Household Hacker Search Results

Goodnight Byte: HackThisSite Walkthrough, Part 3 - Legal Hacker Training

Welcome to the Goodnight Byte for HackThisSite, Basic Mission 4. In Friday's session, we tackled some coding in Gobby. Nothing special, just a few modifications to the NullBot script we made a few session ago, and some education on regular expressions. Apart from coding, we did our scheduled HackThisSite mission. We had to take on some JavaScript, which was a new thing for Null Byte. This mission taught us about client-side HTML manipulation through JavaScript injections. This just means that...

Community Byte: HackThisSite Walkthrough, Part 3 - Legal Hacker Training

Welcome to another Community Byte announcement from Null Byte! The goal of the Community Bytes is to teach people in a co-operative, hands-on manner. Learning from experience and immersing yourself in a subject is the best way to learn something foreign to you, so that is exactly what we do! In our sessions, we have started to both code and complete HTS missions. This means that there is something for everyone here, so make sure you join us.

Goodnight Byte: HackThisSite Walkthrough, Part 2 - Legal Hacker Training

Welcome to the closing of the second HackThisSite and programming Community Byte. First and foremost, I would like to ask that people start showing up on time to the Community Bytes. If you need help converting your time zone to PST, go to Time Zone Converter. When users do not show up on time, we have to go backwards and catch everybody up. This wastes time and will also make other users' experience less enjoyable when they have to watch and listen to the same thing 100 times. Punctuality as...

Goodnight Byte: Coding a Web-Based Password Cracker in Python

Our mission for this week's Community Byte was to create a Python program to crack web-based passwords, like the ones you would see on an email or router login. I wanted it to be universal in the sense that it could be easily modified and adapted to another website just by changing a few variables. That was a success! Even though people weren't on time to the coding session, everything went well.

News: The Perfect Hack for Enabling NFC Credit Card Payments on Your iPhone 4

Remember the good ol' days when you actually had to swipe your credit or debit card to make a payment at the store? Now all it takes is a flick of the wrist to purchase goods with your card, thanks to RFID (radio-frequency identification) technology from Chase (blink), Visa (payWave) and MasterCard (PayPass). But soon "contactless" payments will be made by an entirely different beast—NFC, which stands for near field communication.

News: The Revolution of the Hacked Kinect, Part 3: Gaming Gets Artsy

Video games and art have somewhat of a sticky relationship. Many video games have large teams of talented artists doing amazingly creative work, and yet the art community is only just beginning to utilize video games as art (sometimes). Perhaps if video games were shown not just as a medium of expression, but as a means of creating great art as well, the art community would be forced to consider it differently. The third part in the Hacked Kinect series will focus on the artistic possibilitie...

News: Google Bets $20K You Can't Hack Chrome

Since its inception in 2007, the Pwn2Own computer hacking contest has been challenging the vulnerability of mobile phones and web-related software. In 2010, the fruit of two full days of hacking came down to the exploitation of the following web browsers: Safari 4 on Mac OS X, Internet Explorer 8 on Windows 7, and Firefox 3.6 on Windows 7. The winners walked away with the successfully hacked computer, plus a cash prize, but they left one Godly browser intact: Google Chrome. Even the savviest ...

News: Massive Gawker Hack Reveals the Web's Most Stupid Passwords

This past Sunday, a group called Gnosis launched a massive hacker attack on Gawker media, one of the web's most popular blog networks (Lifehacker, Gizmodo, Jezebel, io9, Jalopnik, Kotaku, Deadspin and Fleshbot). 1.3 million registered users' passwords were compromised, and 188,279 of them were decoded and made public. The biggest takeaway? Many Gawker denizens use downright dumb passwords. (Guess they didn't see their own Lifehacker's story on avoiding such a thing.)

News: "How I’d Hack Your Weak Passwords"- The Art of Cracking

Lifehacker posts an article on the art of cracking weak passwords, courtesy of Internet standards expert, CEO of web company iFusion Labs, and blogger John Pozadzides. Pozadzides certainly knows a thing or two about password logic. (Note: this information is not intended to hack into accounts, but rather to protect you from using weak passwords).

News: Building-Sized Überorgan Emits Heavenly Music and Farts

Tim Hawkinson is an artist who truly inspires. The Los Angeles based artist creates complex, whimsical sculptures with simple mechanics and basic materials. One of his most notable pieces is the art-world-renowned "Uberorgan", a giant football field sized, fully-automated bagpipe, cleverly constructed with plastic sheeting and pieces of electrical hardware.

How To: Change Your Etsy Privacy Settings to Protect Your Profile from Prying Public Eyes

Nothing on the web is ever private. If you thought you can control your privacy, you were wrong. Websites may give you security options to better hide your information from the world, but ultimately your privacy resides in the hands of the website itself. We've seen how websites let ad companies track our private usage. We've seen how Facebook mucked up their privacy controls. We even saw how websites like Gawker are prone to hackers stealing user information. And now, Etsy has made what was ...

How To: Repack a Motorcycle Muffler

Periodically, motorcycle and ATV exhaust system can be rebuilt to maintain the proper performance and sound level expected from the exhaust system. My experience was with a dirt bike that had an aftermarket high performance exhaust installed.I bought my 99 XR400 second hand and was happy that it already had some nice mods. Namely the High Rev kit, performance header pipes with an E-Series muffler, and the suspension had been redone with higher spring rates. It has great response and the suspe...

How To: Hack a call center telephone system

Tired of touch-tone hell? Get human with our cool phone hacks and cheats with the tips from this how-to video. Become a life hacker - we'll show you how to find phone numbers, cheat the computer and hack the call center system with our hacking tools. Watch this video tutorial and learn how to hack a call center telephone system. Hack a call center telephone system.

How To: Smell Good and Stay Smelling Good

I've heard some people say that "brown people smell bad!" Ahem. Brown people don’t smell bad! Okay, some do, but so do people of all races and cultures. How a person smells has nothing to do with their race, but rather choices they make. I choose not to smell bad, and take steps to make sure that does not happen. Personally I cannot stand bad smells. It's something that makes me feel sick, so I try my best to make sure that I am not the cause of a certain odor. The following are steps I take ...

News: The Stupid Orchestra

How can an orchestra be stupid, one may ask? Well, when musically measuring a toaster next to a cello, one device certainly comes across as inherently… dumber. Think 200 vintage vacuum cleaners, blenders and washing machines assembled into a whirling, ringing, humming cacophony of daily function. It's not exactly music to the ears, but a kind of robotic harmony is formed.

Hacker Fundamentals: A Gentle Introduction to How IP Addresses Work

Imagine you're in Paris and you need to get to Versailles. Looking around for directions, you come to a cold realization—you do not speak a lick of French! How are you going to get to Versailles and what happens if there is a detour? It will be a difficult struggle, and you'd probably get lost and eventually fail. This is why it's important to know some of the country's language before taking that trip in the first place.

How To: Reverse Check a Phone Number

Prank Calls, Masked NumbersWho is calling your phone or your child's? Pranksters use a lot of tricks to make sure they can get on your nerves. Being able to trace prank calls is important because you're not going to learn much from your Caller ID, since most prank callers use an unlisted number - such as, a cell phone number. Many also use special code *67 to mask the number so your Caller ID will show "Blocked Number" or "Private Number". There are a lot of mild cases of so-called phone bull...

Weekend Homework: How to Become a Null Byte Contributor (2/10/2012)

We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials on any skill level, and about anything you feel like sharing that...

Goodnight Byte: HackThisSite Walkthrough, Part 1 - Legal Hacker Training

Friday's Community Byte was weird. The intent was to do a HackThisSite mission, but upon time to begin, everyone in there was programming without my assistance, with the help of Sol Gates. This is great! It's really awesome that everyone enjoys programming that much and will make the effort to learn even when I am not present. So, a tip of my hat to Mr. Sol Gates and the rest of you fine people.

News: Project Zomboid Has More Problems than the Guy in this Screenshot

Making a video game requires an incredible amount of work. It requires people skilled in many disciplines to work together for thousands of hours merging visual art, computer programming, game design, sound design, and music composition into a fun game. The Indie Stone is a Scottish indie development studio started, like so many others, by industry vets who were tired of corporate restrictions and wanted to make the crazy games they had always imagined.