Artists Enter Search Results

News: Hack Your Computer's BIOS to Unlock Hidden Settings, Overclocking & More

Your BIOS, or Basic Input Output System, is the firmware on your motherboard responsible for initializing your computer's hardware when it is first powered on. It probes for video adapters, RAM, the whole works. The BIOS provides a small library of basic input/output functions used to operate and control the peripherals such as the keyboard, text display functions and so forth, and these software library functions are callable by external software such as the OS and system software within sai...

How To: Defend from Keyloggers in Firefox with Keystroke Encryption

Null Byte is looking for moderators. More threats to computers exist every day. Not only do we have computer viruses and malware, but we have rootkits and other nasty pieces of code that can log your keyboard strokes or even add your computer to a botnet to attack other websites. Your computer can be infected even if you have anti-virus software installed. I can't stress enough how easy it is for a hacker to write a piece of code that gets around every piece of anti-virus software.

How To: Hack Your Xbox Gamerscore

Nearly everyone has the capacity to be a cheater. Sometime or another, all Xbox users have yearned to get their gamerscore to unimaginable thresholds—for bragging and egotistical purposes. I can relate to this desire. However, I also don't want to mod my gamerscore, because it's just unfair and not nearly as much fun as doing it the honest way. To me, it's synonymous to entering the cheats into a game after you've beaten it. Cheats can add new life into a game once you're done, but since the ...

Goodnight Byte: HackThisSite Walkthrough, Part 4 - Legal Hacker Training

Cheers to another completed Community Byte project! Things went well regarding timeliness and being friendly to the other coders and students. If you've got ideas for our next mission, or an idea for a tutorial, submit them to me. Friday, our mission was to take out HackThisSite, basic mission 5. This mission focused on JavaScript, again. This time there is a little bit more security in place.

How To: Start a Poem

How To Write A Poem There are a million ways to start a poem. unfortunatly I wont be able to explain all of them, actually I can't explain them. Everyone has their own way of writing. If you are a beginer you will eventually find your own way. I will show you some ways that could help you write your own poem.

How To: Make a Thanksgiving Turducken

Ah, turducken. The fondest of all portmanteau words and the tastiest of all Thanksgiving day meals. Turducken is a turkey stuffed with a duck stuffed with a chicken—three glorious poultry meats molded into one marvelous, boneless hunk of flesh that any sane carnivore wouldn't dare resist. It's slapped together with pork sausage stuffing, sometimes even three different kinds, and caked with Cajun seasonings.

Goodnight Byte: HackThisSite Walkthrough, Part 2 - Legal Hacker Training

Welcome to the closing of the second HackThisSite and programming Community Byte. First and foremost, I would like to ask that people start showing up on time to the Community Bytes. If you need help converting your time zone to PST, go to Time Zone Converter. When users do not show up on time, we have to go backwards and catch everybody up. This wastes time and will also make other users' experience less enjoyable when they have to watch and listen to the same thing 100 times. Punctuality as...

How To: Use Wireshark to Steal Your Own Local Passwords

Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their computers to protect from various threats. Here are a few things that should always happen when doing business on computers:

How To: Share Your Laptop's Wireless Internet with Ethernet Devices

Sharing a laptop's wireless Internet connection with other computers connected to its Ethernet port is a great skill to know. It can be good for a number of reasons; Your computer may not have proper hardware to have a standard setup, or you may have an awkward network topology where sharing your wireless Internet via Ethernet would just be a better option.

News: Easy Skype iPhone Exploit Exposes Your Phone Book & More

Like the recent XSS 0day exploit found in the Mac and Windows versions of Skype, a similar one has been found in the Skype app for iPhone. The vulnerability allows an attacker to send a message that contains malicious JavaScript code in the "Name" parameter. This code can steal your phonebook, crash the app, and potentially do a lot worse. The URI scheme is improperly identified for the web-kit browser. Instead of going to a blank browser page, it defaults to "file://". The code could steal a...

News: Moshi Monsters Rise from Indie Game to Kiddie Empire

Four years ago Mind Candy was a pretty small game company. They were best known for their revolutionary but short lived ARG Perplex City, and had no other successful franchises to fall back on when that ended. Their plan to save it? Start a free online social game for children ages 7-12 called Moshi Monsters, where kids can create monster pets, raise them, and socialize with one another in a controlled, safe environment.

News: Turn Google Maps into a Trippy Kaleidoscope with Rorschmap

Gone are the good old days of McNally Maps and Thomas Guides. When you have something as powerful as Google Maps, why bother with anything else? Plus, you can have way more fun with Google's version compared to its paper counterparts. You can find cool things, create a fake chase sequence, and even prank the whole world into thinking you're dead. I imagine the only enjoying thing you can do with those paper maps is make paper airplanes, maybe some decoupage.

News: Australian Government Finally Comes Around on Video Games—Well, at Least a Little

The Australian government has a dysfunctional history with video games. Any regular Yahtzee Croshaw follower can attest to that. The Parliament has established a series of unfortuante regulations that make games both highly taxed and overregulated in price. Bringing any goods all the way to an island in the bottom of the world is expensive to begin with, and new games in Australia can tip the scales at $80 or more.

News: The First (Real) Celebrities Arrive on Google+

One of the coolest things about Twitter is the fact that you can get direct access to some of your favorite celebrities, and have one-on-one conversations with them in less than 140 characters. With Google+, you can have the same advantage, but you don't need to feel constricted by the 140 character limit. Although Google+ has been weeding out fake accounts, they do not currently have a system for celebrities to verify whether their accounts are legitimate or not.

News: The Many Methods for Hypnotizing Chickens

Chicken hypnotism is pretty mind boggling. We were enthralled when young Ciaran hypnotized a chicken with his infectious little boy charm (and more importantly, the gentle back-and-forth sway of his arms). There are a wealth of videos on YouTube depicting the process—a bonafide practice tried and true among both farmers and scientists. So, what is the why and how-to behind the art of fowl hypnosis?

Minecraft: Musical Wonderland

Have you ever wanted to ride a rollercoaster while listening to Lady Gaga? Or have the Star Wars theme auto-play when you enter your house? You can with Minecraft. Search Youtube for a popular song + Minecraft, and chances are there will be a video for it!