Potential Privacy Search Results

How To: Crack and open a combination lock

This video won't show you how to crack a safe but it will show you the next best thing: cracking a combination lock or master lock! We do recommend only trying this on a lock you have forgotten the combination to and not other unlawful purposes. Watch this video tutorial and learn how to retrieve the combination from a lock. Hack your own lock or your friends and you have the potential for great practical jokes.

How To: Install MicroG to Replace Google Play Services & Prevent Data Mining

With all the talk about privacy concerns recently, Google's name keeps coming up because they are a very data-driven company. As an Android user, they know basically everything about you based on your device usage. That can easily scare some people off who are worried about their privacy and security. You do have some say in what personal data Google controls, but what if you want total control?

News: Why Facebook Co-Founder's Call for a Breakup Is Focused on the Wrong Target — AR Is Zuckerberg's Next Big Data Bonanza

Next to Apple, Snap is currently one of the most important companies on the planet in terms of delivering products that are moving augmented reality into the mainstream. That's why it's no surprise that Facebook, which is also focused on AR and tried to acquire the company for $3 billion several years ago, duplicates many of the smaller company's features.

How To: It's Not Just Your Camera & Mic — Here's All the Crazy Ways Your Phone Could Be Used to Spy on You

As you're surely aware, your phone can be used against you. Thanks to our cameras and microphones, a clever hacker can obtain access to your device and invade your privacy. But spying isn't limited to just these two sensors — gyroscopes, proximity sensors, QR codes, and even ads can be used to paint a very clear picture about who you are and what you're currently doing.

How To: Make an Anonymous Facebook Profile to Keep Your Personal Data Private

Between the Cambridge Analytica scandal and the revelation that Facebook logs your calls and text history on Android, many are considering joining the #DeleteFacebook movement. But it can be difficult to leave the site, because so much of its content is only available to active users. If you want to keep in the loop without sacrificing your privacy, you'll want to follow the steps below.

How To: Hide Your Active Status in Facebook Messenger to Go Incognito Online

For all of its advantages, Facebook Messenger isn't the best for people who like their privacy. The popular app lets all your Facebook friends know when you're online by default, as well as how long you've been idle, making it impossible to check up with one person without leaving yourself vulnerable to your entire friends list. Luckily, this feature is one you can turn off.

How To: Opt Out of Ad Tracking on Android

Most of the free apps you'll find on the Play Store have ads. These ads are personalized — in other words, they're for products and services Google believes you might be interested in. The way Google knows about your interests is by collecting data from your smartphone, including your location and app usage. While personalized ads have their advantages, the collection of data is unsettling.

How To: Get the Chrome Experience on Android Without Google Tracking You

If you're tired of Google tracking you, but love how Chrome works, CyanogenMod has you covered. Their browser is called Gello, which is based off Chromium, Chrome's open-source counterpart. It's basically a souped-up version of Chrome—without all of the intrusive Google stuff. So if you're uncomfortable with Google displaying personalized ads based on your browsing history, or using your location to bring the "Physical Web" to your phone, you won't have to worry about any of that with Gello.

How To: The FBI Can Spy on Your Webcam Undetected: Here's How to Stop Them

Let's just say it's been a pretty bad year for spies and government agencies and an even worse one for the privacy of U.S. citizens. Edward Snowden blew the lid off the NSA's spy program, and the FBI was recently discovered to have the ability to access your webcam any time they want—without triggering the "camera on" light. Yeah, that means those Justin Bieber lip sync videos you recorded weren't just for your private collection.

How To: Understand saltatory conduction in neurons

This video is a discourse about saltatory conduction in the neurons. According to the author, it begins with the opening of a gate on the membrane of one of the dendrites of a neuron, and positive charge enters through this gate. The positive charge spreads throughout the cell, and gets dissipated as it spreads, so that, by the time it reaches the Axon hillock of the neuron, it is left with very little potential. However, the potential which results from the simultaneous excitement of many de...

How To: Deal with dating a woman who is married

Vanae presents a video about dating a woman who is already married. Monologue to a question presented by a subscriber to her video blog. In her opinion it is not wise or acceptable to date someone who is married or dating already. Reasons to not date a married person and different potential things about what could happen including the block on having a full relationship, the potential karma, and a few other aspects of what this could mean to you.

How To: Avoid accidents in the workshop

One thing you should do every time you approach a tool is think of the worst-case scenarios. Its a bit gruesome to let your imagination take you there, but there is a good reason for it. This simple mental exercise not only raises your awareness of the potential dangers, but essentially shows you exactly what you need to do to prevent injury. This how to video walks you through potential dangers in the workshop and how you can avoid each one.

How To: Build a shadowbox style privacy fence

The video begins with a finished fence being shown as an example of what your final product should look like. The first step is to lay out straight lines with string to create the outline of fence parameter. To set the first post you must dig a five inch hole in the ground which the post is placed in. The post will be set along the string line spaced out about four inches evenly along the parameter. the holes must be filled in with rock or cement to set them securely. You must then nail board...

How To: Stop your friends from sharing your personal information on Facebook

In this clip, you'll learn how to adjust your privacy settings to prevent your friends from sharing your personal information on Facebook. Share pictures with your friends by making photo albums on Facebook. This clip will show you how it's done. Whether you're completely new to the Facebook's popular social networking site or simply require a small amount of clarification on how to perform a particular task on Facebook, you're sure to benefit from this helpful video guide. For more informati...

How To: Protect your privacy with the Mozilla Firefox browser

Want to be as secure as you can while you surf the web? The EFF and the TOR project have brought you HTTPS Everywhere, a Firefox addon that encrypts as many websites as possible. This clip will show you how to use it. It's simple! So simple, in fact, that this home-computing how-to can present a complete, step-by-step overview of the process in just over two minutes. For more information, including complete, step-by-step instructions, take a look.

How To: Delete your Facebook account with extreme prejudice

Are you sick of Facebook's ever-changing privacy practices that opt you into anything and everything without even asking you if you care? Watch this video to learn how to delete your Facebook account. Permanently. Make sure you don't log in for 14 days after your account closure. Free yourself from having to check your Facebook status every 5 seconds, from having to be "connected" to everyone you know and from Facebook itself.

How To: Hide comments on MySpace

Want a bit more privacy in your MySpace account? Here's how to hide comments in MySpace. After you login, you should see a button that says 'edit profile' near the top. If you have a MySpace 1.0 profile you have to go to the 'About Me' section and at the bottom of it type this exactly like you see it here

How To: Restrict users from seeing your content on Facebook

Facebook is one of the most popular social networking sites out there, so make sure you are being safe! Susan Kline shows you in her Facebook Essential Training series how to Restrict certain aspects of your profile. Login to Facebook and view your Privacy Settings. From there you can pick your About Me, Personal information, Wall Post, Photos and more and restrict showing it to people. You can pick everyone, certain friend lists, Networks, and even individualize it down to one person.

Facebook 101: How to View, Delete & Disable Location History Data That's Been Collected on You

Facebook's shadiness when it comes to user privacy has never been much of a secret. The Cambridge Analytica scandal, however, has thrown the company and its practices into the limelight, with users taking their data more seriously than ever. If you're one of those users, you might want to check your "Location History" to see if and how Facebook's kept tabs on your whereabouts.

How To: Read WhatsApp Messages Without Opening Them & Letting the Sender Know

WhatsApp comes with a ton of great features that make it the go-to messaging app for millions of people around the world. Among these is the ingeniously simple Read Receipts that let you know your message has been viewed. If you want to read a message without alerting the sender, however, there are simple tricks you can perform to give yourself plausible deniability.

How To: The White Hat's Guide to Choosing a Virtual Private Server

Conducting phishing campaigns and hosting Metasploit sessions from a trusted VPS is important to any professional security researcher, pentester, or white hat hacker. However, the options are quite limited since most providers have zero-tolerance policies for any kind of hacking, good or bad. After researching dozens of products, we came out with 5 potentials that are ideal for Null Byte readers.