Chat Support Search Results

News: Tactics for Using Stairs in Minecraft

The stair is considered by many people to be one of the, if not the most, versatile blocks in Minecraft. They can completely change the look and feel of a build and increase its quality. In this post, I will highlight just a few of the options you have for using them.

Know Your Rights: How to Escape Unlawful Stops and Police Searches with Social Engineering

Law enforcement can make a lot of folks cringe. Too often do we hear on the news, and even experience in our own lives, the unjust way that an unacceptable portion of law enforcement treat the very citizens they are supposed to protect. People's rights are violate each and every day by law enforcement, simply because they are timid and uneducated with the laws of society. This dirty trickery shouldn't be played on harmless citizens under any circumstances.

Community Contest: Code the Best Hacking Tool, Win Bragging Rights

Here's something fun for the Null Byte community to do—a coding competition! This week, I wanted to get everyone involved by offering you all a nice library of possible program types to choose from and try to code. At the end of this competition, all of the submitted programs will be reviewed by the community and myself. The coder that receives the most votes will be dubbed THE BEST.

How to Pick Locks: Unlocking Pin and Tumbler Deadbolts

Lock picking is defined by locksmiths as "the art of opening a lock without the key". There's many ways to accomplish this, but I'm specifically interested in using a lock pick set. Since locks vary in shapes and size, it's better to stick with just one kind of lock at first. Most locks are based on fairly similar concepts, so sharing methods across locks is possible.

How To: Conceal a USB Flash Drive in Everyday Items

Technology in computers these days are very favorable to the semi-knowledgeable hacker. We have TOR for anonymity online, we have SSDs to protect and securely delete our data—we can even boot an OS from a thumb drive or SD card. With a little tunneling and MAC spoofing, a decent hacker can easily go undetected and even make it look like someone else did the hack job.

News: Advanced Cracking Techniques, Part 2: Intelligent Bruteforcing

Following the first part in this series on advanced cracking techniques, we are going to go over how we can intelligently crack passwords using the old-fashioned bruteforce method. These unique cracking techniques aren't widely used, because most crackers are Script Kiddies who have no idea what the concepts are behind cracking passwords, thus, word won't get around too quickly.

News: Flaw in Facebook & Google Allows Phishing, Spam & More

Here's a nasty little Null Byte. An open redirect vulnerability was found in both Facebook and Google that could allow hackers to steal user credentials via phishing. This also potentially allows redirects to malicious sites that exploit other vulnerabilities in your OS or browser. This could even get your computer flooded with spam, and these holes have been known about for over a month.

How To: How Anyone Can Retire Early & Wealthy, Part 1: CDs

I'm pretty sure that it's a universal dream for everyone in the world to retire early. Who wants to to be stuck with the rest of the country and retire when you're almost 70 years old? You heard me right, 70! Most people can't go out and do the things they love to do by the time they're 70, unless they've been practicing good health and exercise their entire life.

UDP Flooding: How to Kick a Local User Off the Network

Only so much data can be passed through the network and to your computer's networking interfaces. This is limited by the amount of bandwidth you have. The more bandwidth you have, the faster your network connections will be. Not only this, but your transfers will be more parallel and distributed so that all of your speed isn't taken up by one transfer. When all of your bandwidth is sapped and unable to be used, this is called a denial of service, or a DOS.

How To: The Hacks Behind Cracking, Part 2: How to Generate Software Keys

If you've ever heard software piracy terminology being discussed, I'm sure the term KeyGens came up. KeyGens is short for key generator, which is a program that exploits algorithmic faults in software by generating software license keys that appear to be genuine. Normally used as a technique to protect the source code software and prevent piracy, a key generator exploits the key algorithm to effectively nullify the need for any software licenses. For example, we must try to find patterns in t...

How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration

If you've ever wondered how software pirates can take software and crack it time and time again, even with security in place, this small series is for you. Even with today's most advanced methods of defeating piracy in place, it is still relatively easy to crack almost any program in the world. This is mainly due to computer processes' ability to be completely manipulated by an assembly debugger. Using this, you can completely bypass the registration process by making it skip the application'...

How To: Create a Free SSH Account on Shellmix to Use as a Webhost & More

Having an SSH or Secure SHell to tunnel your traffic through is something we have talked about many times at Null Byte. As we know, it allows us to securely route and encrypt our traffic through a remote server, effectively anonymizing us and protecting our traffic from all forms of analysis—simultaneously. We have gone over how to make a home SSH tunnel. However, the question has come up, "How can I get an SSH tunnel to somewhere other than my computer?" This would be useful in a situation w...

How To: Backup All of Your Xbox 360 Data to Your Computer

Flash memory can be a tad unpredictable at times. I have had 4 flash drives die out on me over the last few years, and they usually die without warning. When a flash memory based device dies, the data is likely impossible to recover. Adversely on an HDD, or Hard Drive Disk, even if the disk dies out, someone will probably be able to fix it and get it back to working order—at least long enough for you to back up your data. Hard drives are a bit more forgiving. As you can guess, due to the unpr...

Community Byte: HackThisSite Walkthrough, Part 4 - Legal Hacker Training

Another Community Byte announcement from Null Byte! The Community Byte projects serve to teach people in a co-operative, hands-on manner. Learning from experience and immersing yourself in a subject is the best way to learn something foreign to you. In our sessions, we have started to both code and complete HTS missions. There is something for everyone here, so make sure you join in on the fun learning experience.

How To: Run an FTP Server from Home with Linux

File Transfer Protocol, or FTP, is a network protocol made for transferring files in a client and host fashion over a Transmission Control Protocol (TCP) network, such as the internet. FTP is integrated into most browsers, and you have probably used it before. It is a common way to host files and transfer them easily. To access an FTP, a login is required, unless the server is configured to use anonymous logins (like the Arch Linux mirrors).

Community Byte: Hack Our IRC Bot to Issue Commands

Last week's Community Byte we got off to a great start! We had a few people build our IRC bot, and all went well. We had some great contributers, ideas, and people willing to learn. So, needless to say, we will be having another. Let's try to get a few more people involved this time!

How To: Use Cygwin to Run Linux Apps on Windows

You'll see a lot of Linux action going down here at Null Byte. We use Linux for hacking-related stuff because it provides a more relaxed programming environment, making it easy to write exploits and tools. Linux has many features Windows is lacking, such as full control over the OS right down to the Kernel and massive availability of mature, open source (read: free & tweakable) tools & projects.

Wheels of Steel: A Virtual Turntable in Your Browser

Wheels of Steel is a virtual browser-based turntable emulator created by Scott Schiller, a Canadian developer who works on Flickr at Yahoo. This project will appeal to those who A) dig turntablism and B) are knowledgeable in web development. I know nothing of the latter, but from what I can tell, Wheels of Steel appears to be significant because unlike its predecessors, it employs CSS3 instead of flash. Since I'm not familiar with the topic, here's Scott on the history and technical details o...

Minecraft: I'm Going Home

Back in the Super Nintendo days, playing one RPG after the other, memorizing maps and mazes became second nature if you didn't want to look at the mini map or get lost often. I would make it a point to memorize corners and the overall structure of the dungeon or location, so that graphically I would know where I am at all times. It's not like today, where major games come out with 200+ page guides detailing every last inch or going online where you can download a map or look at Youtubes for h...

How To: use terminal on MAC to hack or edit plz notice this is advanced computer programing not for middle school

Warnings this only for educational use i dont take responsiblety for any use of this article if you want to use this for use at a school plz contact me at sebzy4@hotmail.com hi im a computer enginer/programmer (NOT games) but i am good at hacking and i want to help. notise that this is just a help site not hacking site but this will help firstimers

“Man, there’s nothing to DO!”: 5 Underrated Inexpensive Summer Activities

The joys of summer are many! If you, like me, live in a place where the summer is short, you’re going to want to maximize your fun in the sun by doing as many awesome things as possible before the sun goes back to wherever the hell it hibernates during the cold and dark times. The most important ingredients for fun in the sun are friends and…well…the sun, so you can do almost anything with a group of exciting creative people, but here are my favorite el cheapo activities for summer.

How To: How The Internet Works

Sure, you go online to email and shop and do research. But have you ever been curious about how the internet actually works? Don't worry, you don't need a degree in computer science to get a handle on how your info gets from point A to point B. Learning the basics of the internet will give you a whole new appreciation for all those emails and chat messages that seem to magically appear. Get ready, because we're about to enter the wonderful world of digital data!

News: Boob Support = Life Support

Dr. Elena Bodnar proposes a silly idea. Why not wear a bra that double as a gas mask? No point in being ill equipped (in the event of fires, terrorist attacks, dust storms or a swine flu outbreak). The instructions are simple: In the event of an emergency, remove bra.

How To: Do a breakdance drop

This video teaches the secrets to do a basic break dance drop in simple steps. First stand on your tip of your toes and jump to right side, come back and do the same with the other leg. Now again go back to left side by popping your right leg simultaneously. While popping your leg will be folded under your knee and drop to the ground with your hand support. Practice it again and again till you perfect it. Finally do the basic drop with some simple steps along with music. Do a breakdance drop.

How To: Rebuild a rear bicycle hub

This how-to video demonstrates the process of rebuilding a rear bicycle hub. You will need a soft hammer, a vice, grease, methylated spirits, a seal tool, a hub bearing tool, and a hub support tool. Make sure not to lose the spacer, otherwise the hub will start locking up. Watch this video bicycle repair tutorial and learn how to rebuild a rear hub. Rebuild a rear bicycle hub.