Network Abilities Search Results

News: New Android Market Update Lets You Rent Movies and Buy eBooks

Google has been slowly rolling out a new update for the Android Market in the United States, which gives mobile users a new interface and some additional content for their Android-powered smartphones and tablets. The update started a couple weeks ago, taking the Android Market to version 3.0.27 on devices running Android 2.2 or higher. The new Android Market has a Honeycomb feel to it with a more visually pleasing layout and new colorful promotional page which showcases top apps and games, as...

News: The Revolution of the Hacked Kinect, Part 3: Gaming Gets Artsy

Video games and art have somewhat of a sticky relationship. Many video games have large teams of talented artists doing amazingly creative work, and yet the art community is only just beginning to utilize video games as art (sometimes). Perhaps if video games were shown not just as a medium of expression, but as a means of creating great art as well, the art community would be forced to consider it differently. The third part in the Hacked Kinect series will focus on the artistic possibilitie...

Shadow: Why, God, Why?

Any time a feature is introduced in an MTG set and not replicated in subsequent sets, balancing issues are surely forthcoming. You wind up with one set that can do things the others can't, forcing players to counter that set with other cards from it, and generally limiting the creativity with which one can effectively play the game. Playing these types of cards is like playing trap defense in hockey or boxing like Floyd Mayweather: you might win, but neither you, your opponents, nor the peopl...

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services

For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. Before someone can learn how to root a box, they need to learn how not to be found. I can not stress that point enough.

How To: Sneak Past Web Filters and Proxy Blockers with Google Translate

Do you need proxy access, but cannot have it for some reason? The most common perpetrator behind the issue is the network you're trying to access the pages from. Some networks will block websites, then go as far as filtering out all of the web queries for terms like "proxy" because it can get around their filter. Quick web proxies can be used for tons of other things, though.

The Ultimate Guide: Diagnosing & Fixing Connection Issues, Part II

Hello everyone and welcome to Part II - The Ultimate Guide: Diagnosing & Fixing Connection Issues. In this tutorial we will discuss more advanced methods that I took in order to fix our home network. I have also attached a link to download the FREE eBook - so feel free to download it to you can refer to this manual when you are experiencing connection issues. I would also like to note that the manual has been loaded onto a free server - it will remain on the server until people stop downloadi...

News: 5 Deliciously Warm Bourbon-Spiked Holiday Cocktails

With those icy winter months setting in, it's time to start sipping your bourbon warm. Spike your classic eggnog, hot chocolate, and even lattes with a splash of Wild Turkey bourbon. Below, five recipes to add a little fire to your typical cold weather beverages. Adjust the recipes to get more servings, and you've got some great ideas for Christmas party favors.

How To: Run an FTP Server from Home with Linux

File Transfer Protocol, or FTP, is a network protocol made for transferring files in a client and host fashion over a Transmission Control Protocol (TCP) network, such as the internet. FTP is integrated into most browsers, and you have probably used it before. It is a common way to host files and transfer them easily. To access an FTP, a login is required, unless the server is configured to use anonymous logins (like the Arch Linux mirrors).

How To: Hack Wireless Router Passwords & Networks Using Hydra

Leaving your wireless router at its default settings is a bad idea. The sad thing is, most people still do it. Once they've penetrated your network, hackers will change your router settings so they'll have an easy way back in. This allows them to change your network into a shell or proxy so they can forward their traffic anonymously through you when committing other dirty deeds.

How To: Share Your Laptop's Wireless Internet with Ethernet Devices

Sharing a laptop's wireless Internet connection with other computers connected to its Ethernet port is a great skill to know. It can be good for a number of reasons; Your computer may not have proper hardware to have a standard setup, or you may have an awkward network topology where sharing your wireless Internet via Ethernet would just be a better option.

How To: Get Free Wi-Fi from Hotels & More

Often times when staying at a hotel or anywhere for that matter, you'll whip out your laptop and check the local area for Wi-Fi. I know you've all been in my shoes when you find an unsecured network that appears to be public Wi-Fi belonging to the hotel or airport, and you connect to it. You connect fast and perfectly, only to find that when you open your browser, it says you don't have an account, and are filtered from accessing the web. This is because the owners of the network want to keep...

News: Google+ Pro Tips Weekly Round Up: Refining Sharing

One of the primary goals of a social network is for you to share what you find interesting with your followers and friends, but on Google+, sharing has so many layers that it can be confusing for most people to really take advantage of it properly. Some of the tools in place that enable you do deal with spam and manage your privacy aren't very clear, so this week's round up is all about how you can share what you want with who you want on Google+.

News: G+Me Makes Google+ (Almost) Perfect: An Interview with Huy Zing

G+Me is one of our favorite Chrome extensions here at Google+ Insider's Guide. We love it because it's one of the most comprehensive extensions out there. It attempts to address the "noisy streams" issue, with list mode, and collapsible posts and comments. The creator, +Huy Zing, is very responsive to feedback, and he's been quick to address any issues that arise, including privacy concerns. He's even created a G+Me (Paranoid Edition) extension, for the extra careful Google+ user. And if you ...

How To: Test Drive Gmail's New Interface

Google's hard at work beefing up their new Google+ social network, and while they continue to improve new features like Circles and Hangouts, they haven't lost track of their other online features already widely in use. If you're already a part of the Google+ project (currently closed to invites right now), you've probably noticed the changes in Picasa Web, but Gmail has been getting some great updates as well—and you don't have to be in the Google+ network to use them.

News: Google +1 Button Now Available for Websites

Google's sociable equivalent to the Facebook Like button is finally here, and it works very similar to your favorite social network's recommendation system, except it shows up directly in Google search results. Whenever your Google friend gives a website or webpage the +1, you'll see it in your search results, as long as you're signed into your Google Account.

An App for Stalkers: "Creepy" Geo-Locates Based on Social Networking Activity

With the globally rampant use of such social networking platforms as Facebook, Twitter, and Foursquare, the issue of privacy has become a prevalent concern for many. And for good reason—there's the violation of Facebook employing user names in ads, the Etsy slip-up, and of course, the everyman act of recklessly sharing too much information via common social media outlets: a night of drinking results in morning after embarrassment, or worst case scenario, sloppy Facebook posts and tweets resul...

WARNING: On Public WiFi? Your News May Be Hacked

Meet Newstweek, a hidden device engineered to hack news items being read at public WiFi hotspots (cafes, libraries, airports, etc.). Both nefarious and tech-saavy, the ingenious mechanism wasn't fathered by a group of web hackers, but rather a pair of Berlin artists, Julian Oliver and Danja Vasiliev. The duo are interested in exploiting the "trustworthiness" of big media outlets in order to demonstrate the vulnerability of relying on just a few dominant networks.

How To: Speak Your Tweets (Egyptians Can Use Twitter via Voicemail)

You may have read an earlier post about Egypt blocking popular social websites like Facebook, Twitter and YouTube due to demonstrators disseminating videos and photographs, along with coordinating movements, during the protests against President Hosni Mubarak. In that article, you learned how to use proxy servers and VPN services to bypass those website governmental blocks.

How To: Refine 3D trails in Houdini 10

This one-two tutorial offers advice on how to work with bespoke shaders and compositing networks in Houdini 10. Whether you're new to Side Effects Software's popular 3D production program or a seasoned graphic artist just interested in better acquainting yourself with the application, you're sure to be well served by this free video tutorial. For more information, including detailed instructions, take a look. Refine 3D trails in Houdini 10 - Part 1 of 2.

How To: Create a particle-based explosion in Houdini 10

This clip presents a walkthrough of how to go about creating a particle based explosion in Houdini 10. Whether you're new to Side Effects Software's popular 3D production program or a seasoned graphic artist just interested in better acquainting yourself with the application, you're sure to be well served by this free video tutorial. For more information, including detailed instructions, take a look.

How To: Make lighting models in Houdini with illuminance loops

This clip offers instructions on how to create your own lighting models using an illuminance loop in a VOP network. Whether you're new to Side Effects Software's popular 3D production program or a seasoned graphic artist just interested in better acquainting yourself with the application, you're sure to be well served by this free video tutorial. For more information, including detailed instructions, take a look. Make lighting models in Houdini with illuminance loops.