Cracking Search Results

How To: Take care of leather hiking boots

Wade Bourne of MyOutdoorTV.com shows you how important it is to take care of leather hiking boots. Leather boots are expensive, and they should be treated like an investment. This means giving them proper care to extend their life and receive the greatest use and value for your dollars spent. Here are tips on how to care for leather boots to extend their useful service.

News: Best Hacking Software

When i went to class today, a good friend asked me a question. He wanted to know what the best hacking software was to basically do everything. What i told him was this: Well there isn't an "Ultimate" tool boot there are a number of tools which deserve a "Medal." So what i'm trying to say here... What are some of the best hacking tools available right now? For starters i created a list with some of the tools.

How To: Recover WinRAR and Zip Passwords

Archiving and compression is a great way to store and prepare files for sending. You can reduce the size of a file, turn a group of files into a single file, and even encrypt and password the contents! Just take a look at this image to see how much it compressed a 28GB text file.

News: What Do You Want to See?

I've decided I've not been writing enough and want to get back into writing more often. I have a few ideas for articles based on password cracking and breaking into Windows, and a basic general coding type of articles, but I wanted to know if anyone had anything they wanted to know how to do, a language they wanted to learn the basics of or something like that. Please comment with any ideas.

News: Lego Lock Picking Robot

"A major hardware update to the masterlock cracking robot. Upgraded the previously non-working latch opening mechanism to be geared down 1:25, allowing it to open the shackle. I also revamped the motor mount to be sturdier, and the base of the unit to hold the lock better and also be easier to mount parts to.

How To: Decode Body Language

Your boss is pursing her lips and drumming her fingers on the table during your presentation. Your best friend is gazing downwards and crossing his arms when you ask him why the car you lent him for the weekend has a big dent. What could these body language signals all mean?

Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations

Last Friday's mission was to accomplish solving HackThisSite, Realistic 5, the fifth and last in my series of realistic hacking simulation missions. This time, telemarketers are invading people's privacy, and it was up to us to stop them! The job was to get root on the site and delete the contact database in order to return the right of privacy to its victims.

News: Who Needs Fancy Kitchen Gadgets? Pliers & Hairpins Will Do Just Fine

After stumbling across an interesting article by Hanne Blank—(apparent) hobbyist chef and widely known activist on the issues of weight, bisexuality, and sexuality—I've become even more fascinated by kitchen shortcuts. Former Microsoft CTO Nathan Myhrvold's recently released Modernist Cuisine also spurred a similar interest, particularly after reading a WSJ piece in which Myhrvold attests —by law of science, of course— that a ¼-inch-thick sheet of steel is more than adequate in place of an ex...

News: Massive Gawker Hack Reveals the Web's Most Stupid Passwords

This past Sunday, a group called Gnosis launched a massive hacker attack on Gawker media, one of the web's most popular blog networks (Lifehacker, Gizmodo, Jezebel, io9, Jalopnik, Kotaku, Deadspin and Fleshbot). 1.3 million registered users' passwords were compromised, and 188,279 of them were decoded and made public. The biggest takeaway? Many Gawker denizens use downright dumb passwords. (Guess they didn't see their own Lifehacker's story on avoiding such a thing.)

Weekend Homework: How to Become a Null Byte Contributor

We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowledge. There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials...

News: New Pyxiewps Version Is Out.

Helo my dear friends! A few days ago, I shared with this community my wrapper-script (a wrapper is a program that joins other programs that do the real job) to automatize the attacks on Pixie-Dust vulnerable routers. I was recieving complains from non-Kali users that had problems trying to launch the program, so I decided to make a good installer so anybody can use it in any DEB based distro.

Mastering Security, Part 1: How to Manage and Create Strong Passwords

I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to remember lengthy passwords and why their current password isn't good enough. Well, I'm going to show you.

Next Page