Billiards Require Search Results

Community Byte: HackThisSite, Realistic 3 - Real Hacking Simulations

We're aiming for this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with, we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But, for now, back to the normal flow of things...

Community Byte: HackThisSite, Realistic 2 - Real Hacking Simulations

The community tore up the first realistic mission last week. You've applied the techniques learned in the basic missions to a real scenario, so I'm pretty content. The realistic missions are where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding and hacking sessions. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, f...

Community Byte: HackThisSite, Realistic 1 - Real Hacking Simulations

Community byters, it's time to get serious. We are finally moving on to the realistic missions in HackThisSite. This is where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding and hacking sessions. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, from novice programmers to aspiring hackers.

How To: Remotely Control Computers Over VNC Securely with SSH

VNC is a great protocol that you can use on Windows and Linux machines to remotely control computers. This is useful if you need to control your computer when away from home, help your grandma check her email, or help a client with a disk cleanup. VNC is secure in the sense that it requires authentication in order to make the connection, but after that, the data is sent over the internet unencrypted. This means that an attacker could sniff your traffic and snoop everything that's going on. Th...

How To: Make Icosahedral Planet Ornaments

In honor of the new Astronomy World, I thought we should look at a few planetary icosahedrons. The icosahedron is the most round of the Platonic solids with twenty faces, thus has the smallest dihedral angles. This allows it to unfold into a flat map with a reasonably acceptable amount of distortion. In fact, Buckminster Fuller tried to popularize the polyhedral globe/map concept with his Dymaxion Map.

How To: Build a Water Elevator in Minecraft

Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Getting up and down in Minecraft can be extremely time consuming without the assistance of fly mods or speed hacks. If you're a pure player looking for a safe and effective way to travel vertically, why not try the Minecraft water elevator? It's a simple to use device that neither requires neither expert know-how or miles of redstone wiring. It's even faster than many piston elevators.

How To: Create a Free SSH Account on Shellmix to Use as a Webhost & More

Having an SSH or Secure SHell to tunnel your traffic through is something we have talked about many times at Null Byte. As we know, it allows us to securely route and encrypt our traffic through a remote server, effectively anonymizing us and protecting our traffic from all forms of analysis—simultaneously. We have gone over how to make a home SSH tunnel. However, the question has come up, "How can I get an SSH tunnel to somewhere other than my computer?" This would be useful in a situation w...

How To: Encrypt your Skype Messages to Thwart Snooping Eyes Using Pidgin

Skype is a great service. It allows a free solution for VoIP to VoIP calls, and cheap VoIP to landline calling. However, a very disturbing, little known fact that might push you away from Skype does exist. If you closely read the terms of service agreement, it clearly says that Skype is allowed to decrypt your messages whenever they please. Here at Null Byte, we tend to enjoy our anonymity, don't we?

News: 12 Easy Exploits to Raise Thief Skills in Skyrim

Here is the final part in Null Byte's series on mastering the skills in The Elder Scrolls V: Skyrim. We have already covered the slick and brutal methods to raise our Spellcasting and Combative skills. Skyrim's intelligent new leveling system has trumped the former methods of spamming repeated moves to raise levels quickly. Rather than casting a spell, or jumping up and down constantly, the new system requires that we use our skills in practice to get experience for them. This causes leveling...

News: 9 Easy Exploits to Raise Combat Skills in Skyrim

Skyrim is an enormous RPG recently released by Bethesda. After many long years of waiting (I had 1000's of hours clocked into its predecessor, Oblivion, way back in 8th grade) the game is finally out and it surpasses everyone's expectations—save for removing custom spell crafting... Why, Bethesda?

How To: Make a Thanksgiving Turducken

Ah, turducken. The fondest of all portmanteau words and the tastiest of all Thanksgiving day meals. Turducken is a turkey stuffed with a duck stuffed with a chicken—three glorious poultry meats molded into one marvelous, boneless hunk of flesh that any sane carnivore wouldn't dare resist. It's slapped together with pork sausage stuffing, sometimes even three different kinds, and caked with Cajun seasonings.

How To: Run an FTP Server from Home with Linux

File Transfer Protocol, or FTP, is a network protocol made for transferring files in a client and host fashion over a Transmission Control Protocol (TCP) network, such as the internet. FTP is integrated into most browsers, and you have probably used it before. It is a common way to host files and transfer them easily. To access an FTP, a login is required, unless the server is configured to use anonymous logins (like the Arch Linux mirrors).

Goodnight Byte: HackThisSite Walkthrough, Part 1 - Legal Hacker Training

Friday's Community Byte was weird. The intent was to do a HackThisSite mission, but upon time to begin, everyone in there was programming without my assistance, with the help of Sol Gates. This is great! It's really awesome that everyone enjoys programming that much and will make the effort to learn even when I am not present. So, a tip of my hat to Mr. Sol Gates and the rest of you fine people.

News: Kaplan University Business Degree Through our Online School of Business

When beginning her journey at Kaplan University, Michell Sturgis was unsure how the demands of working full time and college coursework would impact her life. Kaplan University’s flexible learning schedule and online degree programs allowed her to complete her assignments at her own pace while still being able to spend quality time with her daughter. Michell took the next step forward from her associate’s degree to earning her bachelor’s degree online.

How To: Create a Custom Arch Linux Distro

Having a custom Linux distro can be the coolest thing ever. Most of you will probably be satisfied with any particular Linux distribution, but I know I'm not the only one out there who wants it to have custom configurations and programs preloaded while leaving the bloatware behind.

News: The 7 Best Secret Features of iOS 5

Just installed the new iOS 5 on your iPad, iPhone or iPod touch? There's a lot of great features to check out and play around with. After messing around with it on my iPhone 4 for a few minutes, these seven additions caught my attention. Check them out below—and tell us what your favorite new features are in the comments below.

How To: Create a Bump Key to Open Any Door

Lockpicking is a skill that takes years upon years to master. Locks come in all sorts of shapes and sizes, but have common ground in how they work. Most cylinder locks have "tumblers," which are metallic cylindrical objects that sit vertically to the actual locking mechanism. Tumblers have five or six holes with rounded key pins of various height in them, each needing to meet an exact height or the cylinder in the center (the lock itself) will not be allowed to turn. This is the reason why yo...

NORTHWAY Games: Cool Indies by a Restless Company on the Road

Game design is sedentary work. Generally its practitioners do their work with their butts planted securely in front of a computer in an office (be it home or away) as their muscles and verbal skills atrophy. Even game journalists are prone to this condition. Not so with Colin and Sarah Northway (pictured below), the husband and wife team behind NORTHWAY Games. Not only do they make really cool indie games, but they do it with just a laptop while traveling the world meeting indie developers of...

News: Double Fine Improves the Psychonauts Meat Circus!

Anyone who likes shooters is going to hate me for saying this: the best game of the 2000's for me was Psychonauts by Double Fine Studios. It came out in 2005 for the original Xbox, achieving critical acclaim, but never selling very well due to its sheer kookiness and poor marketing. Over the ensuing years it has become a cult classic, with downloadable re-releases on Xbox 360 (sadly no longer available). PC has allowed gamers who missed out on the original to bask in its ageless glory.

Scrabble Bingo Weekly Roundup: Shlemiels, Cynosures and Yanquis

Bingo! No, this isn't the game where balls fly around in machines and players dab their cards with daubers. In a game of Scrabble, bingo refers to the bonus a player receives when emptying their rack in one turn, which gets them an extra 50 points on top of whatever their play was. Even if you had two blanks on your rack and didn't utilize any premium squares on the board, you'd still have an impressive 56-point turn (at least) by using all 7 of your letters.

How To: Get Packet Injection Capable Drivers in Linux

In this Null Byte, we are going to be installing Packet Injection capable drivers in Linux. These are the open-source drivers required to sniff wireless traffic, inject packets to crack a wireless access point, and go into "monitor-mode". These drivers are superior because they are the fastest available drivers.

News: Free Protein Folding Game Cracks HIV Molecule Riddle

Foldit is definitely a niche game. The sole gameplay mechanic is attempting to fold complex proteins into smaller and more efficient shapes following the rules of molecular physics and biology. Points are awarded based on how small one can make the protein. Online leaderboards track players' relative progress and allows them to view and manipulate other players' completed designs. It's original, certainly, but no developer is going to ship a million units of a game about molecular-level prote...

How To: A Beginner's Guide to Appreciating Bourbon Whiskey

Bourbon is the ultimate American spirit, considering the barrel-aged distilled spirit was originally produced in an area known as Bourbon County, Kentucky. To meet the legal definition of bourbon, it must be produced in the United States, must be created with at least 51% corn, and aged in new oak barrels. There are two types of bourbon whiskeys—straight and blended. Straight bourbon means that the bourbon has been aged for a minimum of 2 years, and has no other coloring or flavoring added. B...

PAX Prime: A Video Game Convention That's Actually Fun

There are a lot of fantastic video games out there. Indie Games Ichiban's bread and butter is making sure that you steer clear of the bad ones and embrace the good. But really, the biggest goal here is to help everyone have more fun. To that end, today a game is not recommended, but an event. If you like games—not just video games—but tabletop, board and even hopscotch, then PAX Prime is one of the best events you could possibly go to.