Requests Search Results

How To: remove scams, spams, and stuff you just don't want or need on your Facebook anymore!

Please share this info with all your facebook friends. It's not just Farmville players that are affected by scams and spam! This post will help you keep your facebook account clean and safe. We start by showing you a scam and discussing what is real, then we show you how to remove pages you don't want, and finally how to remove apps you're not using. Please scroll down to which ever part you need!

News: Johnny Cash Fans...Learn "Folsom Prison Blues"

Here ya go... Folsom Prison Blues! Have had so many requests for this one. Now tune in and learn this well loved song introduced by "The Man in Black"!  You will be able to play in a few short hours by watching this easy to follow tutorial vid. I have taught 1000's of students from around the World. My lessons are now available to you for FREE. Go to my site and learn over 170 of the most sought after, popular songs. Also check out: http://www.youtube.com/user/erichandreas

How To: An Entry Level Guide to Finding and Reading Logs (And Maybe Staying Out of Jail)

Big brother is watching when you're playing around on another system—and big brother is that system. Everything from operating systems to intrusion detection systems to database services are maintaining logs. Sometimes, these are error logs that can show attackers trying various SQL injection vectors over and over. This is especially so if they are using an automated framework like sqlmap that can spam a ton of requests in a short time. More often than not, the access logs are what most amate...

Hacking Reconnaissance: Finding Vulnerabilities in Your Target Using Nmap

Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and root boxes, you'll need to learn how to perform the necessary reconnaissance first. In fact, you will spend far more time researching your target then you will exploiting it. In this article, I am going to show you the fi...

How To: Make a Change-of-IP Notifier in Python

In this article I'll show you how to make a simple IP address notifier. The program will text you your new IP address, in the event that it changes. For those of you with dynamic IPs, this is very useful. I'm constantly frustrated when my IP changes, and it's handy to be notified via text when it happens. To use the program, you'll need Python 2.7 or later, urllib2, and a program called "text" (see this article here to get it).

News: Share Music Wirelessly by Tapping Two Android Devices Together

Android users are probably already familiar with the doubleTwist Player (free) from doubleTwist, available on the Android Market. They recently added AirPlay support for users with AirSync ($4.99) that allows streaming to Apple TV and DLNA devices, which is sure to provoke some cease and desist requests from Apple. But their second, newly unveiled feature is more enticing—doubleTap, which adds proximity-based file sharing for Android devices.

HowTo: Stay Safe Using Public WiFi

For travelers on-the-go, or penny pinchers who like to surf the web for free in public places, there are necessary precautions one must take when accessing sensitive information over a public WiFi connection. For advice on doing this safely, check out Glenn Fleishmann'sguide to staying protecting your private information. Fleishmann outlines how to:

How To: The Ultimate Guide to FarmVille Success!

Over the past few months I've written up several helpful How-To guides to help you with various FarmVille related issues. It's about time I put them all in one place so they are easy to find, learn from and share! It has been a pleasure writing for you all and I do hope I have helped you find ways to meet your personal gaming goals!

How To: Unblock Wall Posts

In the past you may have blocked wall posts so you wouldn't get fuel, goods, and other random things from your applications. But you may wish to rethink this, at least for a while as the new truffle hunting feature requires wall posts.

News: Storage Cellar

More Storage is here for all! It takes up less space than a plot and once you expand it to 500, you can get rid of your other barns if need be and it will hold all 500 items on its own!

How To: A Beginners Guide

I've created this guide to give you some ideas for how to progress quickly as well as some basics for how to operate FrontierVille. My tips are merely suggestions based on my experience and you are welcome to explore and play the game at your own pace. I hope you benefit from my posts and look forward to answering questions and bringing you more useful information here and on the Facebook page in the future! (All these blue links take you to more content just like this page, click them for mo...

How To: Find Out Who Unfriended You on Facebook

How many Facebook friends do you have? The average person on Facebook has around 140 friends while some hit the ridiculous Facebook friend limit of 5,000. Facebook states that its services are for people you know in person. I don't think anyone has 5,000 friends in person, do you? Personally, I don't even think Megan Fox has 5,000 friends in person, so how could any regular person have that many? But that's beside the point.

How To: Fix a Bricked iPhone or iPod Touch After a Failed Jailbreak

I can't believe it, but I've actually read about dozens of people getting their iTouch, iPhone, or iPad stuck in a bricked recovery loop and then going out to buy a new one. This is overly unnecessary. When it gets stuck in the recovery loop, some people mistake themselves by thinking that it is impossible to get the device back into DFU (Device Firmware Upgrade) mode. Getting the device back into DFU mode would at least allow us to jailbreak the device, essentially bringing it back from its ...

How To: Hack Wireless Router Passwords & Networks Using Hydra

Leaving your wireless router at its default settings is a bad idea. The sad thing is, most people still do it. Once they've penetrated your network, hackers will change your router settings so they'll have an easy way back in. This allows them to change your network into a shell or proxy so they can forward their traffic anonymously through you when committing other dirty deeds.

How Do You Create Your Own Job: An Example

On Thursday, March 9, there was a news story on the evening news about Khan Academy (NBC News). The story began when Sal Khan started tutoring his cousin in 2004. Since he was in Boston and she was in a different city, he decided to make and post videos on YouTube so anyone could watch the videos. Later he added videos for her brothers and for people that contacted him with requests for other videos. During this time Sal had a job that he later replaced with another job. Today Sal has 2010 vi...

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services

For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. Before someone can learn how to root a box, they need to learn how not to be found. I can not stress that point enough.

Exploiting XSS with BeEF: Part 1

BeEF is an XSS-exploiting framework that lets you "hook" or gain control of victim web browsers. In this part of XSS exploitation, we will be working on finding an XSS-vulnerable website. We can simply do this by Google Dorking.