Numbers You Search Results

News: Many Lookup Engines

Hello I have now asked for help a few times, so I figured I should contribute with what I can offer as of right now, which is many valuable sites if you need to look someone up.

How To: Easily Find What Port a Service Runs On and Vice-Versa

I wrote a python script that allows you to easily ask what service runs on a specific port and vice-versa. Now, I am sure that such a program already exists on our lovely linux OS's, but... I didn't think of that before I started, and haven't found it yet. So if you haven't found it yet either, maybe you'll find this of some use. It's just called getport. If I have a port number, and want to know what services run on that port, I do:

News: Why Skim, Low, & Reduced-Fat Milk Are Actually Worse for You Than Whole Milk

I don't drink a lot of milk, so when I do, it's always whole milk. I'll drink two-percent if it's the only kind available, but skim? I'd rather have none at all. Tons of people buy reduced fat milk because they're trying to eat healthier, but to me, the extra calories are totally worth it. And, contrary to popular belief, whole milk is actually better for you anyway. Just like diet soda, the downsides of reducing the number of calories in milk outweigh the benefits. Studies have found that co...

How To: Purchase Your Very Own Cargobob Helicopter in GTA 5 Online

As you level up in online gameplay for Grand Theft Auto 5, certain vehicles become inaccessible—no longer spawning as they regularly would. One such vehicle is the Cargobob helicopter, otherwise known as the largest and heaviest helicopter in the game. If you're no longer able to spawn a Cargobob in GTA 5 and want one for your own, you can purchase one with a little help from YouTube user omgurheadsgone.

How To: Understanding Signature Schemes: How Data Sources Are Authenticated, Secured, & Spoofed

One of the biggest problems in data security is authentication of data and its source. How can Alice be certain that the executable in her inbox is from the venerable Bob, and not from the not-so-venerable Oscar? Clearly Alice wants to know because if this file is actually sent to her by Oscar, the file might not be a game, but a trojan that can do anything on her computer such as sift through her email and passwords, upload her honeymoon pictures, or even turn on microphones and webcams. Thi...

How To: Introduction to Modern Cryptography

Cryptography is the science of keeping secrets, or more specifically, the science of disguising them. As a point of fact, cryptography has progressed quite a bit farther and now encompasses file and message integrity, sender authentication, and pseudo-random number generators.

How To: Fix Your Hacked and Malware-Infested Website with Google

While websites may run smoothly without any noticeable vulnerabilities, there's always the looming threat that any background weakness in the site can be exploited by hackers. Once a site is compromised, it can be difficult to get it fixed without the proper help. Google has recently launched a new series entitled "Webmasters help for hacked sites”, which teaches web developers and site owners how to avoid getting hacked and how to recover their website if it gets compromised in any way.

How To: Still Using Notes? Here Are 3 Better Word Processing Apps for Writing on Your iPhone

As someone who writes an extreme amount, it's a necessity for me to have an organized and multifunctional text editor. The stock iPhone Notes application is useful to an extent, but it sorely lacks in features and design. Writing and text editing applications are nothing new to the iPhone, but many of them are overloaded on features, making it even harder to keep organized. Here are just a few alternatives that I find helpful in my day-to-day writing.

News: Hacker Points Out iOS Security Flaw That Allows iPhone Text Spoofing

Security researcher and iPhone hacker pod2g has brought attention to a flaw in Apple's iOS that allows the user to change the reply address of an SMS message. This bug has been a part of the iPhone's SMS since the first iPhone in 2007, but Apple has yet to address it. Basically, there's a section in the text payload called User Data Heading (UDH) that controls some advanced features, one of which is the reply address. By changing the reply address of a text message, you can make someone send ...

How To: Input values & formulas into a cell in Excel macros

This video shows how to enter values into cells using Excel macros and Visual Basic. This includes a sample Expense Report that is used in this demonstration. In this demonstration, we will create the macro that inputs a title as "Expense Report", Three columns i.e. "Date", "Item" & "Amount", and the summery field as "Total Expenses", as well as the formulas located at the respective cells. Now, we're going to use two keyboard shortcuts i.e. "Alt + F11" to open-up the VBA window and "Alt + F8...

How To: Find the geometric mean

It doesn’t matter how long ago your last geometry class was, you can still impress your friends by finding a geometric mean. The geometric mean can be used to find the average of numbers with out unusually high or low results effecting the result.

How To: Calculate NPV & IRR with a TI BAII Plus calculator

The video shows you how to calculate capital budgeting with a Texas Instruments BA2+ financial calculator. Capital budgeting will help you determine cash flows for given investments for a certain number of years in the future, thus helping you determine if the investment is worthwhile. The buttons you will use are the CF (cashflows) button, the NPV (net present value) button, and the IRR (internal rate of return) button. The video uses the example of a $10,000 investment that will return $5,0...

How To: Delete Security Tool from your computer

In this tutorial, we learn how to delete Security Tool from your computer. First, you will need to restart your computer. After this, go to your documents on your computer. Then, type in "Type C:/Documents and Settings\All Users\Application Data". After this, delete the file with all of the numbers. If you now get an error that says "access denied" then restart your computer again. Once the starting screen appears, press "F8", then select safe mode and redo the steps that you just took. After...