Implemented Effectively Search Results

How To: Social Engineer Your Way Into an Amusement Park for Free

When it comes to social engineering, Null Byte is here to show you how it's done. Social engineering is the key fundamental to unlocking tons of possibilities and opportunities in your everyday life. So, what is social engineering? Social engineering can be called many things. It's taking nothing and turning it into something. It's taking the bad and making it good. Above everything else, it's the art of manipulating the world and people around you—coercing that salesman into giving you a low...

How To: Run a Virtual Computer Within Your Host OS with VirtualBox

With the computer's rapid increases in power and efficiency, computer virtualization has taken the scene by storm. With virtualization software, and powerful enough computer hardware, your computer can run a virtual computer within itself. This effectively gives you multiple OS's on the host OS. This can be used for a lot of cool stuff that your computer would normally be limited by. Let's take a look at a few.

Social Engineering, Part 2: Hacking a Friend's Facebook Password

Welcome to the second Null Byte in a series educating you on Social Engineering awareness and techniques. Today, I'm going to show you how a saavy Social Engineer would trick a friend into unknowingly surrendering their Facebook password. My intent is to warn and demonstrate how easy it is to succumb to phishing via Social Engineering, and therefore expose yourself.

News: New Biometric Device Steals Fingerprints from 6 Feet Away

Dactyloscopy isn’t going anywhere. Forensic science has much relied on fingerprinting as a means of identification, largely because of the massive amount of fingerprints stored in the FBI’s biometric database (IAFIS), which houses over 150,000 million prints. And thanks to the departure of messy ink-stained fingertips, biometric analysis isn’t just for solving crimes anymore.

Privacy Is So 2001: An Anime Video Game Novel About Social Media

Japanese people are into many things Americans find weird—like YouTube's beloved canine-hosted cooking show or Daito Manabe's light up LED grills or even more insane, a vending machine that distributes live crabs. In light of these cultural oddities, the Japanese phenomenon of visual novels (NVL, or bijuaru noberu), seems relatively normal. A meeting place of books and video games, visual novels are a sort of "Choose-Your-Own-Adventure" for the new generation.

News: World's First Bionic Cat

Oscar the cat is one lucky feline. After losing his two hind legs in a combine harvester, his loving owners had Oscar outfitted with two prosthetic paws, or metallic pegs to be more specific. This revolutionary veterinary procedure is nothing to scoff at - biomedical engineering experts and a neuro-orthopedic surgeon were both called in to create the world's first bionic cat. Via BBC:

How To: Do a jackknife crunch ab exercise on an aerobic step

Are you tired of doing the same exercises for abs? The jackknife crunch may be the answer to your problems. This exercise effectively works the core muscles. It should be noted that whenever the knees move toward the chest (the jackknife motion), the hip flexors are involved. The hip flexor muscles are actually part of the upper leg. They allow you to kick a ball or lift the knee from a standing position (as in running). Thus, if you are trying to isolate the abs, there are better alternative...

How To: Make Super Fizzy Carbonated Beverages at Home with Dry Ice

Want to make your own soda or maybe just bring a dull one back to life? Homemade sodas don't always live up to the store bought ones because they can taste flat by comparison. This quick and easy method makes super fizzy drinks with only four ingredients. Because putting dry ice in a sealed bottle would effectively turn it into a bomb, you'll need to make a safety valve for the bottle.

How To: Engage in a Guerrilla Marketing War

Warfare strategies have become an inspiration to different marketing professionals, many of them drawing influence from Sun Tzu’s Art of War. This ancient Chinese text provided treaties on how to effectively manage resources, tactical positioning, and timing attacks. It also states that “..if you know your enemies and know yourself, you can win a hundred battles without a single loss”, a basic concept in which you have to always watch your competitor to anticipate his next move.

How To: Share Local Drives and Folders using Oracle VM VirtualBox with a Guest Windows OS

There are several virtual machine managers present in the market. However, the main functionality of all VMs are the same. Most people like to get free VM managers, so that they can install as many operating systems as they like over the host operating systems. One of these free VM managers is Oracle's VM VirtualBox, which can be downloaded from Oracle's website for all popular operating systems, such as Linux, Windows and Mac.

How To: Answer to Scrabble Challenge #20

It's sad to say, but I will no longer be writing up anymore Scrabble Challenges. Frankly, I just don't have the time to make them now. And though they are incredibly fun and "challenging" to conjure up, I'm not sure that people are finding them as useful as I had hoped. But really, it all comes down to time. So, unless I have a future craving for puzzle-making, last week's Scrabble Challenge #20 was the last one.

How To: Create a Super Speed Track in Minecraft

Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. There are many ways to get around in Minecraft, from boats to mine carts, but did you know that you can travel even faster on foot? That's right, by creating a running track, players can run at super speeds! Not only is it the single fastest way to travel, it's easy to build as well. No redstone wires required.

How To: Use Wireshark to Steal Your Own Local Passwords

Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their computers to protect from various threats. Here are a few things that should always happen when doing business on computers:

How To: Permanently Delete Files to Protect Privacy and Passwords

Permanently deleting files is something that a lot of people aren't aware of. Actually, most people think that once a file is deleted, it is gone forever. This is not the case. Hard drives write to the disk via magnetic charges, positive and negative correlate to 1s and 0s for binary. This is then interpreted into information for the computer to use and access.

The Schmupaissance: Gatling Gears and the Rebirth of Shoot-'Em-Up Games

Shoot-em-up games, or shmups, consist of lone or small groups of players shooting at and being shot at by hordes of colorful enemies. The genre is thought to have peaked in the mid-'90s, but recent games in the indie world may be saying otherwise. Geometry Wars and other twin-stick games kicked off the trend, but newbies Trouble Witches NEO, Outland and just-released Gatling Gears have brought some much needed originality into the modern shmup scene—making it something worth exploring again. ...

Shadow: Why, God, Why?

Any time a feature is introduced in an MTG set and not replicated in subsequent sets, balancing issues are surely forthcoming. You wind up with one set that can do things the others can't, forcing players to counter that set with other cards from it, and generally limiting the creativity with which one can effectively play the game. Playing these types of cards is like playing trap defense in hockey or boxing like Floyd Mayweather: you might win, but neither you, your opponents, nor the peopl...

News: References As A Marketing Tool

One of the most important marketing tools we should always be developing to help reinforce our brand is our references. Just like many companies use their client list and client references to build credibility and confidence for their products and services, we should also leverage our references to build credibility and confidence in our capabilities and brand. Sometimes reference checks are just a formality, but in most cases potential employers (i.e., potential clients) use reference checks...

How To: Style Stellar Brows

The importance of the brow has not been forgotten as much as it has been overlooked. A natural tool of communication, the brows can convey surprise, disdain, and sorrow with a lift, a furrow, or an expressive softness. The masters of makeup, like Max Factor and Ben Nye, knew the importance of perfectly styled brows, and how that would affect the work of the actors with whom they worked.