Post Brand New Search Results

How To: Manage WordPress admin access for different user roles

There's a cool plugin for your WordPress blog called Capability Manager. The Capability Manager plugin is mainly used for the blog which has number of users, each having a different role. In order to manage the WordPress Admin access for each user role, this will help you. With the help of this plugin, you can enable the particular part of the Admin access to fit a particular user role.

How To: Change the oil and spark plugs on an MTV snowblower

It's still pretty snowy out there, thanks to winter's desperate need for attention. But thankfully you've ditched the snow shovel and got yourself a snowblower to help you remove all that blizzard snow from your sidewalks. Unfortunately, like all snowblowers, you'll eventually have to perform an oil change. But no worries, if you have an MTV snowblower, then this video will help you change both the oil and the spark plug in your engine. Plus, see how to gap your spark plug. This also is handy...

How To: Turn High Rise Briefs to Low Rise Briefs for Men

Recently I've been interested in spicing up my choices in undergarments, but as some of you may know, designer underwear for men can be quite expensive. Prices usually range from about $20+ for one pair. With this helpful tip, you can turn any pair of cheap high rise briefs into a fashionable pair of low rise briefs.

News: News Clips - June 6

Collapse At Hand Ever since the beginning of the financial crisis and quantitative easing, the question has been before us: How can the Federal Reserve maintain zero interest rates for banks and negative real interest rates for savers and bond holders when the US government is adding $1.5 trillion to the national debt every year via its budget deficits? Not long ago the Fed announced that it was going to continue this policy for another 2 or 3 years. Indeed, the Fed is locked into the policy.

How To: Who Is Anonymous? How the Wall Street Journal and the NSA Got It Wrong

Over the past couple of weeks, there have been a series of high-profile hacks and leaks. From the rooting of CombinedSystems, to a secret FBI conference call leak, all the way to the distributed denial-of-service (DDoS) attacks on U.S. government sites—with a lot in-between. As governments move to close their long fingers around the free speech that exposes their secrets, this shadowy collective of loose-knit, but like-minded individuals are hell bent on preventing them. Or are they?

Fire Dousing Baby Doll: WTFoto Stock Photo Challenge Winner (Plus Favorites)

For any of you not in the loop, last week marked our first ever WTFoto Challenge. The goal was to find the craziest, most absurd stock photo on the web we've never seen before. There were a lot of WTF images submitted to our community corkboard, and now it's time to announce the results of the stock image showdown. Who will win the the honor of Watermark of Weirdness? Drumroll please, imaginary band leader named Tim Drickles...

Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Final Session)

We had a blast during last week's social engineering calls. One of our attending social engineers was so clever that she convinced several people on Craigslist that lost items were hers, even if it seemed she couldn't be trusted. But females are better social engineers, naturally. Some say that females have a special knack for manipulating men, but I think that's preposterous. I can't see why that would be true in a million years (note my sarcasm).

Weekend Homework: How to Become a Null Byte Contributor (2/10/2012)

We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials on any skill level, and about anything you feel like sharing that...

How To: Encrypt And Decrypt Text In Python

In this article, I'll show you how to create a simplistic AES python based text encryptor. You'll need python 2.7 and PyCrypto (found here). The code is fairly simple, a user enters an encryption key (which basically tells the program how to scramble the text, using an algorithm), then the text to be encrypted. The program takes the key and text and inputs it into the "cryptograph" or code-based algorithm from PyCrypto. PyCrypto can use 16, 24, or 36 character encryption keys, but for the sak...

Weekend Homework: How to Become a Null Byte Contributor

We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowledge. There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials...

News: If Cats Could Play Scrabble...

Do you think humans are the only ones who like the challenge of a good word game? Well, think again, because homo sapiens aren't the only ones up for stimulating their brains. Other species on planet Earth like to play Scrabble, too, and they're the ones most likely to actually play the words HOMO and SAPIENS in a game, both totally legit Scrabble words... by themselves, of course.

How To: How Businesses Can Prepare for Google+

WonderHowTo welcomes guest contributor, +Ryan Crowe - formerly the man behind GPlusTips. Crowe will be providing tips and tricks on how to use Google+ in interesting and innovative ways, and the self-proclaimed Google+ User Experience Enthusiast is nearly ready to launch a website examining social interaction on Google+ called SocioloG+.

News: Mobile Game Developer Fined $50,000 by FTC for Soliciting Emails from Minors

Children under the age of 13 possess insight that can blow the minds of their elders, but not the wherewithal to make important life choices for themselves. This is exactly why there are strict rules against marketing cigarettes to them. In 2000, a law went into effect called the Children's Online Privacy Protection Act that institutes similar consumer protections for our youth's online identities, prohibiting companies from soliciting personal information from children under 13 years of age ...

News: Creating Social Structures in Minecraft

Minecraft is the most basic and barren open sandbox building game. There are a limited number of materials and recipes to craft. But with these few building blocks, people have been able to creatively build some amazing structures and cities. There is a physical limitation, but the beauty of the game is turning that limitation into a strength.

News: From Puppy to Adult in 40 Seconds (+ 3 Methods for Creating Time-Lapse)

What's cuter than a puppy? Not much, especially when you omit all the peeing, barking and furniture chewing, as Remedie Studio did with this sweet time-lapse homage to their beloved pup. Below, watch Dunder the German Shepherd grow from 8 weeks old to 1 year in 40 seconds. Inspired? Make your own time-lapse video and post it to the WonderHowTo company blog. We'll show off the best ones. Here are three different methods to get you started:

An App for Stalkers: "Creepy" Geo-Locates Based on Social Networking Activity

With the globally rampant use of such social networking platforms as Facebook, Twitter, and Foursquare, the issue of privacy has become a prevalent concern for many. And for good reason—there's the violation of Facebook employing user names in ads, the Etsy slip-up, and of course, the everyman act of recklessly sharing too much information via common social media outlets: a night of drinking results in morning after embarrassment, or worst case scenario, sloppy Facebook posts and tweets resul...

News: FarmVille Orchard and Tree Gifting Links

Free Tree Gift Request Links With the new orchards and tree mastery system everyone is looking for more trees! As wishlist requests often end up with errors, I've created this list that will provide links you can put your ID into allowing people to send you the item without getting the "gifterror=notfound" message.

News: "How I’d Hack Your Weak Passwords"- The Art of Cracking

Lifehacker posts an article on the art of cracking weak passwords, courtesy of Internet standards expert, CEO of web company iFusion Labs, and blogger John Pozadzides. Pozadzides certainly knows a thing or two about password logic. (Note: this information is not intended to hack into accounts, but rather to protect you from using weak passwords).