Directv Channel Search Results

How To: Create a Free SSH Account on Shellmix to Use as a Webhost & More

Having an SSH or Secure SHell to tunnel your traffic through is something we have talked about many times at Null Byte. As we know, it allows us to securely route and encrypt our traffic through a remote server, effectively anonymizing us and protecting our traffic from all forms of analysis—simultaneously. We have gone over how to make a home SSH tunnel. However, the question has come up, "How can I get an SSH tunnel to somewhere other than my computer?" This would be useful in a situation w...

How To: Backup All of Your Xbox 360 Data to Your Computer

Flash memory can be a tad unpredictable at times. I have had 4 flash drives die out on me over the last few years, and they usually die without warning. When a flash memory based device dies, the data is likely impossible to recover. Adversely on an HDD, or Hard Drive Disk, even if the disk dies out, someone will probably be able to fix it and get it back to working order—at least long enough for you to back up your data. Hard drives are a bit more forgiving. As you can guess, due to the unpr...

How To: Encrypt your Skype Messages to Thwart Snooping Eyes Using Pidgin

Skype is a great service. It allows a free solution for VoIP to VoIP calls, and cheap VoIP to landline calling. However, a very disturbing, little known fact that might push you away from Skype does exist. If you closely read the terms of service agreement, it clearly says that Skype is allowed to decrypt your messages whenever they please. Here at Null Byte, we tend to enjoy our anonymity, don't we?

Community Byte: Hack Our IRC Bot to Issue Commands

Last week's Community Byte we got off to a great start! We had a few people build our IRC bot, and all went well. We had some great contributers, ideas, and people willing to learn. So, needless to say, we will be having another. Let's try to get a few more people involved this time!

How To: Create a Bump Key to Open Any Door

Lockpicking is a skill that takes years upon years to master. Locks come in all sorts of shapes and sizes, but have common ground in how they work. Most cylinder locks have "tumblers," which are metallic cylindrical objects that sit vertically to the actual locking mechanism. Tumblers have five or six holes with rounded key pins of various height in them, each needing to meet an exact height or the cylinder in the center (the lock itself) will not be allowed to turn. This is the reason why yo...

Social Engineering, Part 2: Hacking a Friend's Facebook Password

Welcome to the second Null Byte in a series educating you on Social Engineering awareness and techniques. Today, I'm going to show you how a saavy Social Engineer would trick a friend into unknowingly surrendering their Facebook password. My intent is to warn and demonstrate how easy it is to succumb to phishing via Social Engineering, and therefore expose yourself.

News: Free Protein Folding Game Cracks HIV Molecule Riddle

Foldit is definitely a niche game. The sole gameplay mechanic is attempting to fold complex proteins into smaller and more efficient shapes following the rules of molecular physics and biology. Points are awarded based on how small one can make the protein. Online leaderboards track players' relative progress and allows them to view and manipulate other players' completed designs. It's original, certainly, but no developer is going to ship a million units of a game about molecular-level prote...

News: The First (Real) Celebrities Arrive on Google+

One of the coolest things about Twitter is the fact that you can get direct access to some of your favorite celebrities, and have one-on-one conversations with them in less than 140 characters. With Google+, you can have the same advantage, but you don't need to feel constricted by the 140 character limit. Although Google+ has been weeding out fake accounts, they do not currently have a system for celebrities to verify whether their accounts are legitimate or not.

News: Did George Plimpton Make a Falconry Game for ColecoVision?

George Plimpton may be one of the most interesting Americans ever. Foremost a sports journalist, he was also a novelist, Fireworks Commissioner for New York City and host of Mouseterpiece Theater. Some of you may also recognize him as one of the men who tackled Robert F. Kennedy's assassin, Sirhan Sirhan. But most of you probably remember him as the pitchman for products like Pop Secret Popcorn and the Intellivision video game console. Actually, his most appreciated work would probably be a s...

News: Tips on recording a kick drum

There are a lot of important things to keep in mind when you’re recording a kick drum. It seems like it’d be as simple as putting a mic in front of the drum, but there is so much more! Here are some quick tips on recording and mixing a good kick drum.

The Sprint HTC Evo 4G: Best Phone This Year

Written by JD Coverly of WonderHowTo World, LoadSave:We've spent the last week with Sprint's new phone, the HTC Evo 4G. Specification wise, it's better than Verizon's Incredible and T-Mobile's HD2. Apple has unveiled the new version of their phone this week and thankfully it's debatable as to which phone is better. The iPhone has better battery life and a more robust App store, but it suffers from a smaller screen, smaller camera resolution, no HDMI out, face talk only on wi-fi networks, and ...

News: There's No Such Thing As Perfection... But I Am Expecting It???

What Am I Doing???? Last night, I was reminded on the negative impacts of striving for perfection. It's not possible to be perfect. We describe many things as being perfect. IE, an afghan, a hat, a tablecloth and more over, there is always something better... a different colour, a slightly different pattern, and so on. As time progesses, the colours we choose this fall might be the OUT colours of next fall. 

News: Levon Helm Bustin' Out the Nitty-Gritty Mud Beats

Levon Helm... The longtime drummer for The Band , Levon Helm wore many musical hats throughout his long career, including multi-instrumentalist, songwriter, singer, impressario, studio owner, studio engineer and producer. He grew up working on a farm in Arkansas; his first instrument was guitar, which he began playing at ag eight, but after seeing the F.S. Walcott Rabbits Foot Minstrels, he decided to ...

How To: Make Ninja Darts for the Lighter Mini Cannon

In my recent article, How to Make a Mini Cannon with a Lighter, I demonstrated how to make a powerful combustion cannon out of parts salvaged from a standard BBQ lighter. The mini cannon was originally made to fire airsoft pellets, but I felt it was time to revive the project with something new.

News: Chelsea, Chelsea, Gang-Bang

Working in cahoots with the producers of E! channel's 'Chelsea Lately'; the entire Jackass gang & myself secretly come to a taping of Chelsea Handler's show. Whiles she is doing the show with her round table guests, the producers kick in the 'Party Boy' song over the sound system & we all suddenly run onstage live NUDE and we surround her and start doing a Rockette-style line dance or whatever musical moves we choose. Mayhem ensues. After several moments of shear debauchery, at the conclusion...

How To: Market a Self Storage Facility

Self-storage may not be a new industry, but it is one that is rapidly reshaping its operations to suit a progressively more modernized customer base. In order to stay competitive with your self-storage facility, you'll need to keep an open mind, embrace current marketing trends, and most importantly, have a well-defined set of marketing goals. Your main focus should revolve around the following points:

How To: Don't Get Caught! How to Protect Your Hard Drives from Data Forensics

With the mass arrests of 25 anons in Europe and South America, and the rumors of an FBI sweep on the east coast of America floating around, times look dicey for hackers. Over the past few days, a lot of questions have been posed to me about removing sensitive data from hard drives. Ideas seem to range from magnets to microwaves and a lot of things in-between. So, I'd like to explain a little bit about data forensics, how it works, and the steps you can take to be safe.

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services

For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. Before someone can learn how to root a box, they need to learn how not to be found. I can not stress that point enough.

How To: Safely Overclock Your GPU, CPU & RAM for Better Speed & Performance

Overclocking is quite an awesome thing. When computer components are designed, they are made to run at a certain speed, otherwise known as their clock and bus speeds. These limits are not actually limits. You can overclock components, which essentially makes them go faster than their set limitations. This can save you a lot of cash when newer components come out and you don't have enough money to upgrade. However, when you overclock components, you must be careful and make sure that the machi...

News: Google+ Pro Tips Weekly Round Up: Refining Sharing

One of the primary goals of a social network is for you to share what you find interesting with your followers and friends, but on Google+, sharing has so many layers that it can be confusing for most people to really take advantage of it properly. Some of the tools in place that enable you do deal with spam and manage your privacy aren't very clear, so this week's round up is all about how you can share what you want with who you want on Google+.

How To: Defeat SSL in Practice with SSL Strip

SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, whenever you see "https://" in front of the URL in your browser, you know you're safe... or are you?