The community here on Null Byte has always been great and helpful in sharing their know-how, even before I took up admin duties in this World. I jumped at the chance of leading Null Byte because I enjoy teaching and informing people on all of the important need-to-know things out there, but more so than that—there is a deeper reason.
I finally got around to trying out this jam jar jet project. The most successful and longest lasting pulse was somehow the only one I did not record. You can imagine how frustrating that probably was, though my tenth and final attempt was nearly as satisfying. But even the failures were fun to watch, especially the blue flame floating, almost dancing, around the jar. I especially liked the small foghorn sound that my first failed attempt produced.
If you've read my darknet series, you've probably got a pretty good idea of what I2P actually is and is capable of. One of the features of I2P is that it's designed with P2P file sharing in mind. Using a built-in service called I2PSnark, you can host and seed torrents quickly and easily!
In the last article, we left off with the Tor network and its hidden services. As I mentioned, Tor is not the only option in the game, and I want to offer a general introduction to I2P.
Eventually, we plan on doing some root the box competitions here at Null Byte, but we're still looking for a server to play on. Anyone want to donate one? You won't regret it. Root the box is like 'king of the hill', except you have to hack a server and maintain access. Each server will have numerous known security holes, but until then, let's get back to the regular weekly coding sessions and realistic hacking missions on HackThisSite.
Here's something fun for the Null Byte community to do—a coding competition! This week, I wanted to get everyone involved by offering you all a nice library of possible program types to choose from and try to code. At the end of this competition, all of the submitted programs will be reviewed by the community and myself. The coder that receives the most votes will be dubbed THE BEST.
We'd like this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with (anyone want to donate one?), we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But for now, back to the normal flow of things...
In this article, I'll show you how to make a simple touch-triggered switch. This is very useful for various electronic projects, from a simple bedside light to a flat panel touch keyboard. The circuit can vary in switching power depending on the transistors you use. For example, if you're looking into creating a 120V light that turns on when touched, you'd need two powerful transistors and an isolation relay. However, a simple flashlight that turns on when touched would only take a couple of ...
In this article, I'll show you how to create a simple yet accurate demonstration of the "rising ionized gas" principle. In other words, a transformer, two metal prongs and lots of evil laughter. Remember those large "towers" in the background of Frankenstein movies with a "lightning bolt" rising upwards every few seconds? That's called a Jacob's Ladder; one of the coolest awe-inspiring demonstrations of high voltage. Here's a video of the final product: Materials and Tools
We're aiming for this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with, we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But, for now, back to the normal flow of things...
Sage Workshop: Intro to Poetry/ Autobiography Unit Essential Question: How can my five scenes are used in my writing?
The community tore up the first realistic mission last week. You've applied the techniques learned in the basic missions to a real scenario, so I'm pretty content. The realistic missions are where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding and hacking sessions. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, f...
Community byters, it's time to get serious. We are finally moving on to the realistic missions in HackThisSite. This is where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding and hacking sessions. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, from novice programmers to aspiring hackers.
We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowledge. There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials...
We're officially seeking Null Byters interested in teaching others! Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowledge. There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials of any skill level, and anything you feel like...
Time-lapse photography used to require expensive and dedicated equipment, but in today's futuristic world, we now have easy access to universal machines like the iPhone, which are pretty much tricorders.
Your BIOS, or Basic Input Output System, is the firmware on your motherboard responsible for initializing your computer's hardware when it is first powered on. It probes for video adapters, RAM, the whole works. The BIOS provides a small library of basic input/output functions used to operate and control the peripherals such as the keyboard, text display functions and so forth, and these software library functions are callable by external software such as the OS and system software within sai...
What's your highest scoring game of Scrabble? Since starting this Scrabble World, I've been able to break 500 points on a regular basis. This year I've even managed to break the 600-point barrier a couple times. If you ask me, that's a pretty hefty sum to score in one game, but I'm not on par with the professionals yet.
Welcome to the sixth Community Byte for coding in Python and beating the challenges presented to us by HackThisSite. These sessions are created to bring our community together, to learn from each other, and essentially grow together. Everyone is welcome, from novice programmers to aspiring hackers.
Having an SSH or Secure SHell to tunnel your traffic through is something we have talked about many times at Null Byte. As we know, it allows us to securely route and encrypt our traffic through a remote server, effectively anonymizing us and protecting our traffic from all forms of analysis—simultaneously. We have gone over how to make a home SSH tunnel. However, the question has come up, "How can I get an SSH tunnel to somewhere other than my computer?" This would be useful in a situation w...
It's Monday, which means once again, it's time to highlight some of the most recent community submissions posted to the Math Craft corkboard. I also thought we'd take a look at building a sliceform model of a hyperbolic paraboloid.
It's Monday, which means once again, it's time to highlight some of the recent community submissions posted to the Math Craft corkboard. In this post, we'll also make a flexagon, which is a type of transformable object.
Undercover Crow -Sage I sit in a dim black bench
Cross-Site Request Forgery (CSRF, pronounce "sea-surf") is a common web exploit. However, for unknown reasons it's not used very often. It plays on a given website's trust in a web browser by executing another website's form action, for example, sending money to another person. It's usually placed in abnormal places like HTML image tags.
Two wonderful, wonderful things converge! Minecraft Forum's rushone2009 introduces the Bladecraft Project, a melding of Blade Runner and Minecraft. The current texture pack and map downloads contain no adventure or goal, just exploring and discovering movie references. Download here.
For as much money as they've made from North American video game audiences over the years, Japanese game developers don't seem to have very much faith in them. Dozens of great titles from their 40 years in the industry have appeared in Japan and across Europe, oftentimes even in English. But they never make it over to America, like Mother 3, Last Window: Midnight Promise, Dragon Force 2, and Tobal No. 2 (that one didn't even hit Europe).
The visual beauty of images on Google+ means that it's not just a great place for photographers to shine, but also serves as a befitting promotional space for web comic artists. Below, 7 talented individuals who have utilized the Google+ platform.
Generally, summer is a slow time for video games, but not when it comes to Xbox Live Arcade where it's harvest season! In the last month, there have been at least four great games released on XBLA, with Bastion getting the lion's share of the attention. But the remaining three are pretty awesome, as well, and should help you while away the time spent indoors away from the brain frying heat sweeping the U.S.
There's still about eight months before the final chapter in the Mass Effect series comes out, but some trigger happy fans are already building replica costumes and prop weapons to celebrate the upcoming release. BioWare themselves recently commissioned some of these projects, which were shown at their booth at Comic-Con 2011 a couple weeks ago in San Diego. One of these projects was the armor that turian Garrus Vakarian sports in Mass Effect 3, by Kommissar Props. But even more impressive wa...
Need to pick up some furniture, but can't find any free time in your busy schedule? What if you're just too lazy to go pick up some cat food? How are you going to feed your pet without getting off the couch? Tired of waiting in lines at the post office to mail out some last minute package?
Kentucky Fried Chicken is one of those things that nearly everybody loves. But if your craving is strong and you want to make it yourself, think again – the Colonel’s not keen on parting with his top secret recipe. According to KFC’s official site, “one company blends a formulation that represents part of the recipe while another spice company blends the remainder. As a final safeguard, a computer processing system is used to standardize the blending of the products to ensure neither company ...
Video games and books seldom have much impact on one another. Games based on movies based on books are fairly common, but games made directly from books are all but nonexistent. This is too bad, given that they're the two most interactive medias out there.
Do you know how you are perceived by your peers? In real life and online? In the physical world, you could be seen as intelligent, thoughtful and hard-working, but on the Web you could be looked at as irrational, selfish and slothful. There's just something about the Internet that takes away a person's judgement and replaces it with impulsiveness—especially when it comes to Facebook.
What's cuter than a puppy? Not much, especially when you omit all the peeing, barking and furniture chewing, as Remedie Studio did with this sweet time-lapse homage to their beloved pup. Below, watch Dunder the German Shepherd grow from 8 weeks old to 1 year in 40 seconds. Inspired? Make your own time-lapse video and post it to the WonderHowTo company blog. We'll show off the best ones. Here are three different methods to get you started:
To go Open Source or go proprietary? There is a common conception that open-source is unsafe and insecure and therefore companies should rather go for proprietary solutions. They think that because software is termed "open-source", that the world can see the vulnerabilities of the software and might exploit it, and less informed people tend to think that open-source software can be modified while it is running.
In the past 25 years, there have been five generations of home video games systems. Since Nintendo changed the world by releasing the NES in 1987, there has always been at least two consoles competing for dominance in the wild west of the games industry. This competition— coupled with rapid advancements in technology—has led to a new generation of battling systems coming out every five years, like clockwork.
If you already have your basic keyboard shortcuts under control—we're talking classics here, Control-C (copy for PC) or Command-C (copy for Mac)—it's time to load up your memory bank. There are endless shortcuts available (truly endless—since you can customize them yourself), but you don't need to memorize them all, only those you expect to use most. Below, two cheat sheets for upping your keyboard maneuvering status from "basic" to "intermediate" for both Mac and PC users.
NASA just released this beautiful image of what's leftover from a supernova explosion. The red cloud is expanding cosmic debris, the blue is a blast wave of electrons, and the stripes at the edge tell of a high energy burst of x-rays that may be bound for earth. This image was enhanced—Photoshopped—so that scientists can have an easier time interpreting the picture and so that the public can have an easier time appreciating the beauty of nature.
How is it that we use Firefox tremendously and yet not care for its needs? You might have noticed Firefox sometimes tends to slow and not respond often. You might have installed countless add-on in Firefox to enhance your using experience, to get the most out of your Firefox use these Hacks. The about:config page contains all most all of the tweaks and enhancements available for Firefox to day.