Utterly Changed Search Results

How To: Hack Together an Accelerometer-Aware Mobile Website by Accessing Motion Sensors in JavaScript

Christian Cantrell, Adobe's Air Product Manager and Evangelist, has released a video to demo websites that take advantage of the motion sensors in a mobile phone, tablet, or laptop via JavaScript. Now, let's take a look through the code and break down the core pieces that you'll need in order to build your own sites that can determine the 2-axis tilt, 3-axis gyroscope, and compass direction of the mobile device it's being displayed on.

How to Detect Liars: 9 Signs to Watch Out For

You suspect somebody is lying to you. What are the signs you should watch out for? Listed below are nine common indicators you should look out for when you suspect a little truth-bending. While a display of one or more of these signs does not automatically indicate guilt, they can be helpful in pointing out something fishy or suspicious in the way the other person is behaving.

News: Keep Your Car Perfect with Winter Car Maintenance Tips

Cars require maintenance no doubt, but it needs pampering even with the change of weather. Like in summer rainy and winter your vehicle is suppose to be looked after differently. It’s always wise to take measures before the onset of the winter season, to save you from the perils. Car owners can follow regular maintenance schedule to have a perfect care of car and it will help them to have hassle free car drive in all sort of weather circumstances even in mercury boiling temperature or spine c...

How To: Hack a Radio to Pick Up Different Frequencies - Including Law Enforcement & More

Hardware hacks are something I feel we don't get enough of at Null Byte, so today I figured I would introduce a fun one. I've always been a curious hardware hacker. Taking things apart and learning how their internals work has always been a part of my nature. Quite some years ago, my father showed me a really cool trick on how to hack normal radios to scan frequencies that are normally non-listenable. This little hack allowed us to scan frequencies belonging to law enforcement, and even frequ...

How To: Defend from Keyloggers in Firefox with Keystroke Encryption

Null Byte is looking for moderators. More threats to computers exist every day. Not only do we have computer viruses and malware, but we have rootkits and other nasty pieces of code that can log your keyboard strokes or even add your computer to a botnet to attack other websites. Your computer can be infected even if you have anti-virus software installed. I can't stress enough how easy it is for a hacker to write a piece of code that gets around every piece of anti-virus software.

How To: GPU Accelerate Cracking Passwords with Hashcat

How to Crack Passwords Faster by Putting Your GPU to Work with HashcatSecurity on the internet is always changing. Not too long ago, having a 10 character password meant that you were safe from all forms of hash cracking. Hash cracking is when you take a string of characters that have been passed through a cryptographic hash and try to reverse them. The normal processors that are housed inside of our computer cases are general purpose. The processors are not meant for handling complex math an...

Goodnight Byte: HackThisSite Walkthrough, Part 3 - Legal Hacker Training

Welcome to the Goodnight Byte for HackThisSite, Basic Mission 4. In Friday's session, we tackled some coding in Gobby. Nothing special, just a few modifications to the NullBot script we made a few session ago, and some education on regular expressions. Apart from coding, we did our scheduled HackThisSite mission. We had to take on some JavaScript, which was a new thing for Null Byte. This mission taught us about client-side HTML manipulation through JavaScript injections. This just means that...

How To: Convert Protected M4P Files to MP3 Songs with iMovie and iTunes

I'm not sure exactly when it happened, but it's awesome that you can now download music from the iTunes Store that's free of DRM (digital rights management) limitations. That was always my biggest problem with buying music from iTunes. Paying a buck for a song that I can only play on Apple devices? Really? That's what finally led me away to other legal music downloading services like eMusic and Amazon.

How To: Find Every Terminal and Skull in Halo: Combat Evolved Anniversary

In this awesome five-part series, the Achievement Hunters break down how to find every terminal and skull in Halo: Combat Evolved Anniversary. Skulls have been gameplay modifiers, and have been a part of the series since Halo 2. Basically, you start a single player level off with a bunch of these guys on to drastically increase difficulty, change the way you play, or induce silliness. The terminals are a fairly recent addition to the series, and give a bunch of back-story on the different cha...

How To: Reveal Saved Browser Passwords with JavaScript Injections

JavaScript is the language of the internet. It is what allows us to create dynamic, interesting webpages that are fast, web-based applications and so much more. The primary use of JavaScript is to write functions that are embedded in or included from HTML pages and that interact with the Document Object Model (DOM) of the page. This is the magic that allows all of what we see to happen, and for our browser to be manipulated.

News: Google+ to Support Pseudonyms, Google Apps & More

Since its inception, Google+ users have been a loud, vocal bunch, and they've made their displeasure known about many issues, especially on the lack of support for pseudonyms, Google Apps, and brand pages. It's been especially galling for many Google loyalists, who found their Google+ profiles suspended, when they ended up violating the Google+ "common name" policy.

Food Photography Contest: Raw Raspberry Ganache Fudge Cake

I'm not a big raw food guy, but me and my girlfriend whipped this raw food cake up from Ani Phyo's recipe. It had walnuts, cacao powder, sea salt, Medjool dates, agave syrup, avocado, and most importantly... raspberries. We didn't follow the directions all the way, but what we came up with was delicious, and like I said, I'm not big into raw food gourmet. I'm not big into cacao either, but it was a nice change from your normal chocolate dessert. It wanted to fall apart, but surprisingly, it m...

News: Cooking on Google+ with the Social Skillet: Interview with Eric McKee

On Google+, one of the very first creative projects using the popular hangout feature revolved around cooking. Foodies +Lee Allison and +Eric McKee decided to start their own "G+ Cooking School", which has now expanded into the Social Skillet. Although neither have formal training, they're both quite accomplished cooks and skilled instructors. Using hangouts, they've taught their students how to create dishes like margherita pizzas and chicken marsala.

News: G+Me Makes Google+ (Almost) Perfect: An Interview with Huy Zing

G+Me is one of our favorite Chrome extensions here at Google+ Insider's Guide. We love it because it's one of the most comprehensive extensions out there. It attempts to address the "noisy streams" issue, with list mode, and collapsible posts and comments. The creator, +Huy Zing, is very responsive to feedback, and he's been quick to address any issues that arise, including privacy concerns. He's even created a G+Me (Paranoid Edition) extension, for the extra careful Google+ user. And if you ...

Bethesda vs. Notch: Does 'Scrolls' Infringe Upon 'The Elder Scrolls'?

Minecraft might still be in development, but that doesn't mean a creative guy like Notch doesn't have time for other projects. A few months ago he and his company Mojang announced their second game, a digital collectible trading card affair called Scrolls. A simple title (perhaps too generic if anything), but it's not the name of an extant game, and it's appropriate given the visual style and card-based gameplay of the game itself.

News: FakeTV Keeps Burglars Away by Mimicking Television Light and Scene Changes

In the last decade, burglary rates in the United States have fluctuated little with over 2 million burglaries each year. In 2009, nearly three quarters of all burglaries were from residential properties, with over sixty percent being forcible entry. But we all know burglars don't like confrontation—they prefer breaking into apartments and houses when its owners are away. And that's why it's a must for apartment dwellers and homeowners to be on the defensive, even when they're not home.

How To: Restore Netflix's Former "Watch Instantly" Web Layout

Netflix may be killing its competitors, but they're losing fans thanks to their reputation for rolling out interface updates without user knowledge or consent. PlayStation 3 owners were upset at the Netflix interface change earlier this year, and now nearly 5,000 diehard Netflixers are irate at the website's new look for its Watch Instantly section.

News: So You Just Bought Photoshop. Now What?

Photoshop. It’s like a mountain to climb. You can chug up to the top, working hard, never letting up, or you can just go part way up and scoot around the side of the mountain and still get to the other side. Not everyone needs to be a Photoshop guru, or ninja pixel punisher. There are a few things to know and be comfortable with in order to do lots of cool things. Here are some tips that will take you a little way up the mountain, somewhat in order of altitude.

News: Fashion Loves the Pixel

Not since JC de Castelbajac's infectiously fun LEGO fashion line have I seen such energetic geek-inspired ware. Japanese designer Kunihiko Morinaga pays homage to ye olde 8-bit days with his extensive catwalk of video game inspired womenswear—ranging from dresses to suits to streetwear. The pixel-printed Fall/Winter 2011/2012 collection debuted during Tokyo Fashion Week under his label Anrealage. Not only did the models don classic pixel prints, but they also strutted to a live pianist perfor...

News: Is Open Source Really Insecure?

To go Open Source or go proprietary? There is a common conception that open-source is unsafe and insecure and therefore companies should rather go for proprietary solutions. They think that because software is termed "open-source", that the world can see the vulnerabilities of the software and might exploit it, and less informed people tend to think that open-source software can be modified while it is running.

News: Unmasked caller ID

Do you'll know a program software to detect unmask caller's for cellphones for abroad network's carriers, as i often travel abroad to Hong Kong ,Japan and Malaysia and i went switch to those networks via changing the States sim card to the local domestic sim card i often received unmasked/private number's callers calling myself but i have not way of finding out who is it?

News: Unmasked caller ID

Do you know a program software to detect unmask caller's for cellphones for abroad network's carriers, as i often travel abroad to Hong Kong ,Japan and Malaysia and i went switch to those networks via changing the States sim card to the local domestic sim card i often received unmasked/private number's callers calling myself but i have not way of finding out who is it?

How To: Safely Share Files Online

Okay, stop me if you've heard this one. You have a document that you want your co-workers' advice on. You attach said document onto a mass email. The first reply comes back with an edited version of the document. You begin to make changes, but another email comes in, with yet another edited version. Soon you're drowning in a desktop folder full of mismatched documents, all with the same name.

News: The New Look of The Philippine Peso

Wow... look at those cash..Congratulations to the designers of the new Philippine Peso currency. Although only a small portion printed are in circulation I finally saw them thru a friend.They really look nice.. And so good to look at..Except for one major thing. The value didn't change. New look same value. For which I don't know how this could help alleviate the growing hunger of the Filipino people.I just wish our economy grows sooner.