Login Regularly-this Search Results

How To: Run an FTP Server from Home with Linux

File Transfer Protocol, or FTP, is a network protocol made for transferring files in a client and host fashion over a Transmission Control Protocol (TCP) network, such as the internet. FTP is integrated into most browsers, and you have probably used it before. It is a common way to host files and transfer them easily. To access an FTP, a login is required, unless the server is configured to use anonymous logins (like the Arch Linux mirrors).

How To: Play Safe & Avoid FarmVille Scams

With FarmVille being one of the hottest Facebook games on the market, it's no wonder it's the primary target for scams and virus downloads. Anyone playing FarmVille is at risk, but the primary targets are those looking to improve their gameplay and build their farms and neighbors up. These "farmers" are the ones seeking quick hacks and cheats.

How To: Grow Cold, Hardy Running Bamboo

Bamboo is easy to grow, but there are a few things you should know before starting. There are hundreds of species of bamboo and they can be roughly divided into either running or clumping bamboos. Almost all cold hardy bamboos are runners and almost all tropical bamboos are clumpers. Running bamboos send out root like rhizomes underground and can spread many feet each year. Clumping bamboos slowly expand and stay in a tight clump with canes close together. We grow dozens of cold hardy bamboo ...

How To: Safely Log In to Your SSH Account Without a Password

SSH is amazing, and we praise its existence on Null Byte for many reasons. Notably, it allows us to reroute our traffic through encrypted ports on our local host to be sent to its destination when on the go. You can even control your home computers remotely over a secure and encrypted connection. This is handy for a multitude of reasons.

News: Play BF3 Today! (1 day early)

Battlefield 3 officially comes out tomorrow but people have figured out a way to play it today if you have it downloaded (digital pre-install). All you have to do is fake an ip to make it look like your timezone is ready to play. I'll try this when I get home, in the meantime:

News: You Don't Need to Be a Hacker to Hack with This Android App

Security awareness seems to be a hot topic these days on the web, with developers making apps and devices that can hack networks and machines with just a few clicks. But these applications aren't only exploiting security flaws in systems and networks, they're being used by amateur and wannabe hackers who want to have a little fun, but don't want to learn how to actually "hack" anything.

News: Super Tiny (And Cheap) DSLR Intervalometer for Time-Lapse Photography

If you're lucky, your digital camera has a built-in intervalometer that lets you operate the shutter regularly at set intervals over a period of time. Why would you be lucky? Because you can create some very awesome time-lapse videos, like the horribly beautiful eruption of a volcano or vivid star trails in the night sky. You can capture the stunning display of the northern lights or even document the rotting of your favorite fruit.

News: Discover the Hidden World Around You with the Trover iPhone App

You're in a new city and you want to explore—what mobile app is best? If you want to know what club is hopping that night, use SceneTap. If you want to know if any friends are at a nearby get-together, use Foursquare. If you want to know what restaurant is best, try Yelp. But if you're looking to get a real feel for the city, skip the more touristy destinations and take to the streets—discover where some great graffiti is located or where the best view of the city is with the Trover iPhone ap...

News: FaceNiff App Allows Android Users to Hack Facebook

Firesheep caused quite a stir when it was released last October, giving both hackers and non-hackers instant access to people's account information when on a public Wi-Fi connection. When logged into an insecure website on the same network as someone with Firesheep, you're giving them access to the cookies that keep you logged in. This is called session hijacking, and grants them easy access to your accounts, like Facebook, Flickr and Twitter. Now, there's an even easier way to do this—a mobi...

HowTo: Stay Safe Using Public WiFi

For travelers on-the-go, or penny pinchers who like to surf the web for free in public places, there are necessary precautions one must take when accessing sensitive information over a public WiFi connection. For advice on doing this safely, check out Glenn Fleishmann'sguide to staying protecting your private information. Fleishmann outlines how to:

News: Massive Gawker Hack Reveals the Web's Most Stupid Passwords

This past Sunday, a group called Gnosis launched a massive hacker attack on Gawker media, one of the web's most popular blog networks (Lifehacker, Gizmodo, Jezebel, io9, Jalopnik, Kotaku, Deadspin and Fleshbot). 1.3 million registered users' passwords were compromised, and 188,279 of them were decoded and made public. The biggest takeaway? Many Gawker denizens use downright dumb passwords. (Guess they didn't see their own Lifehacker's story on avoiding such a thing.)

News: FIX WINDOWS 7 SLOW STARTUP TIMES...

How to Fix Windows 7 Slow Start Up Is your Windows 7 slower on start up? Wondering how to make Windows 7 super fast? There are various reasons why this operating system performs slower but one common reason is that mostly it happens because of too many start up programs and services running in the background.

How To: Keep Your PC Running Smoothly

Introduction This is one of the things I am asked the most and there are so many different answers. It is hard to just tell you without know your computer's current speed or what type of hardware it has. So here I will talk about how to speed up a slow computer and how to keep your computer running fast.

Goodnight Byte: HackThisSite Walkthrough, Part 2 - Legal Hacker Training

Welcome to the closing of the second HackThisSite and programming Community Byte. First and foremost, I would like to ask that people start showing up on time to the Community Bytes. If you need help converting your time zone to PST, go to Time Zone Converter. When users do not show up on time, we have to go backwards and catch everybody up. This wastes time and will also make other users' experience less enjoyable when they have to watch and listen to the same thing 100 times. Punctuality as...

How To: Use Wireshark to Steal Your Own Local Passwords

Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their computers to protect from various threats. Here are a few things that should always happen when doing business on computers:

How To: Install "Incompatible" Firefox Add-Ons After Upgrading to the New Firefox

To the displeasure of many loyal Firefox users, Mozilla has been deploying what seems like a new marketing strategy to "catch up" to Google Chrome. I have no idea if this is because the version number is higher than theirs, but it is downright annoying. It's not all complaints, though. Firefox has done an amazing job at completely revamping its source code and redesigning all of its engines, making it a more than worthy competitor to Chrome. However, we are displeased with Firefox because eve...

How Do You Create Your Own Job: An Example

On Thursday, March 9, there was a news story on the evening news about Khan Academy (NBC News). The story began when Sal Khan started tutoring his cousin in 2004. Since he was in Boston and she was in a different city, he decided to make and post videos on YouTube so anyone could watch the videos. Later he added videos for her brothers and for people that contacted him with requests for other videos. During this time Sal had a job that he later replaced with another job. Today Sal has 2010 vi...

How To: Use the Test Realm

Hey wizards! As you have read in the gardening article I put up a few days ago, it requires the Test Realm! It's pretty easy to use the Test Realm, but there are a few very important limitations you have to pay attention to before using it. Many of you reading this may be pretty agravated. Here's how KingsIsle puts it:This Test Realm is available to Subscribers.

News: Scrabble Showdown Game Show a Disgrace to Competitive Scrabblers Everywhere

Scrabble has invaded just about every medium out there. It started as a mere board game, but has since spawned numerous board game spinoffs and variations, an electronic version, mobile apps for just about anything (Android, iPhone, iPhone, iPad and Kindle), games for both PC and Facebook, and video games for handheld consoles like the Nintendo DS and Sony PSP. Heck, it's even on the PlayStation and Xbox 360 gaming consoles. And it hasn't forgotten about film. You can see Scrabble featured in...

Don't Get Doxed: 5 Steps to Protecting Your Private Information on the Web

If you follow the Anonymous, Occupy, and IT security scenes, you have no doubt heard about a dox release. What is it? How can it hurt you? And most importantly, how can you protect yourself from it? Some of these steps might seem common sense, while others will be an ah-ha! moment. Your private info is both your biggest weakness and your biggest weapon in your battle to remain anonymous. You must learn how to use it as both.

Mastering Security, Part 1: How to Manage and Create Strong Passwords

I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to remember lengthy passwords and why their current password isn't good enough. Well, I'm going to show you.

How To: Bypass Windows and Linux Passwords

If you're interested in bypassing Windows and Linux passwords, there is a great tool from the good people at Kryptoslogic. Have you ever forgotten your administrator password? Have you ever bought a used computer with a password on it? Well, Kryptoslogic have created a boot-disc call 'Kon-Boot', which allows you to bypass any Windows 32 or 64 bit OS, as well as Linux passwords. There is both a paid and freeware version available.