Block Access Search Results

How To: Get Rid of the Built-in Google Search Bar on Almost Any Launcher

Almost every Android device comes with a Google search bar embedded directly into its stock home screen app. But Google search is available in so many different places on Android that having this bar in your launcher is almost overkill. On top of that, Google recently changed the logo overlay to a more colorful one that may clash with your home screen theme, so there's plenty of reasons to dislike this feature.

How To: Install Gitrob on Kali Linux to Mine GitHub for Credentials

GitHub is an extremely popular site that allows developers to store source code and interact with other users about their projects. Anyone can download public, open-source files on GitHub manually or with Git, and anyone can fork off someone's project to expand or improve it into its own project. It's a really great site for programmers, developers, and even inspiring hackers.

News: Boring (Yet Mesmerizing) VR Experiences Could Calm Anxiety & Reduce Pain

Opioids, or narcotic painkillers, serve as our primary method for alleviating physical distress. They also happen to be a leading cause of death due to their addictive nature. AppliedVR hopes to introduce a safer alternative: virtual reality gaming. They utilize the existing Samsung Gear VR for the hardware, but provides specialized software that offers up a distracting experience that fosters greater pain ignorance.

News: CyberPong Updates the Classic Game for VR on the Vive

Pong, one of the simplest video games ever created, has managed to evolve in some crazy ways over time, from the original basic 2D version and colorful Breakout sequel, to the PlayStation game with power-ups and 3D graphics, and now Cyberpong VR—a virtual reality game on the HTC Vive—where you act as the paddle instead of just moving it into place with a controller.

How To: 5 Mean Shoe Pranks You Must Try

The following are 5 pranks you can set up on your friends and family using their shoes. They're quite funny and to prepare these pranks all you really need are a few household items and a couple other things you can get at your local dollar store such as party snaps and party poppers. You'll also need access to your friends' shoes.

News: A New Branch in My Career.

When I started to go to this site I found it fascinating and found myself coming here all day I have used a lot of the info I have gotten from here in my professional career and on my own. I currently am the VP of RND for a small IT company. I have been pushing toward Penetration Testing as a service for our clients and future clients. For the past 10 years here it has been a very long uphill battle and have hit a lot of road blocks. So I decided to work on this on my own of course as soon as...

How To: Make Smoked Ice for One-of-a-Kind Cocktails

A long time ago I was reading an issue of Saveur and saw an article about a trendsetting bar in Portland. The bartender at the joint had started making enormous blocks of smoked ice for his cocktails. When a patron ordered a drink that called for the smoked ice, the bartender would chip off a large chunk and place it in a glass with the booze. Then, as the ice slowly melted, the drink would take on more and more smoky notes, and the flavor profile of the beverage would change with every passi...

How To: Prank Your Teacher on April Fool's Day

In this simple tutorial, you'll learn how to easily set up a prank on your teacher in class for April Fool's Day. If you're looking for a simple yet effective prank to pull on your teacher on April 1st, why not try this one? All you pretty much need is black shoe polish and access to your teacher's dry board eraser. The rest is easy.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 5 (Windows Registry Forensics)

Welcome back, my aspiring hackers! As I mentioned in earlier posts, the best hackers (or at least those not behind bars) have a keen understanding of digital forensics. If I am tasked to intrude upon an enemy's file server to retrieve war plans, such as in this tutorial, it is essential to my country's (and my own) well-being that it not be traced back to me. Understanding digital forensics helps us to leave without a trace and never have a trail back to us or our employer.

News: Flash-Freeze Anything with the Anti-Griddle

Essentially, the Anti-Griddle does exactly what its name promises: it turns things almost instantaneously cold when you drop them on its "grilling" surface. Unlike home methods of flash freezing, its staggeringly low temperatures (-30°F/-34.4°C) allows ingredients that normally can't be frozen—like oil or alcohol—to turn into solids in the wink of an eye. As you might imagine, this allows chefs to play with textures and tastes in a way that was previously unimaginable.

NFL Comes to YouTube: Game Highlights, Analysis, & More

YouTube and the National Football League have announced a partnership that should greatly improve the online experience for gridiron fans. In a posting on their official blog, YouTube outlines a deal that will bring NFL video clips to their immensely popular site while bumping official NFL pages up to the top of relevant Google search results.

How To: Quickly Paste Commonly Used Words or Phrases into Any Text Field on Your Mac

Your Mac's clipboard is great when you are just copying and pasting a phone number or address, but sometimes you end up having to re-copy the same thing over and over every day. To make those phrases a lot more easily accessible, the people over at Tiny Robot Software have released Pasteomatic. With this app, you will be able to use a hotkey to bring up a collection of your most commonly used text snippets and paste them into any text field or document.

Hack Like a Pro: Linux Basics for the Aspiring Hacker, Part 22 (Samba)

Welcome back, my aspiring hackers! Those of you who use Windows in a LAN environment understand that Windows machines can share directories, files, printers, etc. using "shares." This protocol dates back to the 1980s when the then dominant computer firm, IBM, developed a way for computers to communicate over the LAN by just using computer names rather than MAC or IP addresses.

Hack Like a Pro: Advanced Nmap for Reconnaissance

Welcome back, my novice hackers! Reconnaissance is one of the most important preparatory steps to hacking. As I have emphasized many times before here on Null Byte, you must know the operating system, the ports, the services, the applications, and sometimes even the language of the target to be effective. If you haven't taken the time to gather this info, then you are likely wasting your time.