Client's Unique Search Results

How To: Make a Super Cheap Coffee-Stained Wood Pallet Coffee Table

Turning unused items into usable pieces of furniture is a great way to save money and create some really good-looking pieces for your room. And nothing beats repurposing old wooden pallets. Redditor BaconStripsandFishin used old wooden pallets and a month's worth of coffee to create his own unique coffee table. To make this, unscrewed all of the wooden panels (top and bottom), placed them all together, and then screwed them back in reusing those same nails. Once he had all of the board togeth...

How To: Create password-protected zip files with WinRAR

If you have a group of large files that need to be sent to a client, you might want to compress it into one single file for easy access or even protect its content from outsiders with a password. This video will teach you how to create password-protected zip files with WinRAR. WinRAR provides full RAR and ZIP file support, and can decompress CAB, GZIP, ACE and other archive formats. Make sure to hit "play tutorial" in the top left corner of the video to start the video. There is no sound, so ...

News: Indie Games Hit the Red Carpet at the IndieCade Awards

Last Thursday, on October 7th, indie game developers from around the world walked down a red carpet in Santa Monica, California in the hopes of winning an IndieCade award. We previously discussed the IndieCade festival and conference, but the award show is a smaller, more inclusive event that provides finalists the opportunity to see their project on stage with rewards by sponsors such as LG, who presented this year’s ceremony.

Dead Island: Almost Dead on Arrival

Dead Island (PC, PS3, 360) had the worst launch of any game in recent memory. The wrong version of the game was released on PC, matchmaking was down for three days on PC, saves were deleted without notice making people start from scratch, and the Feminist Whore (a file found describing one of the character's skills) fiasco. The game just wasn't ready for release.

How To: Cook asparagus & crab-stuffed salmon fillets

There's nothing better than fresh asparagus added to your meal, and this salmon dish just wouldn't be the same without it. this unique salmon entree combines the asparagus with crab meat and spices, for the perfect main course for those seafood and vegetable lovers. Verrill Farm Executive Chef Kevin Carey cooks this salmon entree that will make jaws drop

How To: Enjoy travelling in Managua, Nicaragua

Want to see a huge monument of Sandino? Make your way to Managua, Nicaragua's proud capital and learn the insider travel information on this unique Central American nation. Allow an InterContinental Concierge member to lead you on a special tour of Managua, Nicaragua. I've been there, Managua is awesome. Enjoy travelling in Managua, Nicaragua.

How To: Make a sunflower pin cushion

Kirsten demonstrates adding a unique touch to a pincushion by transforming a dimensional flower decoration to an area for resting pins, needles and more. She stitches in a flower to a pin cushion as well as constructing the pin cushion itself. You are instructed to use a sewing machine. Make a sunflower pin cushion.

How To: Perform a northern style Kung Fu combination

In northern style kung fu, practice the rising block, reverse punch, shin kick, side kick and side punch combination to add power to a martial arts arsenal. Perform this unique attack combo with tips from a professional kung fu instructor in this free martial arts video. Perform a northern style Kung Fu combination - Part 1 of 20.

How To: An Entry Level Guide to Finding and Reading Logs (And Maybe Staying Out of Jail)

Big brother is watching when you're playing around on another system—and big brother is that system. Everything from operating systems to intrusion detection systems to database services are maintaining logs. Sometimes, these are error logs that can show attackers trying various SQL injection vectors over and over. This is especially so if they are using an automated framework like sqlmap that can spam a ton of requests in a short time. More often than not, the access logs are what most amate...

News: The Basics Of SEO

Since the internet is becoming more and more important all the time in regards to overall marketing plans for many companies, it’s imperative that the company website be up to the task of attracting visitors and converting them into customers. There are many methods and techniques to do this and for that reason it’s usually preferable to hire a company that focuses on online marketing or search engine optimization (SEO) to do this work.

Weekend Homework: How to Become a Null Byte Contributor (2/17/2012)

Grab your thinking caps and get your hack on. Null Byte is officially seeking contributors on a weekly basis who are willing to take the time to educate the Null Byte community on anything, from hardware hacks to life hacks. Contributors that write tutorials will be featured on the Null Byte blog, as well as the front page of WonderHowTo (providing it's up to par, of course).

Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Final Session)

We had a blast during last week's social engineering calls. One of our attending social engineers was so clever that she convinced several people on Craigslist that lost items were hers, even if it seemed she couldn't be trusted. But females are better social engineers, naturally. Some say that females have a special knack for manipulating men, but I think that's preposterous. I can't see why that would be true in a million years (note my sarcasm).

Community Byte: HackThisSite, Realistic 5 - Real Hacking Simulations

Eventually, we plan on doing some root the box competitions here at Null Byte, but we're still looking for a server to play on. Anyone want to donate one? You won't regret it. Root the box is like 'king of the hill', except you have to hack a server and maintain access. Each server will have numerous known security holes, but until then, let's get back to the regular weekly coding sessions and realistic hacking missions on HackThisSite.

News: Catch Creeps and Thieves in Action: Set Up a Motion-Activated Webcam DVR in Linux

When it comes to webcams these days, most people are using their laptops over desktops. The cameras are centered, integrated, and require no configuring. They're a cinch and usually have great resolution. So, then what do we do with all of those old wired desktop webcams that we've accrued over the years? Even if you still use an external USB one, chances are you're not using it daily, so why not come up with a better use for it?

Community Byte: HackThisSite, Realistic 4 - Real Hacking Simulations

We'd like this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with (anyone want to donate one?), we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But for now, back to the normal flow of things...

Community Byte: HackThisSite, Realistic 3 - Real Hacking Simulations

We're aiming for this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with, we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But, for now, back to the normal flow of things...

Community Byte: HackThisSite, Realistic 2 - Real Hacking Simulations

The community tore up the first realistic mission last week. You've applied the techniques learned in the basic missions to a real scenario, so I'm pretty content. The realistic missions are where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding and hacking sessions. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, f...

Community Byte: HackThisSite, Realistic 1 - Real Hacking Simulations

Community byters, it's time to get serious. We are finally moving on to the realistic missions in HackThisSite. This is where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding and hacking sessions. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, from novice programmers to aspiring hackers.

UDP Flooding: How to Kick a Local User Off the Network

Only so much data can be passed through the network and to your computer's networking interfaces. This is limited by the amount of bandwidth you have. The more bandwidth you have, the faster your network connections will be. Not only this, but your transfers will be more parallel and distributed so that all of your speed isn't taken up by one transfer. When all of your bandwidth is sapped and unable to be used, this is called a denial of service, or a DOS.

How To: Encrypt your Skype Messages to Thwart Snooping Eyes Using Pidgin

Skype is a great service. It allows a free solution for VoIP to VoIP calls, and cheap VoIP to landline calling. However, a very disturbing, little known fact that might push you away from Skype does exist. If you closely read the terms of service agreement, it clearly says that Skype is allowed to decrypt your messages whenever they please. Here at Null Byte, we tend to enjoy our anonymity, don't we?