Government Run Nonprofit Search Results

News: Amazon Prime Members Can Preorder the Nokia 6 Today for $50 Discount

While it might be a little past its prime now, the running gag about Nokia phones never breaking was one of the internet's favorite jokes. "If you buy one," they would say, "you'll never need another phone again." I think if those users could see into the future, they'd change their tune, as the Nokia 6 is now available to preorder — and I'm guessing it would give any of Nokia's old bricks a run for their money.

News: The Nokia 6 Is Finally Coming to the US (Maybe)

The Nokia 6 has been out since January, releasing in China before having a slow trickle of releases throughout the year. Despite announcing a global release, the United States never received a street date for the smartphone, and for all this time, Nokia has left us out to dry. Now, it seems, their phone could be on its way as the 6 has received its FCC certification.

News: The Samsung Galaxy J3 Prime Is Now Available

With all the hype surrounding the recent Galaxy S8 release, it can be easy to forget Samsung makes other smartphones. But let's be real here; $726 isn't cheap. If you're someone who doesn't want to drop that kind of cash on a smartphone — or who doesn't feel your device needs all the bells and whistles that come with Samsung's premium line — the new J3 Prime might be right for you.

News: Google's Family Link Just Got a Lot More Useful

Last month, Google introduced the Family Link app. This app, much needed in a world where the average age of kids first getting a smartphone is just over 10 years old, allows parents to set some limits on their children's phone usage. However, the app premiered with one caveat: Both the parent and the child had to have an Android phone. Now, Google has updated the app so it works on iOS devices.

Video: PokéLens—A HoloLens Concept Game with Project Downloads

Ready to finally play some Pokémon on your HoloLens? Here is your chance! KennyWdev has released a video showing off his newest build of PokéLens, a Pokémon clone for the HoloLens similar to Pokémon GO. In the video, you get to see two Pokémon battle it out on what appears to be an office floor. Apparently, Pikachu is "super effective." This coincidentally appeared online the same day that another developer, Sky Zhou, showed off his Smash Brothers-style Pokémon game.

How To: Use UFONet

With the release of the Mirai source code, botnets are back in a big way. In the early days of botnets, zombies (infected hosts) would report to IRC (Internet Relay Chat) channels for CNC (command and control) instructions. Modern botnets have evolved, but they continue to use the same concepts as their predecessors.

News: This Guy Tested the Google Pixel XL Against the Nexus 6P (Camera Comparison, Google Assistant, & More)

Google's new Pixel and Pixel XL smartphones are available for pre-order right now, but the general public won't start to get their hands on these devices for another week or two. Tech reporters got some hands-on time at Google's launch event on October 4th, but camera testing wasn't allowed, and the Wi-Fi coverage at the event was too flooded for real-world performance reviews.

News: U.S. Justice Department Indicts Iranian Hackers

Last week, the U.S. Justice Department issued criminal indictments against seven Iranian hackers. These hackers, working for private companies in Iran, are accused of orchestrating DDoS attacks against U.S. financial institutions from 2011-2013 as well as intruding into the control panel of a small dam in Rye, New York. It is thought that these attacks were a response to the U.S. tightening financial restrictions on Iran during those years and the NSA-based Stuxnet attack on their uranium enr...

Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 12 (Web Delivery for Linux or Mac)

Welcome back, my budding hackers! Metasploit, one of my favorite hacking/pentesting tools, has so many capabilities that even after my many tutorials on it, I have only scratched the surface of it capabilities. For instance, it can be used with Nexpose for vulnerability scanning, with Nmap for port scanning, and with its numerous auxiliary modules, nearly unlimited other hacking related capabilities.

How To: Security-Oriented C Tutorial 0x01 - Hello, World!

Welcome back, reader! In this tutorial, we will be covering our first program! So let's get to it. We all know the unspoken tradition of the first program when learning a language and of course, here we will respect and complete it. Fire up your favorite text editor (be it vim, emacs, gedit, it's all the same to me, no h8) and try to keep up.

News: What Is a White Hat Hacker?

In recent weeks, some people have been shunned from the Null Byte community because they expressed "black hat" aspirations. This is because Null Byte is the "white hat" hacker training/playground. Although most of us think we know what that means, it does beg the question; "Who and what is a white hat hacker?"

Save Money: Break Down Your Own Chicken

Here's a not-so-well-kept secret about the food industry: retailers love to take your money. And one of the ways they do that is by dividing food into smaller sizes and charging more. Have you ever noticed that a container of precut, washed broccoli costs more than a head of broccoli with the same amount of florets and stems?