Require Assist Search Results

How To: Create a PCB Etchant That Automatically Improves After Each Use

Etching your own circuit boards is tons of fun, but etching requires strong chemicals to dissolve the copper plating on blank circuit boards. The normal ferric chloride solution works well, but can be expensive and leaves permanent stains. Luckily, we can whip up our own etchant at home with everyday chemicals! Better yet, our new etchant will turn an eerie green color rather than the dull brown of ferric chloride.

How To: Design Your Own Custom Arduino Board Microcontroller

Microcontrollers are great. You can do anything from water your garden to catch wildlife trash diggers in the act—and on the cheap. I prefer to use the Arduino microcontroller because of the large and helpful community built around the website. Though it is my favorite, there are some drawbacks to using an Arduino board in every project. It gets expensive, the board can take up too much space, and the rat's nest of breadboard wires are a pain to repair.

How To: Wildlife Photography with a DIY Motion-Triggered Camera

Even if you live in a big city, chances are you have some wild raccoons or foxes that cannot abide a vertical trash barrel. While apparently omnipresent, these phantasmic critters usually vanish in the night leaving only a shameless trail of refuse you never wanted to see ever again. While I haven't found a way to stop them, I can help you snap some photos of the dastardly creatures.

News: Killing American Citzens

US can legally kill Americans in terror groups You read it right. The US can now target Americans who are supposedly part of terrorist groups. Here's my analysis of Attorney General Eric Holder points (keep in mind though, these are point's brought up by MSNBC, original article here):

How To: Read a Poem

How to Read a Poem Poems can be read many ways. The following steps describe one approach. Of course not all poems require close study and all should be read first for pleasure.

News: The Basics Of Website Marketing

Search engine optimization (SEO) is now one of the most important topics for website owners to understand. Anyone that depends on their website to bring them business needs to know the ins and outs of SEO in order to maximize their website’s potential. And if you want your website to have a high Google rank then SEO is essential.

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services

For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. Before someone can learn how to root a box, they need to learn how not to be found. I can not stress that point enough.

News: The Right Linux Distro

As many of you Null Byters may know, I was planning on writing this article a week or two ago. Better late than never! So, let's get right to it then—choosing the right Linux distro for your needs.

Master the Power: How to Make Fluorescent Tubes Glow with Your Bare Hands

I'm sure most everyone has some kind of fluorescent light source in their home; those long white tubes that emit a bright white light when turned on, or maybe a few of the CFL power-saver bulbs. These bulbs actually require very little "power" (i.e. a high voltage:almost no current ratio) to emit light. In fact, static electricity is enough to make them flicker. Inside these tubes is a gas, and when electricity flows through that gas, it gets "excited" and produces light.

Making Electromagnetic Weapons: The Theory Behind EMP Generators

This is the third part of my electromagnetic pulse series (see Part One and Part Two). By now, I've covered the hardware and general concept of electromagnetic pulse generators, but how exactly do they disable electronics? How can an invisible field of energy have such a catastrophic effect on computers, cell phones, and most any other electronics? I'll be answering all these questions in part three of Making Electromagnetic Weapons.

Gov't Involvement: Through The Eyes of The Student

Insight Description: In our government class, each student was required to participate in any branch of government from local such as working with your community representatives; state; working with your senator or an organization and federal; which you can entreat in a presidential campaign. The total number of students who participated was Twenty-one and each individual needed to complete at least Ten hours or more.

Goodnight Byte: HackThisSite, Realistic 1 - Real Hacking Simulations

Last Friday's mission was to accomplish solving HackThisSite, realistic 1. This is the first in a series of realistic simulation missions designed to be exactly like situations you may encounter in the real world. This first mission, we are asked to help a friend manipulate the website voting system for a Battle of the Bands vote count in his favor.

How To: Create a Super Speed Track in Minecraft

Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. There are many ways to get around in Minecraft, from boats to mine carts, but did you know that you can travel even faster on foot? That's right, by creating a running track, players can run at super speeds! Not only is it the single fastest way to travel, it's easy to build as well. No redstone wires required.

How To: Defend from Keyloggers in Firefox with Keystroke Encryption

Null Byte is looking for moderators. More threats to computers exist every day. Not only do we have computer viruses and malware, but we have rootkits and other nasty pieces of code that can log your keyboard strokes or even add your computer to a botnet to attack other websites. Your computer can be infected even if you have anti-virus software installed. I can't stress enough how easy it is for a hacker to write a piece of code that gets around every piece of anti-virus software.

How To: Make Yin-Yang Modular Polyhedra

Last Thursday's post demonstrated how to Make Yin-Yang Pillow boxes, which were based on equilateral triangles and squares. The units for making these boxes were created by Phillip Chapman-Bell, who runs an amazing origami blog and has a spectacular flickr photostream. Using these units, you can make also make 4 of the 5 platonic solids. I made an additional template based on the regular pentagon so that the dodecahedron can be built completing the set.

How To: Safely Overclock Your GPU, CPU & RAM for Better Speed & Performance

Overclocking is quite an awesome thing. When computer components are designed, they are made to run at a certain speed, otherwise known as their clock and bus speeds. These limits are not actually limits. You can overclock components, which essentially makes them go faster than their set limitations. This can save you a lot of cash when newer components come out and you don't have enough money to upgrade. However, when you overclock components, you must be careful and make sure that the machi...

News: Alec Baldwin Kicked Off Plane for Playing Words with Friends

Alec Baldwin loves word games? Enough to get kicked off an airplane? Apparently. Yesterday, while sitting in first class on his American Airlines flight back to New York from LAX, a flight attendant "reamed" him off the plane for playing the popular Scrabble clone, Words with Friends, and not turning off his phone and obeying signs requiring seat beats. Apparently, the aircraft was still at the gate and unmoving. His tweet:

Goodnight Byte: HackThisSite Walkthrough, Part 2 - Legal Hacker Training

Welcome to the closing of the second HackThisSite and programming Community Byte. First and foremost, I would like to ask that people start showing up on time to the Community Bytes. If you need help converting your time zone to PST, go to Time Zone Converter. When users do not show up on time, we have to go backwards and catch everybody up. This wastes time and will also make other users' experience less enjoyable when they have to watch and listen to the same thing 100 times. Punctuality as...

News: Kaplan University's Visionary Voices–A Collection of Ideas on Continuing Educa

Kaplan University presents Visionary Voices, a series of interviews that chronicle our goals in regards to adult education and continuing education throughout your life. Kaplan University offers online degree programs designed to expand the way you think and help you develop both personally and professionally. Students turn to us to develop their critical thinking skills, to challenge and prepare them for successful careers.*

News: Kaplan University Graduate Debra Eppley and her Online Nursing Degree

Kaplan University nursing alum Debra Eppley was already working in the nursing field when she started her RN-to-Bachelor of Science in Nursing completion program (RN-to-BSN program). Kaplan University’s flexibility and support offered her the opportunity to complete her degree online while continuing to work. Once she completed her Bachelor of Science Nursing online, she was able to make a career move that not only increased her salary, but also her level of job satisfaction.

How To: Recover Deleted Files in Linux

File recovery on Linux is a bit different than Windows. It requires different software than the Windows counterparts because every OS has their own file system. Windows uses NTFS, or FAT file systems, while on the other hand, Linux uses ext-based file systems. I personally use ext4 file system because it's the latest and greatest ext-journaling system and supports a large level of directory recursion and file sizes, but most installations still use ext2 or ext3. When files are deleted from a ...

How To: Permanently Delete Files to Protect Privacy and Passwords

Permanently deleting files is something that a lot of people aren't aware of. Actually, most people think that once a file is deleted, it is gone forever. This is not the case. Hard drives write to the disk via magnetic charges, positive and negative correlate to 1s and 0s for binary. This is then interpreted into information for the computer to use and access.