how to

Our special how to guides are one of the top visited pages of the website. These how to articles revolve around simple and useful tips to improve productivity of your computers, phones and other devices. We try to solve hot searched problems and queries requested by the users in this section.

How to Get Windows 10 at the Lowest Price

Short Bytes : Many of you would be wondering- why I'm writing this "how to get Windows 10 at the lowest price" article when...

One in Every 600 Websites Has .git Exposed, How to Check...

Recently, I read about an innocent mistake committed often by web developers and thought it'd be nice to share it on fossBytes. Developers risk...

How to Build Weather Satellite Images Receiver With $20 Dongle

This "how-to build weather satellite images reciever" is based upon Matt Gray's project on receiving weather satellite image with £8 dongle. Matt Gray is the one...

How To Self Destruct Email With Dmail

Admit it, you have wanted this for a long time. There must have been instances when you regretted sending an email with confidential information,...

How to Create Your Own Google Deep Dream Nightmares in Seconds

Google's Deep Dream robot has been creating one hell of a stir in recent weeks and fossBytes isn't untouched by the same. Last week,...

After ProxyHam’s Disappearance, Here’s How to Make Your Own ProxyHam for...

About two weeks ago, we reported about the Raspberry Pi 2 based WiFi router that provided anonymous WiFi by putting you 2.5 miles away...

How to Install VirtualBox 5.0 In Ubuntu, Debian, Linux Mint, RHEL,...

Virtual Machines are software that are used to run other operating systems within a pre-installed operating system. This self-contained OS runs as a separate...

How Hack.chat Makes Private and Disappearing Chatrooms in 5 Seconds

There is no dearth of instant messaging applications these days and people are addicted to Facebook Messenger, WhatsApp, SnapChat, IM on Twitter, Hangouts and...

Tor Honeypot: How to Hack True Identity of Tor Users

Tor is a free software that is widely used by people to protect their identity and avoid network surveillance. The Onion Router (TOR) stops...

How To Prevent Your Computer From Overheating

An overheating computer spells trouble. You would want your girlfriend to be smoking hot but trust me, neither you want your computer to be...