Accounts Lose Search Results

How To: Open a lock using a fork

Have a lock on your bike or shed but you have lost the key? Watch this hacking how-to video and learn the art of picking a lock using a common kitchen utensil. Yes all you need to crack open a lock is a fork for your kitchen drawer. Follow along and see how easy it is to pick any lock with a fork. Open a lock using a fork.

How To: Use Social Bookmarking Sites For Effective SEO

If you know anything about search engine optimization and online marketing then you know that having as many links going into your site from good sources is very important. And if you’re not really experienced at building links or SEO in general then you might not know the best way to get good links for your site. So please read on and I’ll present to you what I feel is the best way to get good quality links for your site.

Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Final Session)

We had a blast during last week's social engineering calls. One of our attending social engineers was so clever that she convinced several people on Craigslist that lost items were hers, even if it seemed she couldn't be trusted. But females are better social engineers, naturally. Some say that females have a special knack for manipulating men, but I think that's preposterous. I can't see why that would be true in a million years (note my sarcasm).

News: Flaw in Facebook & Google Allows Phishing, Spam & More

Here's a nasty little Null Byte. An open redirect vulnerability was found in both Facebook and Google that could allow hackers to steal user credentials via phishing. This also potentially allows redirects to malicious sites that exploit other vulnerabilities in your OS or browser. This could even get your computer flooded with spam, and these holes have been known about for over a month.

Skyrim Hack: Get Whatever Items You Want By Hacking Your Game Save

Here's another Null Byte on hacking our Skyrim game saves. Some of the rarer items in Skyrim are really fun to play with. However, seeing as they are rare, you will probably not see all of the best weapons in the game. Null Byte doesn't take too kindly to games that don't give us the rarest items when we please. Let's beat this game into submission by hacking our game save files via hex editing.

How To: Prevent Social Networks from Tracking Your Internet Activities

+Nik Cubrilovic discovered last week that Facebook could track your web activities even after you logged out of your Facebook account. After some blatant denials from Facebook spokespeople, Facebook decided to fix the logout issue, but not before +Michael Arrington, on his new Uncrunched blog, made a concise post revealing Facebook's dishonesty: Facebook submitted a patent application for "tracking information about the activities of users of a social networking system while on another domain...

League of Legends: Dominion Coming Soon

If you’re unfamiliar with League of Legends, you’re either not into PC gaming or you haven’t spent much time on the internet. Riot Games officially released League almost two years ago, and since then it’s become a huge hit. In fact, the Santa Monica based company recently announced that the DOTA inspired game has 15 million registered users, 4 million unique logins each month, and 500,000 people playing the game at any given moment.

News: Dota 2 Gamers Compete in Unprecedented $1,000,000 Tournament

Most indie game developers will never see a million dollars in their bank accounts, and I certainly doubt that Eul, the anonymous developer responsible for the original version of Defense of the Ancients (DotA), expected to. But now even the fans can earn a little green. Some lucky and talented DotA players are about to win $1,000,000 for playing the unreleased sequel to the free unsupported Warcraft III mod from 2003.

News: The First (Real) Celebrities Arrive on Google+

One of the coolest things about Twitter is the fact that you can get direct access to some of your favorite celebrities, and have one-on-one conversations with them in less than 140 characters. With Google+, you can have the same advantage, but you don't need to feel constricted by the 140 character limit. Although Google+ has been weeding out fake accounts, they do not currently have a system for celebrities to verify whether their accounts are legitimate or not.

Realm of the Mad God: A Free Indie Browser Alternative to World of Warcraft

World of Warcraft has been on top of the world for seven years. No other MMO has come close to challenging its dominance of the genre, and it has generated billions of dollars for Blizzard. They have spent a lot of money adding more and more content, to the extent where the full game with all the expansion packs takes up 65 GB of hard drive space. It is a beautiful game; well balanced, and a milestone in the history of the medium.

How To: Restore Netflix's Former "Watch Instantly" Web Layout

Netflix may be killing its competitors, but they're losing fans thanks to their reputation for rolling out interface updates without user knowledge or consent. PlayStation 3 owners were upset at the Netflix interface change earlier this year, and now nearly 5,000 diehard Netflixers are irate at the website's new look for its Watch Instantly section.

News: Not-Brazil in the Semis!

Not only am I ecstatic that my favorite team moved on to the semifinals, but I'm also so excited to see a team that's not Brazil in the semis! Just like supporting the Yankees, rooting for Brazil was like rooting for gravity. No longer.

How To: Add Formatting to Emails Using Your iPhone's Mail App

Sending and receiving email on the go is made easy with the Apple's "Mail" app on the iPhone. However, up until the release of iOS 5, plain text was the only option for sending emails (even though well-formatted messages could still be received). The information below, coupled with unlocking the emoji keyboard will make you an unstoppable force of communicating accurately.

How To: Kill Twitter's New "Weekly Digest" Email

You may have noticed an unusual email from Twitter over the last couple of days that showed recent stories and tweets from those you follow. This is a new initiative from Twitter that gives you "the best of Twitter in your inbox". It's basically just a weekly summary of the most recent and relevant stories and tweets from your connections.

News: Rock-paper-scissors

I've been having this idea to build a redstone-version of rock-paper-scissors but never got around to do it. Building big redstone-contraptions on survival-servers isn't easy and single-player creative mode is a bit silly if you want to build a 2-player redstone-game. :)

How To: Use Google Voice to Prank Your Friends on April Fool's Day

In this article, I'll show you how to prank your friends on April Fool's Day with the very popular Google Voice, a computer to land/mobile calling feature. Basically, Google allows you to play whatever you like through the microphone port on your computer, and play it right through to your victim's phone. Whether it's Rick Astley ("Never Gonna Give You Up") or a text-to-speech application, general hilarity always follows.

How To: Safely Log In to Your SSH Account Without a Password

SSH is amazing, and we praise its existence on Null Byte for many reasons. Notably, it allows us to reroute our traffic through encrypted ports on our local host to be sent to its destination when on the go. You can even control your home computers remotely over a secure and encrypted connection. This is handy for a multitude of reasons.

How To: Sneak Past Web Filters and Proxy Blockers with Google Translate

Do you need proxy access, but cannot have it for some reason? The most common perpetrator behind the issue is the network you're trying to access the pages from. Some networks will block websites, then go as far as filtering out all of the web queries for terms like "proxy" because it can get around their filter. Quick web proxies can be used for tons of other things, though.

How To: Backup All of Your Xbox 360 Data to Your Computer

Flash memory can be a tad unpredictable at times. I have had 4 flash drives die out on me over the last few years, and they usually die without warning. When a flash memory based device dies, the data is likely impossible to recover. Adversely on an HDD, or Hard Drive Disk, even if the disk dies out, someone will probably be able to fix it and get it back to working order—at least long enough for you to back up your data. Hard drives are a bit more forgiving. As you can guess, due to the unpr...

News: Get YouTube's New Layout Today with a Simple JavaScript Hack

As many of you may have noticed, nearly every Google product (i.e. Gmail, Google search, etc.) has gone through a bit of a makeover since the release of Google+. Big blocky buttons and enormous font sizes are apparently the thing of the future, and with a cool JavaScript hack, you can have a goofy YouTube, too! Now, I'm actually just being a bit facetious, the new YouTube is really the only thing that I like out of all of Google's recent redesigns. It looks pretty sleek.

News: You Don't Need to Be a Hacker to Hack with This Android App

Security awareness seems to be a hot topic these days on the web, with developers making apps and devices that can hack networks and machines with just a few clicks. But these applications aren't only exploiting security flaws in systems and networks, they're being used by amateur and wannabe hackers who want to have a little fun, but don't want to learn how to actually "hack" anything.