Varied Subjects Search Results

How To: Pass A Soccer Ball With The Inside Of Your Foot

Passng Technique: The instep pass is the most common way and the most efficient to pass a ball in soccer. It requires the use of your inside foot. Passing a ball is similar to shooting. It requires you to have your plant foot a foot away from the ball. Bend your standing leg, and follow through the ball with the inside of your foot making sure you lean forward and with a locked ankle. In this article I will guide you to help improve your passing by talking about the different things you need ...

How To: Track Down an Apple iPad 2 (All Models) in Stores or Online

If you're a diehard Apple fan, chances are the new iPad 2 caught your eye, stole your heart and emptied your wallet. Who couldn't resist the sophisticated slim-body design or its fascinating new Smart Cover? Well—it seems nobody could. And if you were late to jump on the bandwagon, you're still probably cleaning that dust out of your mouth because it took off without you—leaving the latest and greatest Apple gadget out of your reach.

Minecraft Monster Slaying: How to Surprise Your Aggressors with a Long Drop and Sudden Stop

No one likes having their home invaded, and sometimes you just don't want to have to wait those precious few seconds for someone or something to drown, suffocate, or burn up. This trap utilizes gravity to destroy anyone who may want to pillage your home, be they monster or player. No drowning or suffocating here... they just go splat at the bottom of a deep hole, and you can instantly forget about them.

How To: Pick Basic Tumbler Locks

Professionally and academically speaking, I am a computer scientist, but I also enjoy lock picking as a hobby, so I thought I would share what knowledge I have with this. Before we start doing anything, first we need to understand the fundamentals of how locks work and then acquire and familiarize ourselves with basic lock-picking tools.

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services

For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. Before someone can learn how to root a box, they need to learn how not to be found. I can not stress that point enough.

How To: Safely Overclock Your GPU, CPU & RAM for Better Speed & Performance

Overclocking is quite an awesome thing. When computer components are designed, they are made to run at a certain speed, otherwise known as their clock and bus speeds. These limits are not actually limits. You can overclock components, which essentially makes them go faster than their set limitations. This can save you a lot of cash when newer components come out and you don't have enough money to upgrade. However, when you overclock components, you must be careful and make sure that the machi...

How To: Play Spleef in Minecraft

Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Sometimes it's easy to get overwhelmed with the sheer scale or complexity of a build or group project on your favorite server. Too much stress from any creative endeavour can lead to mistakes, discouragement, or fighting among a community. What better way to relieve stress and entertain the troops than some old fashioned competition?

Getting Started: Essential Tools for Making Pizza

You can make homemade pizza with a minimum of tools, or you can buy the entire yuppie menagerie (and let's face it—if you're a foodie, you probably want the toys). Below is a brief rundown of the different options available. Since I'm a relative beginner to the process, I've also linked out to a few in-depth reviews.

News: Friday Not-So-Indie Game Review Roundup: Combat Racing

Deep in their heart of hearts, most Americans dream of having their car festooned with missile launchers and machine guns. Anyone who cuts them off or looks at them funny in traffic could be dispensed with quick and extreme justice, leaving a real-life James Bond and his passengers free to pursue their American dreams faster than everyone else. Racing games and shooting games are among the two most popular types of video games. So why aren't there more games where one can race cars and shoot ...

News: Is Google+ More of a Threat to Twitter than Facebook?

Much of the press around the launch of Google+ has pitted it squarely against Facebook. This was highlighted painfully for Facebook with their (misguidedly dubbed) "awesome" announcements yesterday. Their launch of a new design, video calling, and group chat might have been exciting, had not Google announced its Hangout feature for Google+ a week earlier (and by the way, introduced their own 1-on-1 video calling inside of Gmail way back in 2008). Hangouts took video calling a step further and...

Project Cafe: The Specs Behind Nintendo's Newly Rumored Console

In the past 25 years, there have been five generations of home video games systems. Since Nintendo changed the world by releasing the NES in 1987, there has always been at least two consoles competing for dominance in the wild west of the games industry. This competition— coupled with rapid advancements in technology—has led to a new generation of battling systems coming out every five years, like clockwork.

News: Amazon Mechanical Turk

It's really a shame that it is so hard for people to make money on the internet these days. The dot com bubble has receded and scams are plentiful on the web. There are, however, a couple of legitimate ways to make a few extra bucks online, Amazon Mechanical Turk, or MTurk for short, is one of them. The idea of MTurk is to hook up programmers with people that do tasks that computers can not, these tasks are called HITs (Human Intelligence Task). These tasks include article creation, creative ...

How To: Sprint HTC Evo 4G Impressions

Spent the weekend with Sprint's new phone, the HTC Evo G4. Specification wise, it's better than Verizon's Incredible and T-Mobile's HD2. Apple will be announcing the new version of their phone this week. If it's comparable to leaked phone shown over at Gizmodo, then to say which phone is better is debatable. The iphone might have a better battery life but the Evo has an unlimited data plan, unlike AT&T's new tier pricing structure.

How To: Play the Snake Game Online (YouTube, Gmail & Facebook)

It's 1976. The hottest arcade game on the market is Blockade (or Blokade), an 8-bit maze game for 2 players. You and your opponent must move your characters around the screen in 90-degree angles, leaving a solid line behind them. Whoever runs into one of the solid lines first, loses. But soon you'll be able to play this fascinating game from the comfort of your own home—

How to Act Like a Food Snob: Molecular Gastronomy Edition

I first heard the term molecular gastronomy while watching an episode of Bravo's Top Chef a few seasons back. Intrigued by the concept, I sought to find out more about this modern, deconstructed type of cookery. If you happen to be around foodies and the topic of molecular gastronomy comes up (which very likely will at some point) you'll want to have a few points to contribute and maybe even give them a run for their money.

How To: Get Rid of Even the Most Extreme Malware and Spyware on Your Grandma's PC

You're sitting in front of your grandmother's Windows XP machine that has the worst infection you've ever seen. Safe mode? No dice. Restore points? They're compromised. Even worse, all of the files are hidden and none of the executables will run! This leaves her computer in a bricked state. Without some serious CPR, it will be lost to you. Sure, you could just reinstall the system, but then you might lose all of that valuable data.

How To: An Entry Level Guide to Finding and Reading Logs (And Maybe Staying Out of Jail)

Big brother is watching when you're playing around on another system—and big brother is that system. Everything from operating systems to intrusion detection systems to database services are maintaining logs. Sometimes, these are error logs that can show attackers trying various SQL injection vectors over and over. This is especially so if they are using an automated framework like sqlmap that can spam a ton of requests in a short time. More often than not, the access logs are what most amate...

Make Your Own Nitrous Oxide: Hilarious Science

If you've ever had teeth removed/minor surgery, you most likely received some laughing gas, or nitrous oxide. This gas creates a happy, lightened feeling, and causes instant laughter. In this article, I'll show you how to make some. BUT BE CAREFUL!!! DO NOT proceed in this experiment unless you have EXTENSIVE knowledge of chemistry!!! Misuse of this procedure could result in the production of LETHAL GASSES! However, the set-up is quite simple, if done correctly should not lead to any issues. ...

How To: The Essential Newbie's Guide to SQL Injections and Manipulating Data in a MySQL Database

No doubt you've seen some of the hack logs being released. One part that stands out over and over again is the heavy database usage. It used to be early on that virus and hackers would destroy data, usually just for lulz. However, with the explosive commercial growth of the Internet, the real target is turning into data theft. You should learn how this happens so you can protect yourself accordingly. Let's take a look at what makes this possible and dare I say, easy.

Tor vs. I2P: The Great Onion Debate

In my recent Darknet series, I attempted to connect the dots on the Deep Web. I covered the two largest anonymity networks on the Internet today, Tor and I2P. While my initial four articles were meant as an introduction, I ended up receiving a lot of interesting comments and messages asking the technical differences between the two. I'd like to thank all of you for letting me know what was on your minds, as you should always!

You Won't Believe They Roll: How to Build Half Circle and Elliptical Wobblers

If you thought the last post on Two Circle Wobblers was wild, then wait until you see what happens when you build wobblers out of two half circles or two ellipses. In both of these cases, the center of gravity still remains constant in the vertical direction, allowing them to roll down the slightest of inclines or even travel a significant distance on a level surface if given a push or even when blown on.

News: G+Me Makes Google+ (Almost) Perfect: An Interview with Huy Zing

G+Me is one of our favorite Chrome extensions here at Google+ Insider's Guide. We love it because it's one of the most comprehensive extensions out there. It attempts to address the "noisy streams" issue, with list mode, and collapsible posts and comments. The creator, +Huy Zing, is very responsive to feedback, and he's been quick to address any issues that arise, including privacy concerns. He's even created a G+Me (Paranoid Edition) extension, for the extra careful Google+ user. And if you ...

News: A Few Helpful Google Search Tips

One of the things I consistently notice amongst fellow internet users is that many people don't know how to properly search for stuff. Google may have served you well in the past, but I'm going to share a few little tricks with you to help make your search results even spiffier.