Private Solutions Search Results

How To: Automatically Delete Spam Messages in Gmail

Most of the spam messages are commercial advertisements, phishing websites and get rich quickly messages that asks users to provide personal details and other confidential information.Spam filters in Gmail prevent its users from these spam messages and restrict them to enter in user’s Gmail inbox.Generally, it acts like a firewall between spam messages and Gmail Inbox.Gmail filters detect the sender’s email address and accordingly send the received messages in Inbox or Spam folder.

How To: Shut Down Your PC and Send Other Commands Remotely Through Twitter Using TweetMyPC

Ever been halfway to work or school and suddenly remembered you forgot to log off your computer? A lot of people are constantly logged in to email and social media accounts, so if you have a mischievous roommate or sibling, this situation could be disastrous. That's where TweetMyPC comes in—it's a free Windows application that lets you send commands to your computer just by tweeting. Image by Twittermania

How To: There's Metal Hiding in Your Pepto-Bismol and Here's How You Extract It

Got an upset stomach or a little heartburn? America's favorite pink pill will cure it right up. But did you know that there's actually metal hiding in those chewable Pepto-Bismol tablets? Yes, metal. Technically, it's a poor metal, but metal's metal, right? Well, we do tend to eat a lot of iron in our diets, because it carries oxygen throughout our bodies, so consuming metallic minerals isn't anything abnormal. But you'd never think that Pepto-Bismol is actually made up of metal.

How To: Fix the Uneven Screen Lifting Issue on Your Google Nexus 7 Tablet

Those new Nexus 7's sure are nice. Unfortunately, a number of those shiny new tablets have a manufacturing issue that makes the screen uneven with the bezel. Google's solution is to have you send it back in, but why waste your time considering the problem can be fixed by simply adjusting a single screw. All you need to perform the adjustment is a guitar pick or coin, and a very small Phillips screwdriver. Also note, opening up your tablet will most likely void your warranty, so consider that ...

How To: Make hot ice from scratch

To make instant hot ice or sodium acetate, first pour two jugs of vinegar minus one cup into a large pot. Then, slowly add baking soda to the mixture and stir it. When the vinegar and baking soda no longer react, stop adding baking soda. Next, add the rest of the vinegar to the pot. Boil half of the solution off and cool it down to room temperature. For better filtering, add charcoal to the mixture. Filter out the charcoal with a wire sifter. Heat up the solution again and filter it through c...

How To: Play YouTube Videos in the Background on Your iPhone — Even When the Display Turns Off

It's pretty clear with all of the annoying "Get YouTube Premium" pop-ups that litter the YouTube app that Google really wants you to pay for its Premium membership tier. That's why you'll see that "Get background play with YouTube Premium" ad after closing YouTube with a video playing — even in iOS 14 which supports Picture in Picture playback. But there are workarounds for background listening on iPhone.

How To: This Best-Selling VPN Is on Sale for Just $12 Today

Now that more people are working from home on unsecured networks and personal devices, hackers are having a field day accessing everything from private browsing histories to personal banking information. A virtual private network (VPN) is the first and most important line of defense when it comes to protecting all of your devices from digital intrusions, but not all VPNs are created equal.

How To: Crack SSH Private Key Passwords with John the Ripper

Secure Shell is one of the most common network protocols, typically used to manage remote machines through an encrypted connection. However, SSH is prone to password brute-forcing. Key-based authentication is much more secure, and private keys can even be encrypted for additional security. But even that isn't bulletproof since SSH private key passwords can be cracked using John the Ripper.

How To: 10 Roblox Settings You Need to Double-Check to Safeguard Your Child's Privacy

Among the younger generation, Roblox rivals major titles like Minecraft as one of the most popular online games out there. In fact, it's common to hear children tell new playmates to "friend me in Roblox!" so they can play together online. There's nothing inherently sinister here, but with all the online interaction, kids' safety becomes a factor.

How To: Hide Your IP Address with a Proxy Server

Proxies can be quicker to use than a VPN for specific applications, like web browsers or torrent clients. Both services will hide your true IP address, but a VPN is slowed down because it encrypts all data through a VPN network, while a proxy just acts as a middleman for fetching and returning requests from a server on your behalf. When speed is needed, go proxy.

How To: Become a Hacker

Many of our members here at Null Byte are aspiring hackers looking to gain skills and credentials to enter the most-valued profession of the 21st century. Hackers are being hired by IT security firms, antivirus developers, national military and espionage organizations, private detectives, and many other organizations.

How To: Get a tattoo to cover a scar or birthmark

Many people wrestle with their ugly scars and birthmarks every day. These are usually quite difficult and expensive to remove, but there is another solution: cover them with a tattoo! Watch this video for tips on getting some ink done to cover a scar or birthmark.

How To: Bizarrely merge photos in Photoshop

Pixel Perfect is the "perfect" show to help you with your Photoshop skills. Be amazed and learn as master digital artist Bert Monroy takes a stylus and a digital pad and treats it as Monet and Picasso do with oil and canvas. Learn the tips and tricks you need to whip those digital pictures into shape with Adobe Photoshop and Illustrator. In this episode, Ben shows you how to bizarrely merge photos in Photoshop.

How To: Use XNEST to log into another local user's account

Have you ever wanted to go into another user's account on your computer but had trouble finding the energy to log out, then log out, only to log back into your own account? Well, here's your solution: XNest will let you log in to another user's account from your account in a virtual way. It's very simple to set up and may just help you with your virtual account crisis!

How To: Solve a ten digit number math problem

Check out this video tutorial on how to Solve a ten digit number math problem. This video will show you the key to solving the puzzle to find a 10 digit number, such that 10 digits are divisible by 10, and the first 9 are divisible by 9, and so on.

How To: Tag like a real graffiti artist

Graffiti— do you have the guts to get out there and tag some property? There's a whole lot more than just spray paint involved. To be great, you'll need things like a sketchbook, pencils, pens, markers, spray can tips, latex gloves, legal (or illegal) wall, and most importantly… creativity. If you think you’ve got what it takes to be an urban graffiti artist, follow these steps to become da ’hood’s next da Vinci.