Hairline Cracks Search Results

News: Hack Your Computer's BIOS to Unlock Hidden Settings, Overclocking & More

Your BIOS, or Basic Input Output System, is the firmware on your motherboard responsible for initializing your computer's hardware when it is first powered on. It probes for video adapters, RAM, the whole works. The BIOS provides a small library of basic input/output functions used to operate and control the peripherals such as the keyboard, text display functions and so forth, and these software library functions are callable by external software such as the OS and system software within sai...

News: Tips on Car Windscreen Maintenance

Most of the car owners pay attention to the maintenance of the vehicle but among them, many forget to include windscreen maintenance in their periodic checkups. Car windscreen maintenance is quite simple and can be done on your own. In order to maintain car,the drivers should treat this with utmost care as they do for tyres because neglecting small issues in windscreen can land you in deep trouble and on safety prospects as well,it is unsafe.

How To: Hack Wireless Router Passwords & Networks Using Hydra

Leaving your wireless router at its default settings is a bad idea. The sad thing is, most people still do it. Once they've penetrated your network, hackers will change your router settings so they'll have an easy way back in. This allows them to change your network into a shell or proxy so they can forward their traffic anonymously through you when committing other dirty deeds.

News: The N7 Rifle from Mass Effect 3 Replicated in Extreme Detail

There's still about eight months before the final chapter in the Mass Effect series comes out, but some trigger happy fans are already building replica costumes and prop weapons to celebrate the upcoming release. BioWare themselves recently commissioned some of these projects, which were shown at their booth at Comic-Con 2011 a couple weeks ago in San Diego. One of these projects was the armor that turian Garrus Vakarian sports in Mass Effect 3, by Kommissar Props. But even more impressive wa...

News: Should You Change Your Password? Find Out If You've Been Hacked or Not

Six months ago, 1.3 million registered users of Gawker Media had their passwords compromised when the site was hacked by Gnosis. The passwords were encrypted, but 188,279 of them were decoded and made publicly available for all to see. Just three weeks ago, Sony Pictures was hacked by LulzSec, with 1 million passwords taken and 40,000 made publicly available. Comparing the two data sets, Troy Hunt found 88 accounts on both sites that used the same email address, and of those accounts, 67% use...

How To: Clone a Banana with Jello

Mold making is pretty thrilling—the ability to replicate objects right down to every little crack and crevice seems like something only a machine would be able to do. But in many cases creating a replica from a mold is surprisingly simple. Found on Tasteologie, La Receta de la Felicidad presents a fun alternative to the classic Jello jiggler. For a Dada-esque dessert, try using a banana peel as your mold. As you can see below, it works quite well at capturing the natural texture of the banana.

News: Who Needs Fancy Kitchen Gadgets? Pliers & Hairpins Will Do Just Fine

After stumbling across an interesting article by Hanne Blank—(apparent) hobbyist chef and widely known activist on the issues of weight, bisexuality, and sexuality—I've become even more fascinated by kitchen shortcuts. Former Microsoft CTO Nathan Myhrvold's recently released Modernist Cuisine also spurred a similar interest, particularly after reading a WSJ piece in which Myhrvold attests —by law of science, of course— that a ¼-inch-thick sheet of steel is more than adequate in place of an ex...

News: Google Bets $20K You Can't Hack Chrome

Since its inception in 2007, the Pwn2Own computer hacking contest has been challenging the vulnerability of mobile phones and web-related software. In 2010, the fruit of two full days of hacking came down to the exploitation of the following web browsers: Safari 4 on Mac OS X, Internet Explorer 8 on Windows 7, and Firefox 3.6 on Windows 7. The winners walked away with the successfully hacked computer, plus a cash prize, but they left one Godly browser intact: Google Chrome. Even the savviest ...

How To: Change Your Bicycle's Tire, Inspect for Damage, and Detect Hidden Problems

Many things cause a bike tire to deflate. Glass, sharp rocks, tacks, and nails can pierce the tire and puncture the tube within. A tube can be pinched between the rim and tire causing the tube to split when inflated. If a tire has a hole in it, the tube, which is filled with air pressure, will bulge out of the opening and pop. As well, the valve holding the air pressure in the tube can be damaged or faulty.

How To: Conceal a USB Flash Drive in Everyday Items

Technology in computers these days are very favorable to the semi-knowledgeable hacker. We have TOR for anonymity online, we have SSDs to protect and securely delete our data—we can even boot an OS from a thumb drive or SD card. With a little tunneling and MAC spoofing, a decent hacker can easily go undetected and even make it look like someone else did the hack job.

Weekend Homework: How to Become a Null Byte Contributor

We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowledge. There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials...

How To: Get Packet Injection Capable Drivers in Linux

In this Null Byte, we are going to be installing Packet Injection capable drivers in Linux. These are the open-source drivers required to sniff wireless traffic, inject packets to crack a wireless access point, and go into "monitor-mode". These drivers are superior because they are the fastest available drivers.

News: Free Protein Folding Game Cracks HIV Molecule Riddle

Foldit is definitely a niche game. The sole gameplay mechanic is attempting to fold complex proteins into smaller and more efficient shapes following the rules of molecular physics and biology. Points are awarded based on how small one can make the protein. Online leaderboards track players' relative progress and allows them to view and manipulate other players' completed designs. It's original, certainly, but no developer is going to ship a million units of a game about molecular-level prote...

How To: A Beginner's Guide to Appreciating Bourbon Whiskey

Bourbon is the ultimate American spirit, considering the barrel-aged distilled spirit was originally produced in an area known as Bourbon County, Kentucky. To meet the legal definition of bourbon, it must be produced in the United States, must be created with at least 51% corn, and aged in new oak barrels. There are two types of bourbon whiskeys—straight and blended. Straight bourbon means that the bourbon has been aged for a minimum of 2 years, and has no other coloring or flavoring added. B...

News: Truck Driver Reverse Engineers Atom Bomb, Rebuilds Little Boy

You're walking down the street, minding your own business. Then you see it—a large, bright fireball in the near distance. A tremendous heat wave speeds towards you at one thousand miles an hour, and before you can think, before you can even blink, the extremely heated wind pushes right through you. Your skin melts, your eyes liquefy—your face disappears into the wind. Before you know it, your pancreas collide with what’s left of the person next to you, your duodenum is dissolving faster than ...

REVIEW: The A-Team

People smile in this movie. This is a genius breakthrough Another day, another remake. Another safe choice during apparently rocky times - this wintry economic climate, don't you know - and we're off and watching Joe Carnahan's big-screen version of the A-Team. In 2010.

How To: Make Surface-Mount Electronics at Home for Smaller, Cheaper DIY Gadgets

Whenever we make a homemade circuit, we use what are called through-hole components. Any components with long metal leads is a through-hole component. They are great for soldering to, but it's tough to fit enough through-hole resistors and capacitors into a smartphone. To get those last microns, we have surface-mount components for SMDs (surface-mount devices). These are all of those teeny, tiny things you see when you crack open your digital camera or laptop case.

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services

For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. Before someone can learn how to root a box, they need to learn how not to be found. I can not stress that point enough.

Uncrackable: Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt and decrypt as you need. GPG is a great open-source version of Pretty Good Privacy (PGP), a similar application used for encryption, but licensing and patent problems led to the development of GPG in its wake.

News: Amazon Mechanical Turk

It's really a shame that it is so hard for people to make money on the internet these days. The dot com bubble has receded and scams are plentiful on the web. There are, however, a couple of legitimate ways to make a few extra bucks online, Amazon Mechanical Turk, or MTurk for short, is one of them. The idea of MTurk is to hook up programmers with people that do tasks that computers can not, these tasks are called HITs (Human Intelligence Task). These tasks include article creation, creative ...

HowTo: Read Your Own Mind

The days of trundling hoops, hopscotch and painted wooden rocking horses are long since past. The latest trend in toys? Biofeedback. Electroencephalography. A decade into the 21st century, the toy market is awash in products that incorporate functional neural sensors.

How To: Play Safe & Avoid FarmVille Scams

With FarmVille being one of the hottest Facebook games on the market, it's no wonder it's the primary target for scams and virus downloads. Anyone playing FarmVille is at risk, but the primary targets are those looking to improve their gameplay and build their farms and neighbors up. These "farmers" are the ones seeking quick hacks and cheats.

Make Your Own Nitrous Oxide: Hilarious Science

If you've ever had teeth removed/minor surgery, you most likely received some laughing gas, or nitrous oxide. This gas creates a happy, lightened feeling, and causes instant laughter. In this article, I'll show you how to make some. BUT BE CAREFUL!!! DO NOT proceed in this experiment unless you have EXTENSIVE knowledge of chemistry!!! Misuse of this procedure could result in the production of LETHAL GASSES! However, the set-up is quite simple, if done correctly should not lead to any issues. ...

Don't Get Doxed: 5 Steps to Protecting Your Private Information on the Web

If you follow the Anonymous, Occupy, and IT security scenes, you have no doubt heard about a dox release. What is it? How can it hurt you? And most importantly, how can you protect yourself from it? Some of these steps might seem common sense, while others will be an ah-ha! moment. Your private info is both your biggest weakness and your biggest weapon in your battle to remain anonymous. You must learn how to use it as both.