Login Regularly-this Search Results

How To: Make an Unbreakable Linux Password Using a SHA-2 Hash Algorithm

In Linux, all password hashes are normally stored using the MD5 hashing algorithm in the /etc/shadow file, but MD5 is algorithmically weak due to collision vulnerabilities. The new recommended standard are the higher level SHA-2 hashing algorithms, SHA256 or SHA512. As a friend pointed out to me, Ubuntu is currently the only distro implementing SHA-2 as the default. With SHA-2, your passwords take an unreasonably larger amount of time to calculate. This will greatly decrease how many password...

News: Change from BASH to zsh

Hello fellow Null-Byters today I will be showing you how to change from the simple but powerful BASH system to a more powerful and faster Z - Shell system. This change can be permanent if you want but doesn't have to be, and it is an extremely simple one to perform.

How To: Create a WonderHowTo Account

WonderHowTo is a great place to find advice and learn things that you want to know, but can't find anywhere else. On this website, there are tons of people who make articles and videos to show you how to do stuff. In this tutorial, you will learn how to make your own WonderHowTo account and join this amazing place.

How To: Change the default password on a D-Link router

This tutorial shows us how to change the default password on a d-link router. First, go to your web browser and type in "http://192.168.0.1". A pop up box will now appear, in the user name section write "admin" and in the password section, leave it blank. On the new page, click on the "tools" section, then type in a new login name under the administrator section. After this, enter a new password and confirm it. Now delete all the information under the "user" section. Save these settings, clic...

How To: Change the default password on a NETGEAR router

In this video tutorial, viewers learn how to change the default password on a NET-GEAR router. Begin by opening your web browser and go to this site: Router Login. When the Prompt window opens, type in your router's user name and password, and click OK. In the sidebar, under Maintenance, click on Set Password. Now type in the old password, new password and re-type the new password once again to confirm. Finish by clicking Apply. This video will benefit those viewers who use a NET-Gear router,...

How To: Disable Wi-Fi SSID broadcast on a NETGEAR router

In this video tutorial, viewers learn how to disable SSID broadcast on a NETGEAR router. Begin by opening your browser and go to the site: Router Login. Then type in your user name and password. Click OK. In the sidebar under Setup, click on Wireless Settings. In Name (SSID), type in a new network name and click on Apply. In the sidebar under the Advanced, click on Wireless Settings. Type in your user name and password once again, and click OK. Under Wireless Router Settings, uncheck Enable S...

How To: Encrypt a NETGEAR router with WEP password protection

In this video tutorial, viewers learn how to set and encrypt a NET-Gear router with WEP password protection. Begin by opening your web browser and go to the router website: Router Login.. When the Prompt window appears, type in your router user name and password, and click OK. In the sidebar, under Setup, click on Wireless Settings. Once again, type in your user name and password, and click OK. In the Security Options, check WEP (Wired Equivalent Privacy). Then select the Pass-phrase box, typ...

How To: Transplant Papaya Trees

Papaya trees are very vulnerable to transplantation shock. Seedlings tend to recover slowly and poorly after replanting in a new location under a sunny sky. Many internet articles advise that papaya trees should be transplanted without injury to their root systems. Keeping the root systems intact is next to impossible if the papaya seedlings are too close to each other. However, you would be surprised to learn how a papaya tree with serverely broken root systems can survive a transplantation ...

Goodnight Byte: HackThisSite Walkthrough, Part 1 - Legal Hacker Training

Friday's Community Byte was weird. The intent was to do a HackThisSite mission, but upon time to begin, everyone in there was programming without my assistance, with the help of Sol Gates. This is great! It's really awesome that everyone enjoys programming that much and will make the effort to learn even when I am not present. So, a tip of my hat to Mr. Sol Gates and the rest of you fine people.

Social Engineering, Part 2: Hacking a Friend's Facebook Password

Welcome to the second Null Byte in a series educating you on Social Engineering awareness and techniques. Today, I'm going to show you how a saavy Social Engineer would trick a friend into unknowingly surrendering their Facebook password. My intent is to warn and demonstrate how easy it is to succumb to phishing via Social Engineering, and therefore expose yourself.

Community Byte: Coding a Web-Based Password Cracker in Python

Welcome to another Community Byte announcement! In the past two sessions, we have coded an IRC bot in Python capable of issuing commands. Since it can issue commands and most of you are new to programming, that project will stay idle for a while. Other commands such as voice and half-op can be easily hacked in via common sense, even if you weren't there for that session.

How To: Make skillet grilled chicken fajitas

Before you begin to make your skillet grilled chicken fajitas, place a skillet in your oven at about 350 degrees. You will also need flour tortillas. Heat up another pan and drizzle some olive oil into the pan. Slice up an onion and place in pan to brown. Add a pinch of sugar and a sprinkling of red wine vinegar to bring out the sweetness in the onions. Make sure you stir regularly so the onions don't burn. Choose either a red, yellow, or green pepper and wash it. Cut out the stem/top, pull o...

News: "How I’d Hack Your Weak Passwords"- The Art of Cracking

Lifehacker posts an article on the art of cracking weak passwords, courtesy of Internet standards expert, CEO of web company iFusion Labs, and blogger John Pozadzides. Pozadzides certainly knows a thing or two about password logic. (Note: this information is not intended to hack into accounts, but rather to protect you from using weak passwords).

How To: Take care of leather hiking boots

Wade Bourne of MyOutdoorTV.com shows you how important it is to take care of leather hiking boots. Leather boots are expensive, and they should be treated like an investment. This means giving them proper care to extend their life and receive the greatest use and value for your dollars spent. Here are tips on how to care for leather boots to extend their useful service.

How To: Vent a fish

Scientific studies have shown that species with large swimbladders, especially bottom dwelling fish such as grouper and snapper, derive an immediate benefit from venting.

News: Performance Hacks & Tweaks for Linux

If you have made the switch from Windows to Linux, I want to congratulate you in advance. I'm sure you have noticed a huge performance increase when using Linux over other operating systems. This is only half the battle, though! Most users who are new to Linux end up using Ubuntu. I have no gripes with Ubuntu, but I do not agree with their philosophy. It almost mimics Windows. Ubuntu favors ease of use, and despite valiant efforts by the development team thus far (Ubuntu is crazy fast), all o...

How To: Make Hanging Dried Persimmons (Hoshigaki)

A seasonal tradition brought over from Japan to America by Japanese-American farmers, making hoshigaki (as they're called in Japanese) is a fun outdoor autumn project you can do before the winter season really kicks in. Hang a bunch of peeled persimmons on a string outside, wait for three to five weeks, and harvest yourself some naturally dried persimmons during the winter months. Though peeling the fruit and then regularly massaging the fruit every few days after hanging may be more labor in...

a closer look at keywords: wither

to be honest with everyone, this is probably the first thing ive written about magic the gathering, but i figured i might as well start somewhere. in the game of magic the gathering there are countless different keywords, some being common, like trample, or rarely used or seen, like splice. what i wanted to do was take a closer look at some of the different keywords out there, and see just how they change the average game.

Palermo: Coming Soon (somewhat) to a theater near you.

If you don't watch Argentine soccer regularly, it's possible that you don't know who Martin Palermo is. He scored Argentina's second goal against Greece yesterday and wrote another page in a story that's bound to be made a movie someday. He's won about 14 titles, scored over 222 goals in Boca Juniors and is their record striker.

How To: Defeat SSL in Practice with SSL Strip

SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, whenever you see "https://" in front of the URL in your browser, you know you're safe... or are you?

How To: Execute a Basic SQL Query Using dbForge Studio GUI for MySQL

If you need to build a SQL query, you can choose one of two alternatives. The first and a rather old way is using a console. But if you build your queries in MySQL console, you have to remember all the commands and keys. This is not a convenient way, because query execution is a time-consuming process. Another way is to use some graphical interfaces for MySQL. It can fulfill many developers' requirements, including query execution.