Another week has passed on the online battlefield as the CISPA legislation continues to grind away at our freedom. Here at Null Byte, we try to keep our community informed and knowledgeable at the same time—and that means creating content for them to learn from.
Technology in computers these days are very favorable to the semi-knowledgeable hacker. We have TOR for anonymity online, we have SSDs to protect and securely delete our data—we can even boot an OS from a thumb drive or SD card. With a little tunneling and MAC spoofing, a decent hacker can easily go undetected and even make it look like someone else did the hack job.
Here are the13 best articles on How to Build a Potato Gun. http://www.scribd.com/doc/15796837/To-Make-A-Spudgun-An-instructionally-informative-document-by-Enoctis
Introduction The 3 major anonymity networks on the Internet are Tor/Onionland, I2P and Freenet. If you feel confused on which one is the "best" one to use the answer is simple. Use all three!
I want to write this article because in my childhood, I had experienced internet stalking which ultimately ended in physical stalking which then lead to several attempted abductions. I have now learned how to use the internet safely, who to communicate with and I've learned how stalkers work.
An "employee" is helping a customer who has a few questions. Not only does the fake employee know absolutely nothing about what is being asked, but the "employee" then "accidentally" breaks an item in the store while trying to demonstrate to the customer. Then a "manager" walks by, and the employee blames the broken item on the customer. The results are endless. People might react in all sorts of entertaining ways. The prank really depends on the fake employee's ability to keep cool while lyi...