Personal Computer Produced Search Results

How To: Handle a Mac freeze

One of the most frustrating events in life is a computer freeze. When your Mac freezes don’t freak-out. Stay calm there are things you can do. And, hey, if you can’t do them, there is a professional out the happy to help you out...for a price.

How To: Scare Your Friends with a Funny, Fake Windows Virus

Who hasn't gone mad trying to fix his/her computer, trying to delete all of the harmful software? It may not be funny with a real virus, but a fake one is. Or course, you can make a simple virus just with Notepad. There's no need to download applications to fool others; in less than 1 minute you will learn how to create a fake virus to scare friends, family or even teachers! Why not?

How To: Keep Your Computer Organized in Windows 7

At some point, we all go from organized to disorganized. Let's assume you are a business executive working in a busy corporate building. Chances are you are going to get a heavy workload and it will impact how clean your workspace is. However, this article is about keeping your desktop clean and clutter free, along with the use of software to find documents you have misplaced.

How To: Generate Electricity From Kinetic Energy

Piezoelectric Energy In this article, I'll show you how to make a small, wallet-sized device that generates electricity from kinetic energy. The concept is simple: Piezoelectricity is the charge that is produced when certain solid materials (commonly ceramic and crystal) in response to mechanical stress. Piezoelectrics have many applications; in speakers, actuators, sensors, even fuses. For more information, click here.

How To: Create a Reverse Shell to Remotely Execute Root Commands Over Any Open Port Using NetCat or BASH

Reverse shells are useful for issuing commands to a remote client when the client is behind something such as a NAT. You might say, "But can't a normal shell or simple SSH tunnel do the same thing?". No, it can't. All over the internet I see a lot of confusion regarding the difference between a normal shell and a reverse shell. Let's clear this up before we get started.

How To: Remotely Control Computers Over VNC Securely with SSH

VNC is a great protocol that you can use on Windows and Linux machines to remotely control computers. This is useful if you need to control your computer when away from home, help your grandma check her email, or help a client with a disk cleanup. VNC is secure in the sense that it requires authentication in order to make the connection, but after that, the data is sent over the internet unencrypted. This means that an attacker could sniff your traffic and snoop everything that's going on. Th...

How To: Use Wireshark to Steal Your Own Local Passwords

Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their computers to protect from various threats. Here are a few things that should always happen when doing business on computers:

News: Is Your Dream Gaming PC Worth It?

The last week has been a trying one for me. On Sunday, there were four computers in my office, three of which were broken. The fourth was not really a computer, but more of a collection of parts that were cobbled together for the purpose of constructing a PC that would sneer derisively at the mere mention of turning down any game's ambient occlusion settings.

News: Google Bets $20K You Can't Hack Chrome

Since its inception in 2007, the Pwn2Own computer hacking contest has been challenging the vulnerability of mobile phones and web-related software. In 2010, the fruit of two full days of hacking came down to the exploitation of the following web browsers: Safari 4 on Mac OS X, Internet Explorer 8 on Windows 7, and Firefox 3.6 on Windows 7. The winners walked away with the successfully hacked computer, plus a cash prize, but they left one Godly browser intact: Google Chrome. Even the savviest ...

How To: Get rid of viruses and spyware on your computer

This is a really serious video. This video tell us about how to get rid of virus/spyware. It is based on JNBJABNK's own experience. She describe some step to destroy the virus which affected the computer. First of all make sure to confirm your system have spyware. Then open my computer folder and trace as quick as possible the infected file. Then run a full virus scan on that file. Delete the virus using the spy ware you have in your computer. On completing that you should restart your comput...

How To: Clean a laptop screen

A dirty laptop screen can be distracting and make it difficult to see what your are trying to work on. Don’t suffer though this for another moment. With products you have at home you can get that screen looking like new.

News: The Chemistry of a Perfect Bloody Mary

A perfect Bloody Mary on a Sunday morning could be the best thing that ever happened to the human race. It's tangy, it's sweet, it's spicy...and there's alcohol. Need I say more? Flavor chemist Neil C. Da Costa's latest project is to investigate the taste sensations created by Bloody Mary ingredients and create tips for making the best Bloody Mary humanly possible.

News: Building-Sized Überorgan Emits Heavenly Music and Farts

Tim Hawkinson is an artist who truly inspires. The Los Angeles based artist creates complex, whimsical sculptures with simple mechanics and basic materials. One of his most notable pieces is the art-world-renowned "Uberorgan", a giant football field sized, fully-automated bagpipe, cleverly constructed with plastic sheeting and pieces of electrical hardware.

How To: Organize and store your personal accessories

In this tutorial, we learn how to organize and store your accessories. First, you will need to have some boxes that are decorated that you can keep scarves in so you don't have to hang them up and take room in your closet. You can also keep your pashminas in the boxes as well, along with summer scarves. You can also use a box that has a divider in it to store your bracelets and necklaces that are large. Store your smaller accessories in a jewelery box, or a box that is similar to a fishing ta...

How To: Check your own blood pressure

In this Diet & Health video tutorial you will learn how to check your own blood pressure. Checking blood pressure is a very important part of your personal health routine. Using machines that are widely available, you can easily and quickly check your blood pressure. The target figure will be 140 over 90. The other parameter is the pulse rate. If you are higher than these figures, you need to take a second opinion and consult your GP. Wrap the arm band around the upper arm above the elbow. Pl...

How To: Call a web service in .NET

Microsoft ASP.NET is a free technology that allows programmers to create dynamic web applications. ASP.NET can be used to create anything from small, personal websites through to large, enterprise-class web applications. All you need to get started with ASP.NET is the free .NET Framework and the free Visual Web Developer. In this tutorial, you'll learn how to call your first web service in .NET. In just few minutes you'll be up and running with your own web service in .NET framework in ASP. F...

News: Space Painting with a Tesla Coil and One Million Volts of Electricity

Nikola Tesla. He was the man behind some of the greatest inventions of all time, including radio and alternating current. But perhaps his most visually fascinating invention is the Tesla coil. While maintaining a low current, it can produce dangerous high frequencies and voltages that can well exceed 1,000,000 volts, discharging it in the form of electrical arcs very similar to lightning.

How To: Downgrade and Jailbreak Your iOS Devices Stock Firmware for the Holidays

Lots of people are going to be getting the latest iOS devices this holiday season. But what good is a portable device if you don't hack it? Jailbreaking on the latest stock iOS, version 4.3.5, is a bit of a trivial endeavor. Not many people know how to downgrade from this firmware to a firmware that can be jailbroken (pre-iOS 5). If you want the added functionality and the complete control over your device that comes with jailbreaking, then read on.