Enjoy Target Search Results

How To: Use SELinux Targeted Policy to Secure Your Hosts

Hackers often rely on lazy system admins and unpatched vulnerabilities to get access to a host. Keeping intruders off of our machines requires us to update daily, only run the services we need, and read the code, among other things, but we can still make mistakes. Luckily for us, we can limit the damage caused by those mistakes by running SELinux.

How To: Wardrive on an Android Phone to Map Vulnerable Networks

Tossing an old Android smartphone with a decent battery into your hacking kit can let you quickly map hundreds of vulnerable networks in your area just by walking or driving by them. The practice of wardriving uses a Wi-Fi network card and GPS receiver to stealthily discover and record the location and settings of any nearby routers, and your phone allows you to easily discover those with security issues.

News: Snap & Time Warner to Create 10 Original 5 Minute Shows a Year

Thanks to a $100 million deal, you could be seeing more original shows on your Snapchat soon. Already, Snap has been producing super short shows in order to compete with social media outlets like Twitter and Facebook who have also been attempting to create their own content. While musical.ly has so far had the biggest success in this area, this deal with Time Warner is certainly promising for the beleaguered platform.

News: How to Study for the White Hat Hacker Associate Certification (CWA)

Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this certification exam, and what material will be covered on the exam?" Now I have an answer for you. The White Hat Hacker Associate (CWA) will cover 14 domains or areas. Everything you need to know is here on Null Byte. There will be no questions that are not covered here on this site, guaranteed.

Hack Like a Pro: Advanced Nmap for Reconnaissance

Welcome back, my novice hackers! Reconnaissance is one of the most important preparatory steps to hacking. As I have emphasized many times before here on Null Byte, you must know the operating system, the ports, the services, the applications, and sometimes even the language of the target to be effective. If you haven't taken the time to gather this info, then you are likely wasting your time.

Hack Like a Pro: The Hacker Methodology

Welcome back, my neophyte hackers! Many newbie hackers seem to be confused regarding the process or methodology to employ a successful hack. Most want to simply go straight to the exploit without doing the due diligence to make certain that the hack will work and you won't get caught.

How To: Keep Your Fingers Clean While Eating Cheetos, Chocolate, Chips, and More!

Cheetos fingers is defined as the unpleasant (but mostly pleasant), oddly-colored residue left on the thumb, index finger, and middle finger after ravenously eating through a bag of—you guessed it—Cheetos. It can usually be cleaned up by licking your fingers (my favorite) or washing your hands (boooooo). For the folks who enjoy the latter, Cheetos fingers are an annoyance. As someone who enjoys this idiosyncrasy, I've never quite understood the disgust in getting your fingers all cheesed up.

How To: Opt Out of Facebook's Creepy New Ad-Targeting Partnership with Datalogix

As if you needed another reason to lock down your Facebook profile, the company's sketchy new partnership with data mining firm Datalogix is geared towards giving advertisers more information on what you're doing—even when you're not online. It's just not enough that they can target ads based on your preferences, now they want to know how those ads are influencing your buying habits in the real world.