Provide Secure Search Results

How To: Play A Simple Blues Lead Guitar Lick

There is a lot of mystery and voodoo surrounding blues guitar these days. With the common opinion claiming that in order to play the blues you have to really feel the music and respond with your playing. While this is certainly the case when improvising, I would argue that a good knowledge and understanding of the basic principles of blues guitar can provide even the beginner guitarist with a great sounding set of licks to impress friends and family.

How To: Style Easy Boho Hair

"Boho" hair is natural and free-flowing and doesn't take a lot of time or tools. Often this look is a result of sleeping or a day at the beach. Here we show you how to achieve that look without doing either! Part

How To: Use Fiberglass Filler For Auto Body Repair

Assuring A Proper Repair When Welding Vehicle Sheet Metal Any weld that is performed on a vehicle requires certain steps to assure a proper repair. For example, weld-through-primer must be applied to the welded surface being welded; corrosion protection must be applied to the back side of the welded area, etc. In this article we are going to discuss why fiberglass is required for auto body repair.

News: Piratebay - To be blocked in the UK

To those who may not know about this, the UK high court has ruled that all UK based ISP's are to begin blocking Piratebay. This comes in retaliation to Piratebay's action to take down all torrents and provide only magnet links to the pirated content - a move which releases TPB from liability should they be once more accused of hosting the actual content.

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services

For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. Before someone can learn how to root a box, they need to learn how not to be found. I can not stress that point enough.

How To: Protect Your PHP Website from SQL Injection Hacks

As a web developer, I often read articles about hackers (from the lowly to the knowledgeable) infiltrating websites via the dreaded 'SQL Injection' method and completely taking control, changing, gaining access, or destroying the owner's data. As a fellow web developer, I'm sure you want to know how to protect against it. Well, here it is! In this article, you will find out what SQL Injection is, what you can do to protect against it, and additional recommendations that are easy to do and onl...

Uncrackable: Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt and decrypt as you need. GPG is a great open-source version of Pretty Good Privacy (PGP), a similar application used for encryption, but licensing and patent problems led to the development of GPG in its wake.

How To: Encrypt Your Sensitive Files Using TrueCrypt

Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm here to teach you how to create a general encrypted container—not the complex hidden TrueCrypt volume.

News: Google+ to Support Pseudonyms, Google Apps & More

Since its inception, Google+ users have been a loud, vocal bunch, and they've made their displeasure known about many issues, especially on the lack of support for pseudonyms, Google Apps, and brand pages. It's been especially galling for many Google loyalists, who found their Google+ profiles suspended, when they ended up violating the Google+ "common name" policy.

How To: Defeat SSL in Practice with SSL Strip

SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, whenever you see "https://" in front of the URL in your browser, you know you're safe... or are you?

News: Alfred Knows Where You Want to Eat (iPhone App for Instant Restaurant Recommendations)

Exploring a new city is tough if you're all by your lonesome. But if you have your iPhone on you, you're not alone at all... there's tons of great apps available for discovering the city around you. We've previously featured an app that helps you decide on what bar or club to attend, as well as one that shows you the hidden world unbeknown to most tourists (sometimes even the local population). When it comes to dining out, Yelp helps considerably, but it doesn't provide you with personalized ...

News: Yale Opens Up Online Digital Library with 250,000 Free Images

Yale University has opened up its museum archives to the public in digital form, providing free online access to high-resolution images from its cultural collections, making it the first Ivy League school to do so in this fashion. Currently, there's over 250,000 "open access" images available from their new online collective catalog, with the goal of providing scholars, artists, students and all other worldly citizens royalty-free, no-license access to images of public domain collections with...

Altruistic Hacking: The Rise of the DIY Radiation Detector

Understandably, the tragedy in Japan has substantially risen the level of worldwide radiation-related hysteria. So much so, as an alternative to stampeding health food stores for iodine tablets, crafty individuals and organizations are hacking together personal radiation detectors. Rather than relying on the government, the creation and modification of handheld Geiger counters provides a self-sufficient solution to today's questions regarding radiation. Profiled below, three admirable organiz...

How To: Understand and Provide Indirect Care for CNA Certification

What is Indirect Care? Does it affect the CNA's exam result? Indirect Care entails your behavior in terms of how you communicate with the resident, valuing residents' rights and residents' safety and security. Indirect Care is absolutely important because: (1) it is a graded performance, (2) it has separate score ratings, and (3 )it greatly affects the testees' overall performance during the clinical skills exam.

HowTo: Read Your Own Mind

The days of trundling hoops, hopscotch and painted wooden rocking horses are long since past. The latest trend in toys? Biofeedback. Electroencephalography. A decade into the 21st century, the toy market is awash in products that incorporate functional neural sensors.

How To: Research the job market to find the best job for you

Researching the job market thoroughly and with the correct resources is important to the advancement of your career. Watching this video will establish how to research your career options, find information about companies and familiarize yourself with job titles that are a fit for the degree and/or certifications you have earned as well as your professional background. Find the perfect job today!

How To: Design in Photoshop with patterns from Illustrator

There are a number of patterns built into Illustrator which can be brought over to Photoshop to use as design elements. Learn how to use them with this free video tutorial. For more information, including detailed, step-by-step instructions, and to get started using Illustrator patterns in your own Photoshop projects, watch this helpful guide.