Target Dates Search Results

How To: Use SELinux Targeted Policy to Secure Your Hosts

Hackers often rely on lazy system admins and unpatched vulnerabilities to get access to a host. Keeping intruders off of our machines requires us to update daily, only run the services we need, and read the code, among other things, but we can still make mistakes. Luckily for us, we can limit the damage caused by those mistakes by running SELinux.

How To: Use Google's Advanced Protection Program to Secure Your Account from Phishing

It's easy to have your password stolen. Important people like executives, government workers, journalists, and activists face sophisticated phishing attacks to compromise their online accounts, often targeting Google account credentials. To reduce this risk, Google created the Advanced Protection Program, which uses U2F security keys to control account access and make stolen passwords worthless.

How To: Find Out When Your Nexus Will Stop Getting Android Updates

The beauty of Nexus devices is they receive firmware updates faster than any other Android phone, and keep getting updates for years longer than most of the competition. This means that you can always use the great new features that come along with an Android update, and even more importantly, your phone gets monthly security patches to keep hackers and malware at bay.

News: How to Study for the White Hat Hacker Associate Certification (CWA)

Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this certification exam, and what material will be covered on the exam?" Now I have an answer for you. The White Hat Hacker Associate (CWA) will cover 14 domains or areas. Everything you need to know is here on Null Byte. There will be no questions that are not covered here on this site, guaranteed.

Hack Like a Pro: Advanced Nmap for Reconnaissance

Welcome back, my novice hackers! Reconnaissance is one of the most important preparatory steps to hacking. As I have emphasized many times before here on Null Byte, you must know the operating system, the ports, the services, the applications, and sometimes even the language of the target to be effective. If you haven't taken the time to gather this info, then you are likely wasting your time.

Hack Like a Pro: The Hacker Methodology

Welcome back, my neophyte hackers! Many newbie hackers seem to be confused regarding the process or methodology to employ a successful hack. Most want to simply go straight to the exploit without doing the due diligence to make certain that the hack will work and you won't get caught.

How To: Protect your site from hacker attacks with Google

They are after you from all over the globe. Looking for ways to exploit you. Ways to hurt you. Not political terrorists, but rather "info terrorists." Each month thousands of websites get hacked into and have hidden links inserted into the pages by people wanting their spam sites to rank highly in the search engines.

How To: Delete your iPhone photo library

Well, you've shot one too many compromising photo and it's time to wipe your iPhone photo library. But, for some reason, this isn't the easiest thing to do. Well, with this how-to video, you'll learn how to get rid of those 212 photos of your niece in her sailor suit you thought looked adorable. Those cat climbing photos. Gone. That girl/boy you were recently dating. Bye bye. Delete at will and clear your iPhone photo library.

How To: Create simple and quick brown smoky eyes

Every girl needs a "go-to" recipe, as it were, for looking good. For every girl this "go-to" is different: One gal may fall back to a red lip and neutral eyes when she wants to look hot with minimal effort, while another may work some magic with her smudge brush to create the perfect smoky eye.

How To: Express "to be" in Spanish using ser, estar and haber

In this tutorial, we learn how to express "to be" in Spanish using ser, estar and haber. When expressing forms such as: am, are, was and were you will say "ser" and "estar" in Spanish. The verb "ser" should be conjugated for each of the different tenses that you are using. Often, "ser" is used to ask questions such as: where you are from, what nationality are you, and what things belong to someone. "Ser" is also used to indicate occupation, religion, political party, event locations, date, an...

How To: Add yearly totals from monthly data in MS Excel 2010

New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun, the 679th installment in their series of digital spreadsheet magic tricks, you'll learn how to summarize yearly totals from monthly totals when there Year Criteria is entered as a serial date. See the SUMPRODUCT and SUMIFS functions. Learn about criteria and how to enter it into the SUMIFS functions.

How To: Make a light pan-baked lemon almond tart

Dessert has pretty bad connotations. After all, starving models and women trying to lose weight are often stereotyped as saying "no" to dessert in an effort to cut calories and not look like a piggy in front of friends (or a handsome date). It's pretty crappy, this world that we live in, with so much good food that's so bad for you tempting our every mealtime.

How To: Create a smokey eye look with Urban Decay Naked

Urban Decay's new makeup palette, Naked, sold out within minutes of debuting on Sephora and on Urban Decay's website. Why? Well, with eight universally flattering neutrals and four gunmetal gray shades, you can either do a very neutral, daytime look for work or amp up the glam factor with the smokey gray colors for night.