or just a cute and whimsical design as decoration. An American flag can be particularly tricky to wash. Red, white and blue all lying together in one inseparable panel can cause the blue or red dye to bleed onto the white. This is not just a problem with an American flag; ...

News: The Basics Of Website Marketing

Search engine optimization (SEO) is now one of the most important topics for website owners to understand. Anyone that depends on their website to bring them business needs to know the ins and outs of SEO in order to maximize their website’s potential. And if you want your website to have a high Google rank then SEO is essential.

Xbox LIVE Achievement: How to Earn Free Microsoft Points with Social Engineering

Sometimes, paying for the whole Xbox LIVE service might seem like a waste of money. You're constantly experiencing lag, you've got people modding and cheating, kids are being loud and obnoxious over the mic, and your kill-to-death ratio is getting dumped on. Basically, the whole multiplayer experience just isn't cutting it anymore—you want to go back to the classic world of single player. Well, there's always downloadable content—simply known as DLC.

News: The Discovery of Dolphin Language

In my early life I was deeply impacted by the work of physician and psychoanalyst John C. Lilly. I still have my dog-eared copies of The Mind of the Dolphin (1967) and Programming and Metaprogramming in the Human Biocomputer (1968). Lilly's work, with dolphins and the development of the sensory deprivation tank, has formed the basis of movies, music and television productions.

News: Keep Your Car Perfect with Winter Car Maintenance Tips

Cars require maintenance no doubt, but it needs pampering even with the change of weather. Like in summer rainy and winter your vehicle is suppose to be looked after differently. It’s always wise to take measures before the onset of the winter season, to save you from the perils. Car owners can follow regular maintenance schedule to have a perfect care of car and it will help them to have hassle free car drive in all sort of weather circumstances even in mercury boiling temperature or spine c...

How To: Hack Coin-Operated Laudromat Machines for Free Wash & Dry Cycles

Most people have had the unfortunate experience of not having a washer and dryer at some point. Apartments in my area tend to charge at least one hundred dollars extra for the units with washer and dryer hookups, and even more if you want a unit with an actual washer and dryer installed already. If you are young and just starting out, this may be hard for you to manage with your current salary. If you have no washer and dryer, the only alternative is the laundromat.

Great Deal: $0.99 EA & Gameloft iOS Games for Christmas

Looking for last-minute Christmas gifts? Give the gift of mobile gaming! Electronic Arts (EA) and Gameloft are having their annual holiday sales just in time for Christmas. If you've got a gamer on your shopping list with an iPad, iPhone or iPod touch, a mobile game will make the perfect last minute present. Games that are usually anywhere from $2 to $10 are now on sale for just $0.99, and there's lots to choose from.

How To: GPU Accelerate Cracking Passwords with Hashcat

How to Crack Passwords Faster by Putting Your GPU to Work with HashcatSecurity on the internet is always changing. Not too long ago, having a 10 character password meant that you were safe from all forms of hash cracking. Hash cracking is when you take a string of characters that have been passed through a cryptographic hash and try to reverse them. The normal processors that are housed inside of our computer cases are general purpose. The processors are not meant for handling complex math an...

Secure Your Computer, Part 4: Use Encryption to Make a Hidden Operating System

This is Null Byte's fourth part in a series about fully securing our computers (Part 1, Part 2, Part 3). In our last Null Byte, we went over how to encrypt an entire operating system to protect our data, however, this doesn't fully protect us. In the case of legal extortion, the government can actually make you give up your cryptographic key to your computer so that they can look through it.

How To: Permanently Delete Files to Protect Privacy and Passwords

Permanently deleting files is something that a lot of people aren't aware of. Actually, most people think that once a file is deleted, it is gone forever. This is not the case. Hard drives write to the disk via magnetic charges, positive and negative correlate to 1s and 0s for binary. This is then interpreted into information for the computer to use and access.

How To: Get Free Wi-Fi from Hotels & More

Often times when staying at a hotel or anywhere for that matter, you'll whip out your laptop and check the local area for Wi-Fi. I know you've all been in my shoes when you find an unsecured network that appears to be public Wi-Fi belonging to the hotel or airport, and you connect to it. You connect fast and perfectly, only to find that when you open your browser, it says you don't have an account, and are filtered from accessing the web. This is because the owners of the network want to keep...

How To: Mine Bitcoin and Make Money

Bitcoin is a new currency built off "Satoshi Nakamoto's" (alias) 2008 Bitcoin white-paper. Bitcoin provides its users with a way to make peer-to-peer (P2P) transactions without having to use a bank as a mediator. There is no middle man, no corporation backing it, and no one has access to your money, except you. It's decentralized from government, run by the people, for the people.

News: Will Kidult Wage a Graffiti Civil War?

MOCA's Art in The Street gallery was one of the first large scale street art related museum shows ever. It's not a point of debate whether this did or did not bring street art to a much wider audience, it most certainly did. It united the old graffiti artist of the seventies with the new street artists of the last twenty years. It was a big night with many famous artists attending the opening, including but certainly not limited to, L.A. native Shepard Fairey and the ever exciting Mr. Brainwa...

News: Limbo Developer Playdead Studios Buys Its Freedom Back from Their Investors

Danish developer Playdead has made only one game, a little indie, side-scrolling, puzzle platformer called Limbo. It just happens to be far and away the best video game of that prominent genre (and perhaps the best indie game period) on the Xbox 360, and quite possibly for PlayStation 3 and PC, too. Critical and financial success has followed in droves, and today... Playdead has taken advantage of that success and indie-fied themselves even further by purchasing back the portion of the compan...

CryEngine 3: Now Everyone Can Make a Game As Good As Crysis 2… For Free

Crysis 2 is the current standard for high-quality graphics in video games. No other game looks so smooth, so colorful, so... ultra-real. German developer Crytek has built their reputation on PC game technology to the limit, and the CryENGINE 3 graphics engine they used to make Crysis 2 might be the most powerful tool for creating 3D video game graphics on Earth. As of yesterday, it's also free for anyone, yourself included, to download from Crytek's website here.

News: Mobile Game Developer Fined $50,000 by FTC for Soliciting Emails from Minors

Children under the age of 13 possess insight that can blow the minds of their elders, but not the wherewithal to make important life choices for themselves. This is exactly why there are strict rules against marketing cigarettes to them. In 2000, a law went into effect called the Children's Online Privacy Protection Act that institutes similar consumer protections for our youth's online identities, prohibiting companies from soliciting personal information from children under 13 years of age ...

News: Should Google+ Require You to Use Your Real Name?

Google started culling Google+ accounts. There are two main targets: businesses and those who are using pseudonyms. For businesses, Google is promising to provide their own version of Facebook Pages, which will be released later this year. For those who use pseudonyms, they aren't so lucky. According to Google+'s community standards, users must "use the name your friends, family, or co-workers usually call you". The purpose of this rule is ostensibly to discourage spammers and people from set...

World Siege: Orc Defender for iOS Turns Your Real Life Home Into a Video Game

Tower defense games have covered a lot of creative ground over the last five years. They've gone from simple desktop amusements to a staple of the indie game scene, having been integreated into nearly every other type of game and released on every platform. They have taken place in ancient times, the far future, and on alien planets. But one place they (and most other types of video games) have never taken place is the real world. Not a virtual recreation of the world, but on the very terra f...