Toggle Secured Elastics Search Results

How To: Use Wireshark to Steal Your Own Local Passwords

Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their computers to protect from various threats. Here are a few things that should always happen when doing business on computers:

How To: Test Drive Gmail's New Interface

Google's hard at work beefing up their new Google+ social network, and while they continue to improve new features like Circles and Hangouts, they haven't lost track of their other online features already widely in use. If you're already a part of the Google+ project (currently closed to invites right now), you've probably noticed the changes in Picasa Web, but Gmail has been getting some great updates as well—and you don't have to be in the Google+ network to use them.

How To: Tie the Palomar fishing lure knot

The Palomar knot is a powerful fishing knot, used to secure fishing line to a fishing lure, snap or swivel. It's great for all kinds of light fishing lines, especially braid, which won't pull out of this knot. It's retains almost the full amount of original strength of the line. Wade Bourne of MyOutdoorTV will show you just how to tie the Palomar knot.

How To: Use PayPal to buy and sell on eBay

New to eBay? Don't worry, setting up an account and buying and selling doesn't take that much effort at all. Everyone who has an Internet connection has at one point come across eBay, to find the perfect gift for their loved ones, to find the cheapest deals on plasma televisions and computers, or to get rid of their dusty, old record album collection in their web store.

How To: Tie the rapala fishing knot

Ever wonder how to tie the rapala fishing knot? Wonder no more. Watch this instrucional knot tying video and find out. The rapala knot is a popular method to tie a lure (such as a rapala!) to a line such that it can move freely and unimpeded by the knot. Essentially the same as the non slip mono loop, the knot has one more step in it's making. Whether this makes it more secure is still up to debate. It does make it slightly more difficult to tighten down neatly, but with practice it can be do...

How To: Tie the mooring hitch knot for boating

The mooring hitch knot for boating is a more secure knot than the better known (and easier to tie) slippery hitch boating knot. The mooring hitch knot holds fast while under tension yet can be released quickly with a tug on the free end. Despite it's name, this is a temporary boating knot and not to be trusted to moor a boat or anything else of value! Hope this knot tying instructional video helps you perfect your mooring hitch boating knot. Enjoy! Tie the mooring hitch knot for boating.

How To: Tie the rolling hitch knot for boating

Watch this instructional video to learn how to perfect your rolling hitch knot for boating. The rolling hitch knot is a secure and easy to tie method of fastening a rope to a post. The rolling hitch knot holds firmly in the direction of the standing line. Not for use by climbers though, just boaters! Pass this helpful knot tying tip along to your friends. Tie the rolling hitch knot for boating.

How To: Tie the square knot for boating

Watch out for this popular knot - the square knot for boating. It is including here as much as to warn you of its pitfalls as to show the proper way to tie it! The square knot is an easy to tie knot that is good for securing non-critical items. It should not be trusted to join two ropes together or to hold down something that absolutely has to stay put. This knot will capsize or jam under load and will also untie itself under movement. This knot tying instructional animation will help you hon...

How To: Tie the figure eight knot for boating or paddling

The figure eight follow through boating knot is one of the strongest knots. (also can be used for paddling). It is generally rated at 70% - 75% of rope strength. Due to it's strength and the fact that it is easy to visually inspect, it is commonly used by climbers as their "tie-in knot" - the knot that connects the climber to the rope. It forms a secure non-slip loop at the end of a rope. For even greater security, finish the tag end with a backup knot such as one side of the double fisherman...

How To: Tie the double fisherman's knot for boating

Watch this boating instructional video to learn how to tie the double fisherman's knot. The double fisherman's knot securely ties two ropes together or can be used to tie the ends of rope or cord together to form the loops. Another use for this knot is to make another baoting knot more secure by tying this knot with the tag end of the rope behind another boating knot, a practice common to mountain climbers. In that case, you are effectively tying one half of the double fisherman's boating kno...

How To: Tie the clove hitch knot for boating

Watch this instructional video on tying boat knots, specifically the clove hitch boating knot. This is a simple all purpose hitch. Easy to tie and untie, it holds firmly but is not totally secure. Make a turn around a post with the free end running underneath the standing part. Take a second turn around in the same direction and feed the free end through the eye of the second turn. Pull the clove hitch knot tight. Voila! Now you know how to tie the boating knot known as the clove hitch knot. ...

How To: Use proper draping techniques during a gynecology exam

In Obstetrics and Gynecology (OB/GYN), doctors deal specifically with the female reproductive organs, which means a lot of visual inspection of the vaginal area. Whether you're a doctor, surgeon, nurse, or nursing assistant, knowing how to properly drape a patient is detrimental to the patient feeling protected and secure with the hospital staff, along with having some privacy. This video will cover different types of draping techniques.

How To: Use LED Flash Alerts on Your iPhone So You Never Miss Another Notification Again

Ringtones and text tones can be annoying, so my iPhone is almost always set to vibrate on silent mode. Unfortunately, that causes me to miss phone calls and text messages when the device isn't in my hands or pockets. While I hate missing alerts, I'm still reluctant to switch to ring mode — and that's where another iOS and iPadOS feature helps out.

How To: Encrypt Your Notes, Photos & Archives with EncryptPad

For anyone wanting to keep information private, plain text is a format of the past. Instead, cheap, powerful encryption is widely available, but often not easy enough to use to attract widespread adoption. An exception to this rule is EncryptPad, an easy to use application that lets you encrypt text, photos, or archives with strong encryption using a password, keyfile, or both.

How To: iOS 12 Makes 2FA for Third-Party Apps & Websites Easy with Security Code AutoFill from SMS Texts

Two-factor authentication (2FA) is a great way to add another layer of security to sensitive third-party apps and websites like Venmo. However, before iOS 12, to log into a particular 2FA-secured app or site on your iPhone, you'd have to memorize or copy the SMS code from Messages, then jump back in a timely manner to log in. Apple's latest iOS version streamlines this process.

How To: 24 Safari Privacy Settings You Need to Check on Your iPhone

Over the years, we've seen security breach after security breach, as well as high-profile data scandals where collected personal information was misused by companies. Apple makes customer privacy a priority, so there have been few issues to worry about when it comes to its services on your iPhone. However, there are still plenty of privacy settings to explore and change, especially within Safari.

How To: Use Private Encrypted Messaging Over Tor

Tor is an excellent obfuscation network for web traffic, and while instant messaging over the network is very useful, it can be relatively difficult to configure. In this guide, we'll look at two synchronous communications platforms (instant messengers) which can be routed over the Tor network, Ricochet and XMPP.

News: Drop That Kindle—Amazon Removes Encryption Support for Fire Tablets (Update: It's Coming Back)

If you have personal information stored on a Kindle Fire tablet, be warned that Amazon has removed encryption support for Fire OS 5. So if you have stuff on these devices...maybe a risque book, or private notes, or pictures you'd rather not let out to the world, now would be the time to remove them. And unless Amazon changes its mind and re-enables encryption, don't use your device for anything personal, as anyone who gets a hold of it will be able to gain access to everything on it.

How To: Inside Bitcoin - Part 1 - Bitcoin and Anonymity

Over the past decade the Internet community has been witness to the rise of many new forms of online interaction. These new technologies have given rise to anonymous networks (like TOR), black markets within the deep web network (like the Silk Road), and even forms of digital currency, or more accurately crypto-currencies, such as Bitcoin. All of these technological advancements have contributed to securing users around the world and protecting their privacy. Therefore it is no surprise that ...

How To: Tutanota for Android, iOS, & Web Keeps Your Emails Private with End-to-End Encryption

In the wake of the NSA scandal and celebrity-photo hacks, lots of people scrambled to find more-secure ways to send text messages, share emails, and surf the internet. Known for their incredibly secure data networks, Germany's email services saw a remarkable increase in new users from across the world. Last year, we covered Sicher, a German app that lets you send and receive encrypted self-destructing messages on your smartphone.

Hack Like a Pro: How to Remotely Grab Encrypted Passwords from a Compromised Computer

Welcome back, my fledgling hackers! There's an evil dictator hellbent on destroying the world, and in one of our last hacks, we successfully compromised his computer and saved the world from nuclear annihilation. Then, we covered our tracks so no one would know what we did, and developed a hack to capture screenshots of his computer periodically so we could track of what he was up to next.