Busy Schedules Search Results

News: Being a YouTuber On-the-Go Just Got Easier

The beauty gurus, gamers, and daily vloggers of the world are getting a great gift from YouTube very soon. No, it's not exclusive swag or diamond awards. Instead, it's an update to the YouTube mobile app that will support all video formats and let you send in-app messages.

News: Announcing the Null Byte Suite!

Hello, everyone. If you've been following my recent articles, you'll know that I've been rather busy lately working on a project, a rather large one. I've been working with Pheonix750 and Ciuffy to build the Null Byte suite of tools! I got the green light from our admin a while ago, and we've been developing like mad ever since! I'm very excited to launch this project. So, let's start by explaining what it is...

Hack Video Games, Part 1: Introduction

Hello, fellow hackers. I'm sure we've all seen it somewhere: the undying question of "How do I hack the game so-and-so?" And the answer usually is, "Come back when you actually know how to hack!" But how does one even go about "hacking" a game? What could that even mean?

Basics of Ruby: Part 1 (Data Types/Data Storage)

Ruby is a dynamic, general-purpose programming language created by Yukihiro "Matz" Matsumoto in Japan around the mid-90's. It has many uses but with it's flexibility, it makes a great language to write exploits in. In fact, the entire Metasploit Framework is written in Ruby! The sole purpose of this series is to teach hackers the basics of Ruby, along with some more advanced concepts that are important in hacking.

How To: The 15-Minute Trick to Boosting Your Memory & Being More Productive

From day to day, it can be difficult to remember everything that's required of you. I tend to forget exactly where it is I'm supposed to be during my busiest moments, and it's even easier to delete each day's events out of your brain when there's so much else that dominates your mind. Yet taking the time to remember exactly what it is that happens during each of our days can be a vital part of our memory—and with nothing more than 15 minutes, we can strengthen our brains and remember more tha...

How To: Use Traffic Analysis to Defeat TOR

As was mentioned by the great OTW last week, TOR, aka The Onion Router, has had its integrity attacked by the NSA. In an attempt to reduce the anonymity granted by the service, the NSA has opened a great many nodes of their own. The purpose is presumably to trace the origin of a communication by compromising some entrance and exit nodes. Once both are compromised, it is much easier to correlate traffic with a particular individual.

How To: The Squeaky Clean Trick to Eating an Orange Without Getting Your Fingers All Sticky

As a kid, there was nothing more fulfilling than sinking my teeth deep into the succulent flesh of an orange, savoring every drop of juice that wasn't busy sliding down your chin and onto your clothes. While my adulation for oranges never ceased as I grew older, the way I consumed the precious fruit did evolve with my maturity. Gone were the days of messy eating, and here I was now, peeling my oranges as a teenager, taking my precious time in separating each individual slice for a clean and t...

How To: Make a ribbon bow with the help of toothpicks

In this tutorial, we learn how to make a ribbon bow with the help of toothpicks. Start with a full twist on your ribbon, then place it behind the toothpick and hold it in place with another toothpick. Next, make another loop and then do a front loop with a half of a twist. Now, secure those in place with toothpicks and do three side loops with half twists. Secure them with toothpicks, then continue with larger loops made with half twists. When finished, hold the ribbon in the middle with your...