Hack Gauntlet Search Results

How To: Hackers Can Remote Wipe Your Samsung Smartphone—Find Out If Yours Is Vulnerable (And Fix It)

Security researcher Ravi Borgaonkar from Berlin has discovered that hackers can hide an 11-digit code in a webpage that can wipe out all of the information on your smartphone—contacts, photographs, music, applications, and anything else of importance. The attack takes no more than a few seconds and nothing can be done about it. NOTHING. This begs the question—are you susceptible?

Power Pwn: A Stealthy New Hack Tool Disguised as an Innocent Power Strip

The team behind the Pwn Plug, a little white box that can plug into any network and access it remotely, is at it again. This time, Pwnie Express is working for DARPA to create a hacking machine that looks like a power strip, cleverly called the Power Pwn. The device has wireless, ethernet and Bluetooth capabilities and can do a full-scale penetration test as well as bypass NAC and other security measures automatically. It has three modes: Evil AP, stealth mode and passive recon. In stealth mo...

News: Why should you covet a Fixie bike?

(We did not know about these, either...until we discovered these videos.) The fixed gear bike, also called a fixie, was designed for track racing in the velodrome. Working bike messengers brought them to the NYC, Tokyo, SF, London streets on account the cycles gave them far more control to maneuver the urban jungle. The Chinese acrobat peddling a bike with 18 contortionists wrapped around him, must have a fixie.

News: The Real Laser Tag

My idea is simple but, imo, funny. Have the gang have an all out laser tag war with running, diving, obstacles, the works, in a padded arena or outdoors. But each harness is connected to one of those flat tasers (the kind that looks almost like brass knuckles) pushed in their backs, or chest, or crotch (or all three if you prefer, each one connected to a different sensor: back shot is back shock, front shot is chest shock, head shots are crotch shocks). When you get shot you get shocked. It w...

Weekend Homework: How to Become a Null Byte Contributor (2/10/2012)

We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials on any skill level, and about anything you feel like sharing that...

Community Contest: Code the Best Hacking Tool, Win Bragging Rights

Here's something fun for the Null Byte community to do—a coding competition! This week, I wanted to get everyone involved by offering you all a nice library of possible program types to choose from and try to code. At the end of this competition, all of the submitted programs will be reviewed by the community and myself. The coder that receives the most votes will be dubbed THE BEST.

Weekend Homework: How to Become a Null Byte Contributor

We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowledge. There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials...

News: Null Byte Is Calling for Contributors!

We're officially seeking Null Byters interested in teaching others! Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowledge. There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials of any skill level, and anything you feel like...

How To: 6 Easy Recipes for Removing Nasty Stains

What do you do when you accidentally stain your favorite article of clothing with coffee, red wine, or pasta sauce? If you aren't within immediate reach of laundry detergent or commercial stain removers, you can use many common household staples such as baking soda and white vinegar to remove the offending stains right away—sometimes even better than their commercial counterparts.

How To: 7 Extraordinary Uses for Aluminum Foil

It turns out that the silver crinkly material traditionally used for wrapping leftovers and making funny hats to block out messages from extraterrestrial beings is pretty darn useful for a number of other random but handy tasks, such as sharpening your scissors and keeping bugs away from your vegetable garden. What can aluminum foil not do? Seriously.

News: ShouldIChangeMyPassword.com

Unless you avoid the news entirely, you've almost certainly heard about the hacking sprees that have been taking place over the past several weeks. Tens of thousands of usernames, passwords and email addresses have been released online for anyone to download. Thankfully, it seems that one kind soul has put all that compromised info to good use.

News: Minority Report, Kinect-style

Here's another cool hack using the Kinect, albeit one beyond the reach of most of us. Some students, staff, and professors at MIT have developed "hand detection" software using the Kinect's motion sensor. Below is a demonstration of this software. It recalls Tom Cruise's iconic scenes from the movie Minority Report.

News: Meticulously Crafted Tron Optical Illusion

You don't have to go the boring route with Christmas lights this year. Try hacking them, or better yet see if you can replicate this Tron-themed optical illusion made by WonderHowTo favorite Brusspup. Good luck... looks like it took some serious time and patience to get it right. More from Brusspup:

HowTo: Hack an iPod Touch Into an iPhone

The iPhone and iPod touch are nearly identical devices, especially now that Apple has added a front-facing camera to the iPod touch. All that's missing is the phone part. With the help of Lifehacker and apps like Skype and Line2, you can save some money by turning your iPod Touch into an iPhone, without the need to jailbreak.

HowTo: Make Your Guts Disappear with the World's Best Portal Costume

Life-giving internal organs! Usually, they're a convenience. Not so when making a convincing see-through Portal costume, however. Happily, Ben Heck has a devised an LCD-based hack that will permit you to tunnel through your belly without discomfort. Interested in vanishing your viscera? A full video guide follows below. Previously, HowTo: Top 10 DIY Nerdtastic Halloween Costumes.

News: Android Can Now Solve the Rubik's Cube

Well, only if you also happen to have an ARM powered LEGO Speedcuber device. Promotional video by maker David Gilday for ARM Ltd. With the help of the Android, the machine cracks the Rubik's Cube in 25 seconds (compare to LEGO Mindstorms solvers' 4 seconds.... or the human record of 7 seconds). Previously, Wow-Worthy Hack: Android Running on iPhone.

HowTo: Hack Wireless Internet

Tinkernut demonstrates how to crack a wifi connection, as well as how to better secure your own personal connection. Also included in the video gallery is Tinkernut's previous tutorial on the same subject.

News: This Is the Crazy Set Up Magic Leap Uses to Study Your Face

Magic Leap has some seriously awesome tech behind their augmented reality vision, and has made it a point to add a ton of adrenaline into the industry with a revolutionary focus on 3D layering. Today, they gave the public another glance at how they go about it. The image above displays the complete setup that Magic Leap uses to accurately capture someone's entire facial structure. The associated caption to this image reads: "This is where we study the 22 bones & 43 muscles of the face & head."

News: Is an Unhackable Kernel Really Possible?

In an effort to prevent drones from being hacked, DARPA has been developing an "unhackable system," and seems to think they're almost there. The development team "proved" mathematically that their kernel was unhackable, and they hope to use it for more than just drones (power grids, cars, phones, pacemakers, etc.).