Private Chatting Search Results

How To: Remotely Monitor Your Kid’S iPhone/iPad

Maybe your kids are using iPhone/iPad too much, as a parent, you want to know what they are having to deal with to help guide them through of that. Here is the tutorial on how you can parental control your kids on iPhone/iPad. You are able to monitor as well as take control of their devices. Kids’ activities on iPhone/iPad like SMS, chats, web browsing will be recorded and you can check them remotely with e-mail without getting access to the devices. OK, here comes the steps: Step 1:

How To: Set a password for your BlackBerry Bold

You never know when you may lose your BlackBerry and expose all your personal information to whoever finds it. That's okay, protect private data on your mobile PDA by setting a password. Now you don't have to worry about strangers stealing your secrets anymore. Set a password for your BlackBerry Bold.

News: Block Cell Phone Signals on the Carrier of Your Choice by Hacking a Radio Frequency Jammer

Cell phone jammers, a DIY endeavor for the darker crowd. I'm pretty sure we've all considered having one at some point: whether the obnoxiously loud woman next to you is announcing private bedroom stories to a crowd on the subway, or your kids are grounded from using the phone (and consequently snagged a hidden prepaid phone), sometimes having a cell phone jammer comes in handy.

News: Thankful for the Beauty in a Summer Margarita

I'm most thankful for the simplest things in life...and how they can be so beautiful. Take this margarita I was sipping on a patio with my friends. Just a few friends, chatting...watching the people pass by on a busy street...the summer air so calm and relaxing....and the sip I'm about to take from this beautifully salted margarita. A relaxing moment in time. So simple, yet so precious to me.

News: Minecraft World's Weekly Workshop: Mob Traps

Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Long ago some smart folks figured out how to make water, lava, and some blocks do the mob killing for them. More recently, with the addition of redstone, these mechanisms for resource collection have gotten rather complex.

News: DIY Video Chat Robot Lets You Be Two Places at Once

Want to keep an eye on your home while on vacation? Terrorize your family pet while at work? A homespun telepresence robot might be just the ticket! Luckily, thanks to shrinking hardware costs and the efforts of renowned hardware hacker Johnny Chung Lee, building a physical avatar has never been easier! Lee's robot has two important parts: an iRobot Create and a lightweight netbook running Skype. Notable extras include a wide-angle lens and a plastic stand to raise the computer to tabletop he...

News: HoneyMoon, Birds and the Bees

Spend all day together, laugh together, go on bike rides, go to the zoo, orgo on a romantic Honey Moon, all expenses paid.Set up your private location in a tent, gazebo, or a giant glass cube, anywhere completelysecluded, set up your table, two chairs, maybe some romantic musicpossibly a candle, whichever you desire, hang a fake moon in the middlelather it with sweet sweet honey, then add the last ingredient, see how long your lover can lastwhen the bees are added, this tests true commitment....

How To: Massage away menstrual pain

The menstrual cycle can be very stressful and painful for women at times. This video will show you how to relieve menstrual pains using massage techniques. You will need to find a quiet, private area to do this. Massage away menstrual pain.

How To: Reverse Check a Phone Number

Prank Calls, Masked NumbersWho is calling your phone or your child's? Pranksters use a lot of tricks to make sure they can get on your nerves. Being able to trace prank calls is important because you're not going to learn much from your Caller ID, since most prank callers use an unlisted number - such as, a cell phone number. Many also use special code *67 to mask the number so your Caller ID will show "Blocked Number" or "Private Number". There are a lot of mild cases of so-called phone bull...

How To: Make Someone Disappear on Facebook

Is there a certain someone whose pictures and status updates you would rather not see? Like, ever? Wish you could hide a person on Facebook without publicly defriending him or her? Your new best friend is a Michel Gondry-inspired Google Chrome extension named Eternal Sunshine.

How To: Build your own aquifer

Many communities obtain their drinking water from underground sources called aquifers. If a surface water source, such as a river, is not available, water companies will drill wells into the soil and rock to a water source below. Some homes have their own private wells and must tap into the same ground water sources. In this video tutorial, you'll what aquifers are, how they work, why they are important and, of course, how to build your own model! Build your own aquifer.

How To: Hack a Radio to Pick Up Different Frequencies - Including Law Enforcement & More

Hardware hacks are something I feel we don't get enough of at Null Byte, so today I figured I would introduce a fun one. I've always been a curious hardware hacker. Taking things apart and learning how their internals work has always been a part of my nature. Quite some years ago, my father showed me a really cool trick on how to hack normal radios to scan frequencies that are normally non-listenable. This little hack allowed us to scan frequencies belonging to law enforcement, and even frequ...

How To: Hack Coin-Operated Laudromat Machines for Free Wash & Dry Cycles

Most people have had the unfortunate experience of not having a washer and dryer at some point. Apartments in my area tend to charge at least one hundred dollars extra for the units with washer and dryer hookups, and even more if you want a unit with an actual washer and dryer installed already. If you are young and just starting out, this may be hard for you to manage with your current salary. If you have no washer and dryer, the only alternative is the laundromat.

News: Flaw in Wal-Mart Returns System Allows Major Thefts to Go Unnoticed

We love tearing apart security here at Null Byte. Several years back, upon returning items to Wal-Mart due to a malfunction, I noticed something very peculiar about the way their overall procedure goes. I brought the item up to the desk, and the woman asked if it didn't work, which I responded affirmatively. Without a moment's notice, she takes it right off to the defective items area and asks if I would like cash or store credit.