One of a Search Results

News: Homeland Security is watching YOU

The department of Homeland Security released a list of 'words and phrases' it uses to search social media for terrorism, and whatever else they decide they are looking for that day. Read some of these. A few are obvious "bomb, nuke" and some "target, event" are just down right vague. More reasons to watch what you do on the Internet. You are not the only one watching!

Winspiration: 16 Crazy Stock Photos to Inspire Your WTFoto Contest Submissions

So far, there have been some excellent entries to our WTFoto Stock Photo Challenge, but the battle is not over yet. You still have a couple days left to submit your best find to the WTFoto community corkboard for a chance to take the crown. Remember, we're looking for an absurd stock photo image that nobody's ever seen before. Entries are due Monday, February 27th, 11:59:59pm PST. One second later and, well... I'll probably just let it slide. But 2 seconds later and you're out!

Hide Your Secrets: How to Password-Lock a Folder in Windows 7 with No Additional Software

Today's guide is on creating a password protected folder on Windows 7 without any additional software. Yes, you heard that right. No extra software at all! This guide is intended for beginners. But please note, this method should not be used to store financial or otherwise highly confidential material. It might be a good place to hide a planning document for a family member's birthday party or similar occasion where you need to keep something secret temporarily.

Important Astronomers: Galileo Galilei

I'm starting a series on the top astronomers, with probably about eleven astronomers that I will be covering overall. So, let's start out from the top, with the top most important astronomer. In my opinion, Galileo Galilei is the top astronomer.

How To: Protect Your PHP Website from SQL Injection Hacks

As a web developer, I often read articles about hackers (from the lowly to the knowledgeable) infiltrating websites via the dreaded 'SQL Injection' method and completely taking control, changing, gaining access, or destroying the owner's data. As a fellow web developer, I'm sure you want to know how to protect against it. Well, here it is! In this article, you will find out what SQL Injection is, what you can do to protect against it, and additional recommendations that are easy to do and onl...

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Two: Onions and Daggers

In the first part of this series, we learned about darknets, as well as how they came about. But these patches of forgotten Internet are not the oasis of free information you might think. Despite being hidden—or just harder to come across—these networks are no more safe then anywhere else on the 'clear' Internet. The nature of networking and routing means your location is always known in server logs. It only takes one phone call to your ISP with your IP address to obtain both your physical ad...

News: Oceania Palace - hidden light trick

My palace for a city that has no fewer than 7 100k block structures (will have 15-20 when the central blvds are finished - map link : http://www.minecraftworldmap.com/worlds/_IgOQ ). Today's tip - at the start of the video - how did I put in the lighting for players to navigate the palace hedgemaze (at the start and end of the video).

News: Photos of Mercury and the crescent Moon

Tonight, I saw Mercury for the first time. Mercury is a hard planet to see, even though it is quite bright, because it's orbit is so close to the sun. The angle Mercury makes with the Earth and the Sun is never more than about 25 degrees and most of the time it is much less. As a result, you can't ever see Mercury during the night but at a couple of times in it's orbit you can see it at either dawn or dusk. Right now, Mercury is close to it's greatest eastern elongation and can be seen low in...

Snapshot: 12w08a

Snapshot: 12w08a brings us a few nice things a few things I'm not so sure about and a few things I just hope Mojang doesn't incorporate into the next official update.

News: The Right Linux Distro

As many of you Null Byters may know, I was planning on writing this article a week or two ago. Better late than never! So, let's get right to it then—choosing the right Linux distro for your needs.

Master the Power: How to Make Fluorescent Tubes Glow with Your Bare Hands

I'm sure most everyone has some kind of fluorescent light source in their home; those long white tubes that emit a bright white light when turned on, or maybe a few of the CFL power-saver bulbs. These bulbs actually require very little "power" (i.e. a high voltage:almost no current ratio) to emit light. In fact, static electricity is enough to make them flicker. Inside these tubes is a gas, and when electricity flows through that gas, it gets "excited" and produces light.

How To: Use Firefox Add-Ons and Greasemonkey to Make Google+ Perfect

Although +Google Chrome has been getting many deserved kudos for its innovations and speed, many people still prefer to use +Mozilla Firefox as their primary browser. If you’re a dedicated Google+ user, you know that there are many Google+ Chrome browser extensions available to modify your Google+ experience. What you may not know is that there are also Firefox extensions you can use for Google+.

News: Astronomical Observing News (2/21 to 2/27)

There's not much going on this week in the skies above, but there are a lot of conjunctions to take a peek at! And of course, there's the comet Garradd that's still showing its tail to us down here on Earth, so make sure to catch it before it's gone. The rest that's going on this week:

Uncrackable: Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt and decrypt as you need. GPG is a great open-source version of Pretty Good Privacy (PGP), a similar application used for encryption, but licensing and patent problems led to the development of GPG in its wake.

Farewell Byte: Goodbye Alex, Welcome Allen

Hello, fellow Null Byters. Today, with mixed feelings, I want to let you know that this is my last official post as the admin of Null Byte. I've come to the decision that I need to spend more time focusing on my studies. Over the past 5 months, I have enjoyed building this community and teaching people unorthodox methods of doing things, creating things, and hacking them. But I'm also excited to be delving deeper into the studies that brought me here in the first place.

News: Need Of Detoxification

Taking good care of our colon should be one of our capital concerns. Do you know that like the air we breathe, the colon additionally becomes polluted with toxins? Toxin accretion will appear for as continued as you continuously eat. These toxins become the account of a abatement in activity and added problems like constipation, gas, bloating, etc. So now, imagine how acceptable activity could be after these toxins!

News: Tactics for Using Stairs in Minecraft

The stair is considered by many people to be one of the, if not the most, versatile blocks in Minecraft. They can completely change the look and feel of a build and increase its quality. In this post, I will highlight just a few of the options you have for using them.

News: Fallout Inspired underground bunker

As my in game name (TehGeekFather) would suggest I tend to like things on the Geekier side of things. Games being one of them. (duh I'm on a Forum dedicated to Minecraft) That being said I am a huge Fallout fan. (NO! not the band. <Sigh>) I'm referring to the post apocalyptic series first developed by Black Isle Studios, the roll playing game division of Interplay, back in 1997. Fallout 1 and 2 were pretty big back then open game play, being able to complete tasks in different ways depending ...