Study Engineering Search Results

News: How to Study for the White Hat Hacker Associate Certification (CWA)

Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this certification exam, and what material will be covered on the exam?" Now I have an answer for you. The White Hat Hacker Associate (CWA) will cover 14 domains or areas. Everything you need to know is here on Null Byte. There will be no questions that are not covered here on this site, guaranteed.

News: Why YOU Should Study Digital Forensics

As many of you know, I have been running a couple of series here on Null Byte about digital forensics called Digital Forensics for the Aspiring Hacker and Digital Forensics Using Kali. Although many readers have seemed to enjoy these series, just as many seem to be pondering, "Why should I study digital forensics?"

How To: Use System Repair Engineer to combat viruses & malware

Your Windows computer may be experiencing some issues, and those issues may be a direct result of computer viruses and malicious software from the internet. One of the simplest ways to find these issues and repair them is by using a freeware program called System Repair Engineer (SREng). But that's not all it can do… check out the video to see a basic overview for using SREng.

Social Engineering: How to Use Persuasion to Compromise a Human Target

Social engineering makes headlines because human behavior is often the weakest link of even well-defended targets. Automated social engineering tools can help reclusive hackers touch these techniques, but the study of how to hack human interactions in person is often ignored. Today, we will examine how to use subtle, hard to detect persuasion techniques to compromise a human target.

How To: Read a micrometer in mechanical engineering

In this video tutorial, viewers learn how to read a micrometer. This tool allows the user to accurately measure components. They have the ability to measure dimensions accurately to within one hundredth of a millimeter. Micrometers are designed with a wide variety of styles and sizes for normal or specialized applications. Micrometers are able to measure the internal or external dimensions of a component. They are the most important basic measuring instrument used in the metal industry. There...

How To: Use a multimeter

This video tutorial is in the Home & Garden category which will show you how to use a multimeter to check for continuity, measure resistance and voltage and many more values. Multimeters are like the electrical engineer's Swiss army knife. Multimeters can be of digital or analog types. Before using the multimeter, make sure there is continuity between the two probes. When you connect the two probes with each other, it will beep indicating that there is continuity and then you can go ahead. To...

How To: Play online multiplayer well as any class in Killzone 3

Killzone 3 is the biggest shooter to hit the PS3 in quite some time, and one of it's few awesome unique IPs. This video will teach you how to not be a n00b in this awesome game while using the Marksman (hint: spawn trapping), Infiltrator (stabby stab), Engineer (helps Marksman with ammo for more spawntrapping), Medic (revives Marksman for more spawntrapping), Tactician (spawn-point seizing) classes. Spawn

How To: Make a Blue Mediterranean gin cocktail

In this video, Derrick Schommer, sales engineer, podcaster and host of Common Man Cocktails shows viewers how to mix up a Blue Mediterranean. This classy gin cocktail is based on Bombay Sapphire gin, teamed with lemon-and-lime Sprite and Blue Curacao for a sophisticated, slightly sweet drink. The Blue Curacao and gin are placed in a high-ball glass with ice, then the drink is topped off with Sprite and a squeeze of fresh lemon juice.

News: Living Bacteria in Clothing Could Detect When You Come in Contact with Pathogens or Dangerous Chemicals

While at work, you notice your gloves changing color, and you know immediately that you've come in contact with dangerous chemicals. Bandages on a patient signal the presence of unseen, drug-resistant microbes. These are ideas that might have once seemed futuristic but are becoming a reality as researchers move forward with technology to use living bacteria in cloth to detect pathogens, pollutants, and particulates that endanger our lives.

NR50: The People to Watch in Mobile Augmented Reality

While the world is only recently becoming aware of its existence, augmented reality has been around in some form or another since the '90s. In the last decade, with the advancement and miniaturization of computer technology — specifically smartphones and tablets — AR has become far more viable as a usable tool and even more so as a form of entertainment. And these are the people behind mobile AR to keep an eye on.

How To: Use Social Engineering to Hack Computers

Today I am going to teach the various ways that you can use social engineering to hack a system. For those of you that have followed my past tutorials, you know that social engineering can unlock a world of possibilities. This is because no matter how many firewalls, no matter how many patches there are on a server, the password is kept in the minds of people...and people, are not as smart as computers.

Prev Page