Privacy Protection Laws Search Results

How To: Social Engineering - Total Guide

Good day to everyone, today I will present some basic and advanced concepts that targets sophisticated attacks on the social basis, also I will write about some steps that can prevent this attacks from occuring, basically we will examine Social Engineering from the angle of attacker and victim, some people who are interested in security and work for middle-sized companys can learn and use something interesting from this post.

How To: Negotiate maternity leave

If you work for a company you are probably entitled to maternity leave. Gather as much info as possible and then have an honest conversation with your employers. With tact and civility should be able to have time to recover with your baby and keep your job too.

How To: Build a slide mechanism for a pipe CNC router

A CNC router machine is probably the most useful tool a hobbyist can own, but the price for a CNC machine on the market is way more than the average hobbyist is willing to spend. You can build your own CNC with very basic tools, little knowledge of machinery, mechanics, or electronics, but be warned, these machines are inherently dangerous, so wear the proper protection and use common sense. At the very least, read the instructions and precautions on every tool you use.

How To: Build a campfire

If you’re camping outdoors, you’ll probably need to know how to make a campfire at some point. Fire is an important tool to have for cooking food and purifying water, for warmth and light, and for protection from wild animals at night. In this video series, learn the proper way to make a safe, long-burning campfire. Our expert, Brian Rajchel, will show you how to choose the right area in your campsite for the fire, how to build a fire pit, how to start a fire without matches, and how to prope...

News: The GOP Race

It seems the Republicans aren't happy about Obama. But then again, they never will be. As the time for re-election draws near, the Republican Party is scrambling to chose their candidate who will beat Obama. So far, Mitt Romney (we'll discuss the candidates soon) has somewhat dominated the scene, with spurts of awesomeness from Rick Santorum and Newt Gingrich. Ron Paul stays steady, currently holding the second most number of delegates (yes, we'll go over terms also).

News: Block Cell Phone Signals on the Carrier of Your Choice by Hacking a Radio Frequency Jammer

Cell phone jammers, a DIY endeavor for the darker crowd. I'm pretty sure we've all considered having one at some point: whether the obnoxiously loud woman next to you is announcing private bedroom stories to a crowd on the subway, or your kids are grounded from using the phone (and consequently snagged a hidden prepaid phone), sometimes having a cell phone jammer comes in handy.

How To: Install Windows 8 Beta on VirtualBox

Windows 8 Beta (Developer Preview) It wasn't that long ago Windows 7 was released - now Windows 8 Beta is here. I did do a Google search to see when the stable version will be out but wasn't able to find an official statement from Microsoft. However - I saw several articles on Google hinting that the final release might be in August or there about.

How To: Chain VPNs for Complete Anonymity

Big name individual hackers and hacker groups everywhere in the news are getting caught and thrown in jail. Everytime I see something like this happen, I won't lie, I get a little sad. Then I wonder, how are these guys getting caught? If a group like LulzSec, with all the fame and "1337-ness" can get caught, I think my hacker comrades are doing something wrong.

Secure Your Computer, Part 4: Use Encryption to Make a Hidden Operating System

This is Null Byte's fourth part in a series about fully securing our computers (Part 1, Part 2, Part 3). In our last Null Byte, we went over how to encrypt an entire operating system to protect our data, however, this doesn't fully protect us. In the case of legal extortion, the government can actually make you give up your cryptographic key to your computer so that they can look through it.

News: Google+ Pro Tips Weekly Round Up: Google Cleans Up

It’s been a pretty big week for Google, and Google+ itself. There were a number of articles proclaiming the end of Google+, because allegedly traffic dropped over 60% after it opened to the public. Then +Steve Yegge accidentally posted a long rant on Google+ itself, which was originally meant only for Google employees and colleagues to see. Interestingly enough, the most inflammatory content wasn’t actually about Google itself, but about the horrible work environment at Amazon. The accidental...

Google+ Pro Tips Round Up: Week 8

It's been an eventful week for Google+. Facebook decided to up its game and start rolling out several major updates intended to address privacy concerns. We got a glimpse into the future of Google+ via an insightful discussion between +Bradley Horowitz and +Tim O'Reilly. And Google decided to integrate the +1 button more fully with Google+ by allowing users to share directly from the +1 button. That's not all, though—scroll down for more news & updates that occurred in the past week.

Bethesda vs. Notch: Does 'Scrolls' Infringe Upon 'The Elder Scrolls'?

Minecraft might still be in development, but that doesn't mean a creative guy like Notch doesn't have time for other projects. A few months ago he and his company Mojang announced their second game, a digital collectible trading card affair called Scrolls. A simple title (perhaps too generic if anything), but it's not the name of an extant game, and it's appropriate given the visual style and card-based gameplay of the game itself.

How To: Protect Your Facebook Reputation with Reppler

Do you know how you are perceived by your peers? In real life and online? In the physical world, you could be seen as intelligent, thoughtful and hard-working, but on the Web you could be looked at as irrational, selfish and slothful. There's just something about the Internet that takes away a person's judgement and replaces it with impulsiveness—especially when it comes to Facebook.

News: New Biometric Device Steals Fingerprints from 6 Feet Away

Dactyloscopy isn’t going anywhere. Forensic science has much relied on fingerprinting as a means of identification, largely because of the massive amount of fingerprints stored in the FBI’s biometric database (IAFIS), which houses over 150,000 million prints. And thanks to the departure of messy ink-stained fingertips, biometric analysis isn’t just for solving crimes anymore.

News: Who Needs Fancy Kitchen Gadgets? Pliers & Hairpins Will Do Just Fine

After stumbling across an interesting article by Hanne Blank—(apparent) hobbyist chef and widely known activist on the issues of weight, bisexuality, and sexuality—I've become even more fascinated by kitchen shortcuts. Former Microsoft CTO Nathan Myhrvold's recently released Modernist Cuisine also spurred a similar interest, particularly after reading a WSJ piece in which Myhrvold attests —by law of science, of course— that a ¼-inch-thick sheet of steel is more than adequate in place of an ex...