While we haven't covered Amazon Web Services, or AWS, on Null Byte before, Amazon's cloud computing platform is ripe for attack by hackers, pentesters, and cybersecurity researchers. It's also an excellent cloud hosting service to build or use vulnerable-by-design AWS setups and frameworks.
Check out this tutorial and learn how to get up to speed with the latest installment of Mircosoft Access 2007. Microsoft Office Access 2007 brings you a new look and new features designed to help you get your work done more easily than ever. You'll see differences right away, starting with the Getting Started with Microsoft Office Access page where you can open a blank or existing database, download a pre-built database template, and check out the offerings on Microsoft Office Online.
Ever had your car broken into? Or worse, your apartment? Ever been pickpocketed? Handheld electronics—iPods, iPhones, iPads, GPS devices, digital cameras—are easy to snatch, light to carry, and useful to most. And when they're gone, they're gone.
As a web developer, I often read articles about hackers (from the lowly to the knowledgeable) infiltrating websites via the dreaded 'SQL Injection' method and completely taking control, changing, gaining access, or destroying the owner's data. As a fellow web developer, I'm sure you want to know how to protect against it. Well, here it is! In this article, you will find out what SQL Injection is, what you can do to protect against it, and additional recommendations that are easy to do and onl...
CEO's of IT companies doesn't know this because they are not a hacker. Only a true hacker can become a successful Security head officer.
Have you ever thought of building your own social networking site? Before you get to making websites like Facebook, you need to start off smaller, and this 29-part video series is where to begin with developing a social networking community website . Before you start with these lessons though, make sure you have all the following:
Over the years, the internet has become a dangerous place. As its popularity has increased, it has attracted more hackers looking to make a quick buck. However, as our dependency on the web grows, it becomes increasingly difficult to sever all ties. This means we have to protect one of our weakest points, the password.
Tossing an old Android smartphone with a decent battery into your hacking kit can let you quickly map hundreds of vulnerable networks in your area just by walking or driving by them. The practice of wardriving uses a Wi-Fi network card and GPS receiver to stealthily discover and record the location and settings of any nearby routers, and your phone allows you to easily discover those with security issues.
Welcome back, my tenderfoot hackers! Have you ever wondered where the physical location of an IP address is? Maybe you want to know if that proxy server you are using is actually out of your local legal jurisdiction. Or, maybe you have the IP address of someone you are corresponding with and want to make certain they are where they say they are. Or, maybe you are a forensic investigator tracking down a suspect who wrote a threatening email or hacked someone's company.
Google just unveiled it's biggest search product in recent memory, except this time the search giant is looking to take over the world of virtual objects.
Yea, you enjoy weed, but haven't you ever thought it would be so much easier if you could grow your own? Now now, don't go out and buy a pot and just start growing them in your back yard, there's a process! In this awesome video you will learn how to set up your own massive growing room and then how to grow the cannabis and what to watch for during the growing stages.
With Google's release of Poly API on Thursday, the search giant has found a way to simplify the workflow for AR creators by enabling the ability to integrate its 3D object search engine Poly directly into an application.
Onshore, or on a boat, have you ever wondered what swims below in the dark water? Using standard equipment and a new process, marine scientists can now get a good look at what is swimming by—just by analyzing the water.
This is a short explanation and tutorial on how to grab saved passwords from Google Chrome, ideally from a meterpreter session. The idea behind this is to understand how saved passwords work and how to keep them safe. Let's have some fun :D Understanding Google Chrome Saved Passwords
Databases allow you to store data in a systematic and organized format, making it easy for you to search, sort and edit.
In this six-part video tutorial, learn how to create an access database. The following six parts go over the following:
Ever wanted to find out who stole the cookie from the cookie jar? Take a page from crime scene investigators and get the proof you need.
To start off the process of publishing your access database online we first look at a sample MS ACCESS database with typical formats and a online searchable application where users can search by library name or city and get details of the library. There are 3 steps to publish the database. The first step is importing data which can be done through clicking on the file menu and then click on import data through a Microsoft Access Database. Now select the file you want to import through the bro...
While you cannot directly open a Microsoft Access database file in OpenOffice Base, it is possible to connect Base to an Access database, and manipulate the data contained within it.
In this video tutorial, viewers learn how to detach and attach a database in SQL Server 2005. Microsoft SQL Server is a relational model database server. Begin by opening the Database and show all the tables. To detach the table, right-click the database and select Detach. Make sure that the database is not opened or it will not detach. To attach a database, right-click on Database and select Attach. Click on Add and find the table. Select the table and press OK. This video will benefit those...
With iOS 12, iCloud Keychain has become a more useful password manager for your iPhone with strong password suggestions, password reuse auditing, and Siri support. However, before you jump ship from your current password manager, you should consider all the reasons why iCloud Keychain doesn't make sense as your primary password manager.
If you thought the selfie would only ever be used to bombard your feed on Instagram, you were wrong. Dead wrong. JetBlue is looking to take those selfies and use them to check you in for your next flight.
Hello guys I am ROMEO 64 (sounds weird I guess but who cares. :D).. Alright....Ever wondered what happens when you login to your Facebook account?
In this two part video, Emmon teaches you how to grow your very wheatgrass. That delicious superfood that is ever so necessary to get your day started healthy, and full of energy. No need to go to Jamba Juice, you'll have your own wheatgrass.
MySQL is a database for serving data on the web. This video teaches viewers how to connect to a database and add data in PHP & MySQL. PHPMyAdmin is an interface that allows you to interact with MySQL more easily. Use the form in the program to create a database; choose the name for your database and select 'create'. Next you can create tables within your database, also using the forms provided. Within the tables you can set your variables; PHPMyAdmin has fields that allow you to choose the ty...
In this short video we export a MySQL database table to a Microsoft Excel 2000 spreadsheet using cPanel and phpMyAdmin. You will need to have your login information for cPanel. Once you are in cPanel, go to phpMyAdmin in the database section and find the database you need to export, and export the database as a spreadsheet! See how to customize the exportation of a MySQL database to an Excel spreadsheet in this tutorial.
How to use PHP to login to a MySQL database. Part 1 of 4 - How to Use PHP to login to a MYSQL database.
Over the past week, companies took a variety of approaches to investing in augmented reality. Lampix is backing its own effort to build an ecosystem for augmented reality platforms. Nokia and Xiaomi are teaming up on numerous fronts, potentially including augmented reality.
If there are words that you use often but Swype doesn't know them yet, you can easily add them to the database of your texting program. In this clip, learn all about adding uncommon or unique words to your Skype dictionary so that you can text even faster. You can even add web addresses, e-mails, nicknames and anything else you use often and don't want to tap out.
Watch Jeffrey Scudder demonstrate his GData Python Client Library extension that makes it easy to use Google Spreadsheets as a database in the information cloud.
Learn how create a Point Of Interest (POI) database using Google Earth and KML2CSV. You can upload this file to your GPS or GPS-enabled phone to create custom tracking searches.
This CoffeeCup Web Form Builder software tutorial shows how to create a MySQL database to be used in CoffeeCup Form Builder to build web forms. Mike Lively shows you how to do this using cPanel and the Site Ground server for hosting since it allows an unlimited number of MySQL databases. Start by creating your database in cPanel and then upload the results to CoffeeCup Form Builder.
Learn how to open up your old Access 2003 databases in MS Access 2010. Whether you're new to Microsoft's popular database management application or a seasoned MS Office professional just looking to better acquaint yourself with the Access 2010 workflow, you're sure to be well served by this video tutorial. For more information, and to get started using the Backstage view in your own Access projects, watch this free video guide.
Learn how to create (and tell the difference between) flat and relational databases in FileMaker Pro 11. Whether you're new to the FileMaker Pro database management program or just want to learn how to take advantage of FileMaker Pro 11's new features, you're sure to benefit from this free video tutorial from the folks at Lynda. For more information, including detailed, step-by-step instructions, take a look.
Lyndapodcast teaches you how to create a database using FileMaker Pro 10. You can link one contact with multiple addresses and information and store that into a single database. You can also add content from the web into your FileMaker layout, including maps, pictures and music. You have a security module where you can set permissions for the users using the database. You can also publish the FileMaker database to the web. For this go to File - Sharing - Instant Web Publishing. Another featur...
This video, presented by Cris Ippolite, makes a comparison between flat files and relational databases made with FileMaker Pro 10. It starts by showing that programs like Microsoft Excel uses, what in the databases circles, are called flat files. This flat files have a big disadvantage: it cannot communicate with other files even those have related data. So, instead of using those, if you want to ease your job, you should use relational databases. With databases, the tables communicate betwee...
This data management tutorial shows you how to take a Microsoft Excel Spreadsheet and import it into a MySQL Database using CSV files and PHPMyAdmin in cPanel. Being able to move data from Excel to MySQL is an important part of database content management, so if you use cPanel to manage your databases, you'll want to watch and learn how to import Excel spreadsheets into your MysQL databases.
How to manage user logins by creating a MySQL user login database with PHP. Part 1 of 3 - How to Create a MySQL user login database with PHP.
It seems like every other day there's a new security threat or data leak in the news. Whether it's your credit card PIN or your smartphone's apps leaking your email address, no one wants their personal information out there, especially passwords. And if you use the same email address and/or password for more than one site, the effects of someone getting hold of your credentials can be catastrophic.