Channel Search Results

Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Final Session)

We had a blast during last week's social engineering calls. One of our attending social engineers was so clever that she convinced several people on Craigslist that lost items were hers, even if it seemed she couldn't be trusted. But females are better social engineers, naturally. Some say that females have a special knack for manipulating men, but I think that's preposterous. I can't see why that would be true in a million years (note my sarcasm).

How To: Create a Free SSH Account on Shellmix to Use as a Webhost & More

Having an SSH or Secure SHell to tunnel your traffic through is something we have talked about many times at Null Byte. As we know, it allows us to securely route and encrypt our traffic through a remote server, effectively anonymizing us and protecting our traffic from all forms of analysis—simultaneously. We have gone over how to make a home SSH tunnel. However, the question has come up, "How can I get an SSH tunnel to somewhere other than my computer?" This would be useful in a situation w...

How To: Backup All of Your Xbox 360 Data to Your Computer

Flash memory can be a tad unpredictable at times. I have had 4 flash drives die out on me over the last few years, and they usually die without warning. When a flash memory based device dies, the data is likely impossible to recover. Adversely on an HDD, or Hard Drive Disk, even if the disk dies out, someone will probably be able to fix it and get it back to working order—at least long enough for you to back up your data. Hard drives are a bit more forgiving. As you can guess, due to the unpr...

How To: Encrypt your Skype Messages to Thwart Snooping Eyes Using Pidgin

Skype is a great service. It allows a free solution for VoIP to VoIP calls, and cheap VoIP to landline calling. However, a very disturbing, little known fact that might push you away from Skype does exist. If you closely read the terms of service agreement, it clearly says that Skype is allowed to decrypt your messages whenever they please. Here at Null Byte, we tend to enjoy our anonymity, don't we?

How To: Create a Bump Key to Open Any Door

Lockpicking is a skill that takes years upon years to master. Locks come in all sorts of shapes and sizes, but have common ground in how they work. Most cylinder locks have "tumblers," which are metallic cylindrical objects that sit vertically to the actual locking mechanism. Tumblers have five or six holes with rounded key pins of various height in them, each needing to meet an exact height or the cylinder in the center (the lock itself) will not be allowed to turn. This is the reason why yo...

Social Engineering, Part 2: Hacking a Friend's Facebook Password

Welcome to the second Null Byte in a series educating you on Social Engineering awareness and techniques. Today, I'm going to show you how a saavy Social Engineer would trick a friend into unknowingly surrendering their Facebook password. My intent is to warn and demonstrate how easy it is to succumb to phishing via Social Engineering, and therefore expose yourself.

News: Free Protein Folding Game Cracks HIV Molecule Riddle

Foldit is definitely a niche game. The sole gameplay mechanic is attempting to fold complex proteins into smaller and more efficient shapes following the rules of molecular physics and biology. Points are awarded based on how small one can make the protein. Online leaderboards track players' relative progress and allows them to view and manipulate other players' completed designs. It's original, certainly, but no developer is going to ship a million units of a game about molecular-level prote...

News: The First (Real) Celebrities Arrive on Google+

One of the coolest things about Twitter is the fact that you can get direct access to some of your favorite celebrities, and have one-on-one conversations with them in less than 140 characters. With Google+, you can have the same advantage, but you don't need to feel constricted by the 140 character limit. Although Google+ has been weeding out fake accounts, they do not currently have a system for celebrities to verify whether their accounts are legitimate or not.

News: Did George Plimpton Make a Falconry Game for ColecoVision?

George Plimpton may be one of the most interesting Americans ever. Foremost a sports journalist, he was also a novelist, Fireworks Commissioner for New York City and host of Mouseterpiece Theater. Some of you may also recognize him as one of the men who tackled Robert F. Kennedy's assassin, Sirhan Sirhan. But most of you probably remember him as the pitchman for products like Pop Secret Popcorn and the Intellivision video game console. Actually, his most appreciated work would probably be a s...

News: Tips on recording a kick drum

There are a lot of important things to keep in mind when you’re recording a kick drum. It seems like it’d be as simple as putting a mic in front of the drum, but there is so much more! Here are some quick tips on recording and mixing a good kick drum.

News: There's No Such Thing As Perfection... But I Am Expecting It???

What Am I Doing???? Last night, I was reminded on the negative impacts of striving for perfection. It's not possible to be perfect. We describe many things as being perfect. IE, an afghan, a hat, a tablecloth and more over, there is always something better... a different colour, a slightly different pattern, and so on. As time progesses, the colours we choose this fall might be the OUT colours of next fall. 

News: Levon Helm Bustin' Out the Nitty-Gritty Mud Beats

Levon Helm... The longtime drummer for The Band , Levon Helm wore many musical hats throughout his long career, including multi-instrumentalist, songwriter, singer, impressario, studio owner, studio engineer and producer. He grew up working on a farm in Arkansas; his first instrument was guitar, which he began playing at ag eight, but after seeing the F.S. Walcott Rabbits Foot Minstrels, he decided to ...

How To: Don't Get Caught! How to Protect Your Hard Drives from Data Forensics

With the mass arrests of 25 anons in Europe and South America, and the rumors of an FBI sweep on the east coast of America floating around, times look dicey for hackers. Over the past few days, a lot of questions have been posed to me about removing sensitive data from hard drives. Ideas seem to range from magnets to microwaves and a lot of things in-between. So, I'd like to explain a little bit about data forensics, how it works, and the steps you can take to be safe.

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services

For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. Before someone can learn how to root a box, they need to learn how not to be found. I can not stress that point enough.

How To: Safely Overclock Your GPU, CPU & RAM for Better Speed & Performance

Overclocking is quite an awesome thing. When computer components are designed, they are made to run at a certain speed, otherwise known as their clock and bus speeds. These limits are not actually limits. You can overclock components, which essentially makes them go faster than their set limitations. This can save you a lot of cash when newer components come out and you don't have enough money to upgrade. However, when you overclock components, you must be careful and make sure that the machi...

News: Google+ Pro Tips Weekly Round Up: Refining Sharing

One of the primary goals of a social network is for you to share what you find interesting with your followers and friends, but on Google+, sharing has so many layers that it can be confusing for most people to really take advantage of it properly. Some of the tools in place that enable you do deal with spam and manage your privacy aren't very clear, so this week's round up is all about how you can share what you want with who you want on Google+.

How To: Defeat SSL in Practice with SSL Strip

SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, whenever you see "https://" in front of the URL in your browser, you know you're safe... or are you?