Private Partnership Search Results

News: iPhone App = Confessional Aide = Absolution (Yeah, Right)

I'm not going to lie. I was Catholic. But one of my reasons for my faithful departure was having to tell my innermost secrets— my sins— to a silhouetted figure behind a latticed screen. With the creepy enclosed booth structure and separation of sinner and confessor, its anonymity was clear, yet deceiving. You always knew the priest and he always knew you. If I wanted total privacy, was there really a need for this intermediary to God?

How To: Prevent Social Networks from Tracking Your Internet Activities

+Nik Cubrilovic discovered last week that Facebook could track your web activities even after you logged out of your Facebook account. After some blatant denials from Facebook spokespeople, Facebook decided to fix the logout issue, but not before +Michael Arrington, on his new Uncrunched blog, made a concise post revealing Facebook's dishonesty: Facebook submitted a patent application for "tracking information about the activities of users of a social networking system while on another domain...

News: A Quick Homage to Our Benefactor

Without Richard Channing Garfield the world would be a much grayer and less interesting place today, at least for all of us. He created Magic in college, playtested it throughout, accidentally found a publisher for it, and wound up the the most well-known and successful paper game designer in the world (sorry Guygax, make something new why don't ya?). He does not seek the limelight, has not had a snappy biography written about him (or his game, amazingly enough) and I thought we should pay a ...

Uncrackable: Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt and decrypt as you need. GPG is a great open-source version of Pretty Good Privacy (PGP), a similar application used for encryption, but licensing and patent problems led to the development of GPG in its wake.

How To: Make Your Laptop Theft Proof

The dreaded moment you hope never happens—someone has stolen your laptop. You could have private information, pictures, or even private information belonging to the company you work for, all lost forever. It can cause you pain, money, or even a job.

How To: Make Someone Look Skinny with the Liquify Tool in Adobe Photoshop

Want to know how to remove a digital tag from a garment for (in this case) a pair of shoes? This clip will teach you what you need to know. Whether you're new to Adobe's popular raster graphics editing software or a seasoned professional just looking to better acquaint yourself with the program and its various features and filters, you're sure to be well served by this video tutorial. For more information, including detailed, step-by-step instructions, watch this free video guide.

How To: Encrypt your Skype Messages to Thwart Snooping Eyes Using Pidgin

Skype is a great service. It allows a free solution for VoIP to VoIP calls, and cheap VoIP to landline calling. However, a very disturbing, little known fact that might push you away from Skype does exist. If you closely read the terms of service agreement, it clearly says that Skype is allowed to decrypt your messages whenever they please. Here at Null Byte, we tend to enjoy our anonymity, don't we?

How To: Protect Your Facebook Reputation with Reppler

Do you know how you are perceived by your peers? In real life and online? In the physical world, you could be seen as intelligent, thoughtful and hard-working, but on the Web you could be looked at as irrational, selfish and slothful. There's just something about the Internet that takes away a person's judgement and replaces it with impulsiveness—especially when it comes to Facebook.

News: Book Review - The Amazing Adventures of Kavalier & Clay by Michael Chabon

I loved The Amazing Adventures of Kavalier and Clay for so many reasons. For its fantastical sense of adventure, set against the real world action and tragedy of the Jews in Europe during World War Two. I loved the opening chapters of Josef in Prague – a city I spent several months in a few years ago and one of the most beautiful places I’ve been. Reading scenes set in Prague and descriptions of places I’ve seen made the story that much more personal for me.

How To: Safely Log In to Your SSH Account Without a Password

SSH is amazing, and we praise its existence on Null Byte for many reasons. Notably, it allows us to reroute our traffic through encrypted ports on our local host to be sent to its destination when on the go. You can even control your home computers remotely over a secure and encrypted connection. This is handy for a multitude of reasons.

Secure Your Computer, Part 3: Encrypt Your HDD/SSD to Prevent Data Theft

Welcome to Part 3 in my series on protecting your computer from prying eyes (Part 1, Part 2). In today's segment, we will be going over drive encryption using the TrueCrypt program on Windows OS. Drive encryption is a technique that masks your data with a cryptographic function. The encryption header stores the password that you have entered for the archive, which allows the data to be reversed and read from. Encrypted data is safe from anyone who wants to read it, other than people with the ...

What You See Is What You Get: The Street Art of RERO

Inspired by the beauty of traditional signage printed on doors and buildings, Rero is a French graffiti artist who makes a simple, yet heavy mark. Using the universally common Verdena typeface, Rero brands abandoned public spaces in extreme disarray with his own codified messages based on theories of public use of imagery and private property.

YouTube Phreaking: How to Extract a Phone Number from a YouTube Clip

Every key on a telephone keypad has its own sonic signature, a sort of calling card composed of two distinct tones: one high, one low. While it's easy to tell the difference between the individual pitches in a single row—see, for example, this article on using your cell phone as a musical instrument—, it's often difficult to differentiate between notes within the same column. Unless, of course, you outsource the work to a computer! Which is what Uruguayan hacker [Charlie X-Ray] recently set o...

Real Life Cyborg: Man Plans to Implant Camera in the Back of His Head

Professor Wafaa Bilal of New York University plans to soon undergo a surgical procedure that would temporarily implant a camera in the back of his head. The project is being commissioned for an art exhibit at a new museum in Qatar. The Iraqi photographer will be a living, breathing cyborg for an entire year, during which the implanted camera will take still photos every minute, simultaneously feeding the images to monitors at the museum.

News: Think You Have an STD? Pee on Your Phone to Find Out

Relax, it's not as messy as it sounds. Pee-on-a-stick, at home STD tests may be available in UK pharmacies soon, complete with an incredibly convenient app that would save you a trip to the clinic. It works like this: if you suspect you may have an STD, you would pee on a device which is then inserted into your mobile phone. The app then "diagnoses" your sample and returns results.

News: Advertising in Alan Wake

These are great times. It is about time advertisers invaded our video games in the same way they do our driving (billboards), walking (fliyers, posters), and our private home (emails, bulk mail, text messages).

News: Don't cheat!

Cheating ruins everything. Cheating makes game play unfair for others who may be truly competitive and strategic. Cheating makes others disrespect and un-friend you. There can be unforeseen consequences, like getting viruses, trojans or your account hacked from downloading a cheat/bot program. And you will get banned from the game for violating terms of service.

News: Conrad Schnitzler - Conrad and Sohn

What more is there to say about the almighty Conrad Schnitzler? One of the original founders of Tangerine Dream and Kluster (later Cluster), his contributions to the world of German experimental electronic music have been enormous. With album, cassette, and cd releases miles long, his discography would take a lifetime and a pretty penny to catch up to. 'Conrad and Sohn' is a pretty unique release, even for Schnitzler. The album was a private press release that he did with his son in 1981. App...