Foronline Forums Search Results

Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations

Last Friday's mission was to accomplish solving HackThisSite, Realistic 5, the fifth and last in my series of realistic hacking simulation missions. This time, telemarketers are invading people's privacy, and it was up to us to stop them! The job was to get root on the site and delete the contact database in order to return the right of privacy to its victims.

How To: Safely Log In to Your SSH Account Without a Password

SSH is amazing, and we praise its existence on Null Byte for many reasons. Notably, it allows us to reroute our traffic through encrypted ports on our local host to be sent to its destination when on the go. You can even control your home computers remotely over a secure and encrypted connection. This is handy for a multitude of reasons.

Goodnight Byte: HackThisSite, Realistic 4 - Real Hacking Simulations

Last Friday's mission was to accomplish solving HackThisSite, realistic 4. The fourth in a series of realistic simulation missions was designed to be exactly like a situation you may encounter in the real world. This time, we are told "Fischer's Animal Products is a company that slaughters animals and turns their skin into overpriced products which are then sold to rich bastards! Help animal rights activists increase political awareness by hacking their mailing list."

How To: Sneak Past Web Filters and Proxy Blockers with Google Translate

Do you need proxy access, but cannot have it for some reason? The most common perpetrator behind the issue is the network you're trying to access the pages from. Some networks will block websites, then go as far as filtering out all of the web queries for terms like "proxy" because it can get around their filter. Quick web proxies can be used for tons of other things, though.

News: Awesome Trick with Prepaid "GoPhones" Nabs You Free Text Messaging for Life

You might be sitting there thinking that I'm crazy, but the truth is you're only partially right. You can get free text messaging for life, all for a cheap, one-time fee. But, how can that be possible? An exploit in AT&T's prepaid GoPhones is the culprit behind this sweet, oh-so rare opportunity for exploitation. The exploit grants a lifetime of free texting, assuming that the company stays afloat from now until the end of time.

How To: Build Your Own "Pogo Mo Thoin" to Flash Any Xbox 360 DVD Drive for Under $5

The biggest struggle with flashing DVD drives on Xbox 360s has been the price tag of the probe to extract keys on some drives. The probe and kit is required to extract the DVD key, which is needed to perform a drive repair, flash, or backup of any kind. Who wants to pay big bucks for the "pro" kit and then get added to a huge waiting list behind a million other people looking to buy the same product? We can hack the same thing together at home!

News: Welcome to Astronomy World!

A little about myself and astronomy: I created this world because I love astronomy. I really, really, love astronomy. When I was ten, I went to a restaurant and saw a huge wall mural of the Andromeda Galaxy. At my house, we had a tiny refractor telescope. I knew this wasn't enough, so I bought (with help) an 8 inch Dobsonian reflector. I looked up one time to try to find something to look at and saw something fuzzy- the Orion Nebula. This is when I really got into using my telescope. I still ...

News: Goodbye Giveaway Tuesdays!

First, we'd like to congratulate Marek Antozi, the winner of our very last Giveaway Tuesdays! Photo Challenge. Thankful for Dialogue is a concept most family members can relate to—the occasional stressful Thanksgiving bickering and inevitable resolution is not uncommon, after all. ;)

News: Welcome to Phone Snap!

Hello, my fellow cell phonographers! In today’s day and age, cell phone photography is growing rapidly with the advancement of smartphones and the constant stream of new multi-featured camera phone and photo editing apps.

News: Get YouTube's New Layout Today with a Simple JavaScript Hack

As many of you may have noticed, nearly every Google product (i.e. Gmail, Google search, etc.) has gone through a bit of a makeover since the release of Google+. Big blocky buttons and enormous font sizes are apparently the thing of the future, and with a cool JavaScript hack, you can have a goofy YouTube, too! Now, I'm actually just being a bit facetious, the new YouTube is really the only thing that I like out of all of Google's recent redesigns. It looks pretty sleek.

Secure Your Computer, Part 3: Encrypt Your HDD/SSD to Prevent Data Theft

Welcome to Part 3 in my series on protecting your computer from prying eyes (Part 1, Part 2). In today's segment, we will be going over drive encryption using the TrueCrypt program on Windows OS. Drive encryption is a technique that masks your data with a cryptographic function. The encryption header stores the password that you have entered for the archive, which allows the data to be reversed and read from. Encrypted data is safe from anyone who wants to read it, other than people with the ...

How To: Recover Deleted Files in Windows

Everyone has deleted a file or folder on accident before. Sometimes people even delete stuff on purpose, only to find out that they needed the files after all. If you're experiencing one of these mishaps, don't worry, file recovery is possible in most cases!

News: Welcome to the Canon 5D World!

Welcome to Canon 5D World. Alright, let's face it... there's not much in here right now, but hopefully one day this World will be the go-to destination for anyone with questions on their Canon 5D or 5D Mark II. Maybe the Canon 5D Mark III, if it ever comes to that.

News: Welcome to Photography Contests World!

Welcome to Photography Contests World! The purpose of this world is two-fold. First, it will serve as a directory with featured listings of all types of current photography contests. If you have ever tried to search for a photography contest to enter, then you are aware of how many contests are scattered all over the internet. Photography Contests World will strive to bring you information on as many contests possible in one central location, beginning with mostly USA and international contes...

News: Review of Sativa 45's 'Problem?'

This is definitely a song that will grow on you. As I write this review, I'm actually going back and rewriting things I previously thought about this song because it keeps getting better the more I listen to it. So, I suggest going to his SoundCloud and downloading the mp3 to put on repeat. 'Problem?' starts off very heavy on the snare and dub-type stabs, like most dubstep songs.

HowTo: Screw the President (Well, Sorta)

Whether you're an Obama lover or Obama hater, here's your chance to, ahem, screw him, somewhat literally. The president starred in the recent Sex Culture Festival in the southern city of Guangzhou, China. The screen-printed blow up doll is shown photographed next to his fellow adult toy compatriots.

News: Evan Penny's Real Life Acid Trip

When viewing Toronto based artist Evan Penny's work, Ron Mueck immediately comes to mind. The clear similarities include a representation which is completely photo-realistic, a playfulness with scale, and the mutually shared background in Hollywood SFX.

News: Dragon Age 2 First Images

The first images for the hotly anticipated Dragon Age 2 have come out, courtesy of Game Informer. The developer, Bioware, went on record earlier saying that the sequel will have better graphics and art direction than the first one.

News: Farmer's Market

The Farmer's Market is finally here! I'm getting busy setting mine up and filling it with crops and I've seen some great pictures popping up on my feed of my neighbor's farmer's marketplaces.

How To: Hide your IP address using IP Hider 4.0

IP Hider masks the real IP of a user, allowing him to browse all kind of pages without ever worrying that the ISPs or any other marketing tool is monitoring your surfing habits or spammers are attacking your computer. The simplest way to do this is to have traffic redirected through anonymous proxies.