Refund Policy Search Results

How To: Buy a used or second-hand camera lens

First of all you have to search for a reputed dealer. Then ask him all necessary questions like what sort of lenses shall fit in your camera, what shall be the size of the lens to fit in your camera. If you are going to purchase it online then you have to ask whether the surface of the lens is scratched and marked in any way. Make sure that three is no mould or scratches on the lenses. You can also hold the lens towards the sun or a light source. Do not hold it directly against the sun. Now y...

How To: Purchase merchandise straight from the manufacturer

Paying retail just isn't as good of a deal as buying straight from the manufacturer. To become a buyer, figure out the right manufacturers for you. Initially, you can start this process by doing web research. Surf the internet to find out what manufacturers sell directly to the consumer. Internet access is important for finding product information. Scan the manufacturer's website for online catalogs that describe an item's price, color, model, ID number, and make.

How To: Report a car theft

The first thing that comes to mind when your car is stolen is: ####!! However, once calm, cover these bases when your car is stolen to notify relevant parties and help ensure vehicle recovery or replacement.

How To: Fly stand-by

Need to leave town earlier or later than planned? Flying stand-by is not as simple as it used to be. Learn how to fly stand by - you never know when it may be necessary.

How To: Mod a PS2 slim

This is a tutorial showing you how to mod a ps2 slim. This will allow you to play backups as well as Guitar Hero 2 customs. If you want to learn how to make your own copy I might put up a video for that. This tutorial also shows the swap trick in action.

How To: Bypass PowerShell Execution Policy to Pwn Windows

PowerShell is an essential component of any Windows environment and can be a powerful tool in the hands of a hacker. During post-exploitation, PowerShell scripts can make privilege escalation and pivoting a breeze, but its execution policy can put a damper on even the best-laid plans. There are a variety of methods, however, that can be used to bypass PowerShell execution policy.

News: 12 Android Features We Want to See in iOS 12

I love my iPhone, but it would be a lie to say there aren't some Android features I wish would find their way to iOS. While iOS has plenty of its own advantages, Android has pulled ahead in many other areas. With iOS 12 coming later this year, we're hoping Apple takes a hint from Google and adds some of these awesome features to the iPhone.

Hack Like a Pro: How to Hack Facebook (Same-Origin Policy)

Welcome back, my budding hackers! This is the initial post of a new series on how to hack Facebook. It's important to note here that each hack I'll be covering is very specific. I have said it before, but I feel I need to repeat it again: there is NO SILVER BULLET that works under all circumstances. Obviously, the good folks at Facebook have taken precautions to make certain that their app is not hacked, but if we are creative, persistent, and ingenious, we can still get in.

How To: The White Hat's Guide to Choosing a Virtual Private Server

Conducting phishing campaigns and hosting Metasploit sessions from a trusted VPS is important to any professional security researcher, pentester, or white hat hacker. However, the options are quite limited since most providers have zero-tolerance policies for any kind of hacking, good or bad. After researching dozens of products, we came out with 5 potentials that are ideal for Null Byte readers.

How To: Bypass Windows Passwords Part 1

This is my first article on here, it's based off of a project that I'm working on at school which is on three ways to bypass windows user password's. If all goes as planned and you all would like I'll work on part two and part three and post them as soon as I can. I do have to give credit to Puppy Monkey Baby and The Defalt, both of whom are my classmates at college and have helped me with writing this article.

How To: Deal with a flight cancellation

There's nothing more disappointing than finding yourself all packed and ready to travel when you find your flight has been canceled. You can make the best of the situation by finding out just what you are entitled to or how to best ameliorate the situation.

News: Google Helps Tell the Story of Stonewall in Augmented Reality

Snapchat isn't the only tech company transforming landmarks with augmented reality for Pride Month. About four miles southwest of New York's iconic Flatiron Building, which is getting its own Pride makeover via Snapchat's Landmarker AR, Stonewall National Monument is also receiving some augmented reality treatment by way of the Stonewall Forever mobile app published by the Lesbian, Gay, Bisexual, and Transgender Community Center (better known as The Center) in partnership with Google.

News: Curve's Newest Feature Lets You Go Back in Time

Mobile wallet Curve just released a new feature that lets you correct past mistakes. Sounds incredible, right? Unfortunately, the mistakes you can erase aren't things like forgetting to do an assignment in school, screwing up a job interview, or, well, your ex. However, you can switch the card you want to use to pay even after you've paid with Curve, and that's still pretty cool.

News: Self-Driving Cars Are Coming to New York, but Only for a Limited Time

The east coast is becoming a hotbed for driverless. Sure, the west coast has all of its fancy tech companies testing self-driving cars, but we've got the goods too. Uber has brought the technology to Pennsylvania and will soon do the same in Toronto. (Stratford, Ontario, has plans to test out driverless too!) And today we got some great news: Governor Andrew Cuomo just approved of driverless testing in New York.

News: Spotify Considers Restricting Big Album Releases to Paying Users Only

All you paying Spotify users are about to get another exclusive privilege besides getting out of all those annoying "Ever wonder what it would be like to have Spotify premium?" ads. The Sweden-based company is looking to lower the royalty fees they have to pay to major record labels for their music, by compromising on their policy that all their music be free to paying and nonpaying users. Spotify would for a limited time restrict access on major album releases to their paying subscribers.

How To: Congress Wants to Make Unlocking Smartphones Legal Again—Here's How You Can Help

Whether you have AT&T, Verizon, Sprint, T-Mobile, or any other mobile carrier, chances are your smartphone is sold locked to only work on that specific carrier's network. Sure, you could unlock your carrier-subsidized device, but that would mean breaching the Library of Congress' latest Interpretation of the Digital Millennium Copyright Act—making the whole process illegal. As softModders, boundaries and regulations are things that we don't take lightly, although many times we have to begrudg...

How To: Make Your Nexus 7's Brightness Auto Adjust to Your Preferred Levels in Different Environments

When it comes to our smartphones and tablets, we're always on the lookout for ways to beat the oh so common rapid battery depletion problem that affects practically every mobile device. We'll do anything and everything to keep our battery life at an optimum, from turning off certain features (Wi-Fi and Bluetooth) to removing widgets and applications that use an exorbitant amount of CPU. One of the most popular and efficient ways of saving battery is to lower the screen brightness. Usually, we...

How To: Find Out What Personal Data Your Mobile Apps Are Leaking with Mobilescope

If you use apps on your smartphone, chances are you have no idea what those apps are doing with your information. Just this year, there have been several scandals involving apps transmitting user data, like Path uploading users' entire address books onto its servers, HTC's Security Flaw, and Brewster exposing users' personal information (even Ashton Kutcher's). A new service called Mobilescope wants to make sure you always know where—and to whom—your data is going. Lots of apps copy your cont...

How To: Protect your PC with SkyRecon's StormShield

There are two parts to the StormShield product: The server components (including the relational database and server) and the various agents that run on each endpoint. Among other things, the agent contains a host-based firewall and policy engine that can be customized to control applications and particular endpoint device features such as USB peripherals and registry entries. So watch this tutorial and learn how to protect your PC computer with SkyRecon's StormShield.