Ideal Web Search Results

How To: Replace Pentalobe Screws on an iPhone 4 with a Pentalobular Screwdriver

You've all probably heard about Apple's attempts to thwart iPhone 4 users from opening up their own devices, thanks to their sly maneuvers in switching out everyone's screws with those funky pentalobular screws. But one thing Apple will never learn— they will never have complete control. Where there's a will, there's a way. And if someone wants to fix their own iPhone or modify it slightly, they're going to do it, regardless of what screws bind it together.

How To: Use an adjustable overcast foot on a sewing machine

To use an adjustable overcast foot on a sewing machine, watch this video sewing tutorial. It is ideal for stitching and finishing stretch fabrics or fabrics that unravel easily. Prevents seam from puckering, even when stitching wider seams. Turning the screw, adjust wire to seam width so needle swings over wire on right side. Stitch slowly with edge of fabric even with red guide and stitch going over wire. Use an adjustable overcast foot on a sewing machine.

News: Credit for coming up with it

In case you haven't figured out already, our government is always on the move to figure out new ways to extend their control. The CISPA, for one, is one of the best examples, along with "re-education" programs, and racial divide (Trayvon). What I've noticed in the past few months is that their new "ideas" are coming out at an increasingly alarming rate.

Community Byte: HackThisSite, Realistic 5 - Real Hacking Simulations

Eventually, we plan on doing some root the box competitions here at Null Byte, but we're still looking for a server to play on. Anyone want to donate one? You won't regret it. Root the box is like 'king of the hill', except you have to hack a server and maintain access. Each server will have numerous known security holes, but until then, let's get back to the regular weekly coding sessions and realistic hacking missions on HackThisSite.

Community Contest: Code the Best Hacking Tool, Win Bragging Rights

Here's something fun for the Null Byte community to do—a coding competition! This week, I wanted to get everyone involved by offering you all a nice library of possible program types to choose from and try to code. At the end of this competition, all of the submitted programs will be reviewed by the community and myself. The coder that receives the most votes will be dubbed THE BEST.

Community Byte: HackThisSite, Realistic 4 - Real Hacking Simulations

We'd like this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with (anyone want to donate one?), we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But for now, back to the normal flow of things...

Community Byte: HackThisSite, Realistic 3 - Real Hacking Simulations

We're aiming for this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with, we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But, for now, back to the normal flow of things...

How To: Encrypt Your Sensitive Files Using TrueCrypt

Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm here to teach you how to create a general encrypted container—not the complex hidden TrueCrypt volume.

News: Space Painting with a Tesla Coil and One Million Volts of Electricity

Nikola Tesla. He was the man behind some of the greatest inventions of all time, including radio and alternating current. But perhaps his most visually fascinating invention is the Tesla coil. While maintaining a low current, it can produce dangerous high frequencies and voltages that can well exceed 1,000,000 volts, discharging it in the form of electrical arcs very similar to lightning.

Community Byte: HackThisSite, Realistic 2 - Real Hacking Simulations

The community tore up the first realistic mission last week. You've applied the techniques learned in the basic missions to a real scenario, so I'm pretty content. The realistic missions are where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding and hacking sessions. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, f...

Community Byte: HackThisSite, Realistic 1 - Real Hacking Simulations

Community byters, it's time to get serious. We are finally moving on to the realistic missions in HackThisSite. This is where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding and hacking sessions. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, from novice programmers to aspiring hackers.

Weekend Homework: How to Become a Null Byte Contributor

We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowledge. There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials...

News: The Best of CES

This year's Consumer Electronics Show is nearing an end so of course it's an occasion for the 'best of' lists. To save you time I thought I'd compile my 'best of' the 'best of' lists.

News: The Amazing PVC Pipe Music of Kent Jenkins (aka Snubby J)

There's a ton of videos on the web of musicians playing homemade PVC instruments, but I just recently stumbled upon the impressive work of PVC pipe player Kent Jenkins, aka Snubby J. His most recent video features a duet with his faux-twin, playing "Wizards in Winter" by the Trans-Siberian Orchestra. Turns out, he's been a PVC maestro for awhile now and even auditioned for his inspiration, the Blue Man Group, at the age of seventeen. Though he wasn't picked, they saw potential in him and aske...

News: Null Byte Is Calling for Contributors!

We're officially seeking Null Byters interested in teaching others! Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowledge. There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials of any skill level, and anything you feel like...

How To: Get the New Google Navigation Menu

Get the New Google Navigation Menu Although Google introduced the new Google bar last week, I still didn't have the new look yet. I was curious to see if I could find it, and discovered that +Maximiliam Majewski found a workaround to get access to the new Google bar. It's no longer the black navigation bar at the top of the page, but rather a drop-down menu on the left-hand side, from the Google menu. Install a browser extension that allows you to edit the cookies.

How To: Create a Free SSH Account on Shellmix to Use as a Webhost & More

Having an SSH or Secure SHell to tunnel your traffic through is something we have talked about many times at Null Byte. As we know, it allows us to securely route and encrypt our traffic through a remote server, effectively anonymizing us and protecting our traffic from all forms of analysis—simultaneously. We have gone over how to make a home SSH tunnel. However, the question has come up, "How can I get an SSH tunnel to somewhere other than my computer?" This would be useful in a situation w...