Personal Identity Search Results

How To: Find your Blackberry Messenger PIN

One of the coolest features on a Blackberry is BBM or Blackberry Messenger. BBM allows you to talk to anyone with a Blackberry, anywhere in the world, absolutely free! You can send messages back and forth and you phone will even keep a record of the conversation in case you need to reference something later.

How To: Handle a bridezilla

Is a Bridezilla driving you crazy? Whether the bride gone wild is your sister, daughter, or BFF, you can stop the insanity. Here are some tips offered on how to deal with an out-of-her-mind bride.

How To: Make and roll a burrito

The great thing about burritos is that you can make them to your personal taste and fill them with whatever you like. Today, we are going to fill the burrito with a few of my favorites. We have a base of black beans, rice, some sautéed green pepper and red onion, grated Monterey jack cheese, a little bit of sour cream and some salsa. But again, the fillings are versatile, it is the assembly of the burrito itself that we are going to concentrate on. he first key to making a great burrito, and ...

How To: Block Spam Texts with Samsung Messages

With so much of our personal data floating around the web, it's nearly impossible to get away from spam calls, texts, and emails. Unfortunately, this isn't just limited to the online world — filling in your contact information in a raffle ticket with the hope of winning that shiny new car in the mall, for instance, can often result in getting swamped with spam texts containing sketchy loan offers.

How To: Mine Twitter for Targeted Information with Twint

Open-source intelligence researchers and hackers alike love social media for reconnaissance. Websites like Twitter offer vast, searchable databases updated in real time by millions of users, but it can be incredibly time-consuming to sift through manually. Thankfully, tools like Twint can crawl through years of Twitter data to dig up any information with a single terminal command.

How To: The White Hat's Guide to Choosing a Virtual Private Server

Conducting phishing campaigns and hosting Metasploit sessions from a trusted VPS is important to any professional security researcher, pentester, or white hat hacker. However, the options are quite limited since most providers have zero-tolerance policies for any kind of hacking, good or bad. After researching dozens of products, we came out with 5 potentials that are ideal for Null Byte readers.

News: Want to Make Your Own Live Broadcast? New Facebook App Aims to Help

Facebook, you either love it or you hate it ... or maybe you're indifferent. The point is, Facebook is everywhere, and the debate is still raging over whether or not it's actually, well, good. That debate may not exist for the various personalities of Facebook much longer, however, as Facebook announced a new app geared directly towards improving how they broadcast their content to their audiences.