Parliament Passed Search Results

How To: PIN-Protect Photos, Log-in Credentials, Credit Card Info, Notes, & More with Keeply

In the weeks before Apple officially released iOS 8, consumers were abuzz over rumors that a new feature would password-protect your photos and text messages from prying eyes. Unfortunately, this ended up being untrue, though we did cover some alternatives to protecting your important information using some built-in features and a third-party app. Now, there's a new iOS app that can do it all.

How To: Your iPhone's Screen Will Turn Off Faster if You Disable This Setting

Have you ever noticed that when you put your iPhone to sleep, it takes an extra second longer than it probably should for the screen to go black? It's a bit strange and forces you to wait another moment until your iPhone locks. But most of you can avoid the small delay entirely by just changing one setting.

How To: Security-Oriented C Tutorial 0x11 - Command Line Arguments

In many programs on Linux, you'll come across programs which allow you to specify additional arguments instead of just simply running the program by itself. If you've used the Kali distribution, I'm more than certain you'll have come across these with the command line tools, else if you have been following these tutorials, we have already come across three tools which also use the same technique, i.e. gcc, gdb and wc. How do we do this with C? Let's find out.

How To: Remove Stock iOS App, Without Jailbreak (iOS 6)

At first glance, the iOS home screen looks nearly identical to the original release back in 2007. Though those experienced with the evolving iterations of iOS will tell you that the features have changed. Furthermore, with the App Store continuing to explode with (lets face it) better options than the stock software, these included applications are only causing clutter across the springboard.

News: How to Study for the White Hat Hacker Associate Certification (CWA)

Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this certification exam, and what material will be covered on the exam?" Now I have an answer for you. The White Hat Hacker Associate (CWA) will cover 14 domains or areas. Everything you need to know is here on Null Byte. There will be no questions that are not covered here on this site, guaranteed.

How To: Explore and decipher fractal geometry and self-similar mathematics

There wouldn't be any chaos in the world without Benoit Mandelbort— chaos theory, that is. Mandelbrot, who just passed away at the age of 85, pioneered fractal geometry and greatly influenced chaos theory. He spent most of his life working in physics, biology and astronomy, and is best known for his Mandelbrot Set, a mathematical set of points in the complex plane (the boundary of which forms a fractal).

How To: Anatomize the human head, neck and skull

This is a special four-part series on the human head, neck and skull. Medical students can greatly benefit from watch this anatomy video series. Dr. Gita Sinha "dissects" all of the information pertaining to the head and neck. Dr. Sinha is Assistant Professor for the Department of Anatomy & Neurobiology at Dalhouse University. Each of these videos cover a different topic:

How To: Check and replace the fuses on a car

Kim, a staff mechanic of Driverside, demonstrates how to check the fuses in a car. In majority of the cars the main fuse box could be located on the left side of the kick panel situated near the driver seat. Inside the car, he opened a cover stating fuse box (near the driver seat), by turning a small lever, he dispatched the fuse cover with ease. A pilot map can be found behind the back of the cover panel. The Map elucidates all kinds of fuses distributed in the car and their amperages. Then ...