Privacy Protection Laws Search Results

How To: Text Better on Your Samsung Galaxy S4 with This Hybrid Messaging App Based on Android 4.3 & CyanogenMod 10.2

With CyanogenMod 10.2 recently released and the Samsung Galaxy S4 still waiting on Android 4.3, it only makes sense that the coveted features from both firmwares are highly desired by Android owners all over. We've already brought you a feature from each firmware—the cLock home/lock screen widget from CyanogenMod and the Google Play Edition Camera and Gallery from Android 4.3. Now we're bringing you another in the form of an updated text messaging application, ported from both Android 4.3 and...

How To: Become Anonymous & Browse the Internet Safely

We all know about PRISM. The Surveillance Program allowing the U.S Government to access private user information. Such as, Google Searches, Tweets, Facebook Posts, Private Images, and other private user data. "Hiding" yourself can be very difficult, but it is possible. I'm here to show you How to Become Anonymous & Browse the Internet Safely.

My OS: Bugtraq II Black Widow

Welcome back my precious hackerians. Today i would like to promote an OS which i have been using for the past couple months. I'm not talking about Backtrack 5 or Kali Linux. Something even more promising:

How To: Save Snapchat and Facebook Poke Videos to Your Computer

The allure of Snapchat is that all pictures and videos sent through the app vanish a few seconds after being sent. They're completely obliterated not only from the phone, but from the Snapchat server, as well. The popularity of the application has even incited Facebook to release its own real-time picture and video messaging application, aptly titled Poke. One of the biggest criticisms (besides the wave of recent security issues) of Snapchat is that even though the messages self destruct and ...

How To: Opt Out of Facebook's Creepy New Ad-Targeting Partnership with Datalogix

As if you needed another reason to lock down your Facebook profile, the company's sketchy new partnership with data mining firm Datalogix is geared towards giving advertisers more information on what you're doing—even when you're not online. It's just not enough that they can target ads based on your preferences, now they want to know how those ads are influencing your buying habits in the real world.

News: No Transparency, No Trust

Earlier in the week, Obama’s attorney general stated something that is quite alarming. “In this hour of danger, we simply cannot afford to wait until deadly plans are carried out, and we will not,” Eric Holder said during a speech at Northwestern University’s law school in Chicago. It's a very ambiguous statement. Why do people talk like this? Why can't they just talk straight to the point? Well, most of the time it's to hide something. Take a look at this video: What do you think of that! Th...

Lockdown: The InfoSecurity Guide to Securing Your Computer, Part II

This is Part II in the Lockdown: The InfoSecurity Guide To Securing Your Computer series. Before beginning, check out Part I. This article will cover using alternate software to increase your security and will provide you with some information about websites and programs that test a computer's security. It will also guide you to software you can install or follow so you know what programs need to be updated on the computer. Lastly, I will talk about some features that should be disabled when ...

How To: Hack a Radio to Pick Up Different Frequencies - Including Law Enforcement & More

Hardware hacks are something I feel we don't get enough of at Null Byte, so today I figured I would introduce a fun one. I've always been a curious hardware hacker. Taking things apart and learning how their internals work has always been a part of my nature. Quite some years ago, my father showed me a really cool trick on how to hack normal radios to scan frequencies that are normally non-listenable. This little hack allowed us to scan frequencies belonging to law enforcement, and even frequ...

News: Firing Tank Caught at 18,000 FPS Looks Just As Awesome As It Sounds

It's like the H-bomb. In slo-mo, it's stunning. In real life, it's terrifying. The footage below was uploaded by YouTube user NielsBorg, unfortunately lacking in description, but offers the following information via headline: "T90 shot taken by Photron camera at 18000 fps". The T-90 is a brute of a tank, a third-generation battle vehicle used by the Russian Ground Forces and Naval Infantry. The tank contains an autoloader which can carry 22 ready-to-fire rounds, loadable and ready to go in 5-...

News: Digital Picture Frame Snatches Photos from Public Wi-Fi Networks

You're sitting in your favorite café enjoying a hot cup of joe, then you open up your laptop or turn on your tablet computer to get to work, but as always you get sidetracked and head straight for Facebook. Someone just tagged you in a photo, so you check it out, then you see it out of the corner of your eye—your Facebook picture digitally displayed on the wall in a nice, neat digital photo frame.

News: FaceNiff App Allows Android Users to Hack Facebook

Firesheep caused quite a stir when it was released last October, giving both hackers and non-hackers instant access to people's account information when on a public Wi-Fi connection. When logged into an insecure website on the same network as someone with Firesheep, you're giving them access to the cookies that keep you logged in. This is called session hijacking, and grants them easy access to your accounts, like Facebook, Flickr and Twitter. Now, there's an even easier way to do this—a mobi...

News: Indestructible iPhone 4 Case Inspired by Shark Eyes

It's not uncommon for nature to inspire technology and innovative products. Airplanes were inspired by birds, Velcro by burrs and dog fur, bullet trains by owls and kingfishers, and gecko tape by... well, you can probably figure that one out. And one of the deadliest fish ever to swim the oceans has also influenced its share of merchandise; Sharks made humans faster in the water with Fastswim Suits, and now they've helped make one of the most rugged smartphone cases in the world—SharkEye's Ru...

HowTo: Stay Safe Using Public WiFi

For travelers on-the-go, or penny pinchers who like to surf the web for free in public places, there are necessary precautions one must take when accessing sensitive information over a public WiFi connection. For advice on doing this safely, check out Glenn Fleishmann'sguide to staying protecting your private information. Fleishmann outlines how to:

News: Welcome to Photography Contests World!

Welcome to Photography Contests World! The purpose of this world is two-fold. First, it will serve as a directory with featured listings of all types of current photography contests. If you have ever tried to search for a photography contest to enter, then you are aware of how many contests are scattered all over the internet. Photography Contests World will strive to bring you information on as many contests possible in one central location, beginning with mostly USA and international contes...

Do Not Try This At Home: The Human Torch

PopSci's Gray Matter demonstrates again and again what the layman should absolutely Not Try at Home. Which is precisely what makes Gray's experiments so fun. Remember when the mad scientist fully submerged his hand in liquid nitrogen? Today's demonstration also plays with what is (quite reasonably) assumed to be extremely dangerous and painful: torching the human hand.

How To: Use the New Features in Windows Live SkyDrive 2011

Gain control over your files online with Windows Live SkyDrive 2011, just one of the many new features of the newly released Windows Live Essentials 2011. You get 25GB of free online storage and tons of new features. You can store tons of documents, access all your important files and share the plethora of pictures you've amassed, all within SkyDrive.

News: 11 Dirty Tricks Played by Crooked Web Designers

Ever been Privacy Zuckered? Roach Moteled? Friend Spammed? If you've been on the net long, odds are you have — and worse! Fortunately, there's a new resource for keeping track of the web's worst design practices; it's called "Dark Patterns" and it aims to "name and shame" sites that employ "user interfaces that have been designed to trick users into doing things they wouldn't otherwise have done."

How To: Unblock Wall Posts

In the past you may have blocked wall posts so you wouldn't get fuel, goods, and other random things from your applications. But you may wish to rethink this, at least for a while as the new truffle hunting feature requires wall posts.