Heartbleed, move over. There's a new bug in town, and this time it's also affecting Mac and Linux computers. It's called Shellshock (its original official title is CVE-2014-6271), and it's currently got a 10 out of 10 severity rating over at the National Cyber Awareness System. While some updates have been issued to fix this bug, they were incomplete, and your system is probably still vulnerable, as it has been for the last probably 20 years.
People who know that I am a professional hacker often ask me what they can do to make their computers and personal information safe from people like me. The answer, of course, is that nothing will make you completely safe, but there are a number of measures any computer user can take to reduce the chances of being a victim of a hacker.
It seems like custom Google Now commands are a dime a dozen these days. With Commandr for Google Now giving non-rooted users their first taste of custom voice commands just a couple weeks ago, you may wonder why we're covering this subject again.
Hard as it is to imagine, there are people out there who loathe garlic and onions. Some might have allergies or medical conditions like IBS, or are supertasters (i.e. people who carry a certain gene that makes them extremely sensitive to how certain foods taste). Others might just be picky eaters.
Attention all veterans and active-duty military personnel—this coming Tuesday, November 11th, is Veterans Day, that time of year where the whole country thanks us for our service. For the most part, a simple thanks will do, but some folks like to go above and beyond and give us veterans free or discounted meals and discounts on merchandise in stores.
Your Nexus 7 may be a tablet, but it can also be used as a phone, thanks to the continued upswing of VoIP applications, which send voice and media messages over the Internet—not over a cellular network.
The very first text message was sent on December 3rd, 1992 by Neil Papworth, an engineer for Vodafone, and it simply said "Merry Christmas." He may have jumped the gun on the whole Christmas thing, but you trying coming up with the first text message in history!
What can't coconut oil do? This edible oil, extracted from the copra or meat of a coconut, has done what most other food, beauty, and health trends have not: demonstrated real lasting power. Indeed, the "superfood" continues to make headlines, with its many uses the subject of debate, study, and fervent support. From the obvious (cooking) to the less so (home improvement), there are likely many coconut oil uses you're not yet aware of.
A travelator, also known as a moving walkway or moving sidewalk, seems like a tricky thing to build in Minecraft, especially when it's zigzagging, but there are really simple autowalks out there (like this one).
Moving a 2000 pound safe isn't easy... I was working as manager for a construction company that was performing an up fit on a century old building in downtown Concord, N.C. The owners wanted us to move a two thousand pound (that's a ton!) safe up to the second story so that it could be displayed in their new office. The safe was located between the first and second floors in a small office that was used for accounting purposes in the old days when said building had been a hardware store.
Nowadays, there's a mobile app for just about everything—but that doesn't mean it should be on your smartphone. Not diggin' what SPB Shell 3D did to your home screen? Accidentally purchased Angry Sperms instead of Angry Birds? Want to try out the upcoming Smuggle Truck without committing? You may have to fork out the funds for those paid apps, but by no means should you be willing to just throw your money away. This guide will tell you how to get it back.
I am writing this quick post in response to the recent earthquakes and tsunamis that are affecting Japan. As soon as the news broke, and we began to hear of tsunami warning for our area, I immediately realized how under prepared I was for a natural disaster. The thing that drove this point home even deeper was the number of people asking me for advice on what they could do to prepare for the possibility that we are hit by one of the resultant tsunamis. Many thoughts raced through my mind, and...
Unlike typical waxing, which strips your skin of vital moisture, causing inflamed, dry, and itchy skin as well as ingrown hairs, sugaring is a slightly gentler way of removing hair. Because it's all-natural, made generally of sugar, water, and lemon juice, it irritates the skin less because there are no artificial ingredients or harsh chemicals.
How To Stop The Weirdness Lag, Pauses Etc...In FaceBook/ Zynga Games Via Flash! How-To Topics » Facebook, games, facebook games, online games, zynga
A car that needs to be jump started is going to make a clicking noise but things such as the lights and radio will not turn on. To jump start the car first you need to line the cars up so that the batteries are in line with each other. You will need a working car to jump the car that has the dead battery and a set of working jumper cables. Make sure both cars are completely turned off. Make sure that you keep the two sides of the jumper cables a part. You don't want the two sides of the cable...
Ink & Paint was originally intended to provide a place for the sharing of graffiti and street art related news and the spreading of the street art culture. However in recent months I have noticed a distinct lack of "lowbrow" art in the WHT community. Don't get me wrong though, I'm a HUGE nerd. I love null byte, I love the Minecraft world, and all the tech posts that are becoming increasingly more common. It's awesome. However the nerd in me and the artist in me both want to see more comics, s...
Let's face it, the world we live in is far from the fairy-tale land we want it to be, where violence doesn't exist and weapons are not needed. Our foremost goal in life out there in the scary world is simply to survive. And if we need a few tools to accomplish this, we should use them, right?
It's no secret that water and electronics don't mix well, but somehow, people always manage to combine the two. I've had my fair share of water-damaged electronics, everything from cheap headphones to a desktop computer. My devices are getting dunked in water so much, it's like doughnuts in coffee. And I know I'm not the only one. That jam session with your favorite song will end really quick when your iTouch is chilling in the toilet bowl.
Immigration Laws United States Citizenship
Here's another delicious Byte. Ucha Gobejishvili, a Georgian Security Researcher under the handle of longrifle0x, discovered two cross site scripting (XSS) vulnerabilities on the official website of Forbes. He discovered the hole in two different locations on the site, and has already informed the website of the vulnerability.
In my early life I was deeply impacted by the work of physician and psychoanalyst John C. Lilly. I still have my dog-eared copies of The Mind of the Dolphin (1967) and Programming and Metaprogramming in the Human Biocomputer (1968). Lilly's work, with dolphins and the development of the sensory deprivation tank, has formed the basis of movies, music and television productions.
Cell phone jammers, a DIY endeavor for the darker crowd. I'm pretty sure we've all considered having one at some point: whether the obnoxiously loud woman next to you is announcing private bedroom stories to a crowd on the subway, or your kids are grounded from using the phone (and consequently snagged a hidden prepaid phone), sometimes having a cell phone jammer comes in handy.
There was a huge ban wave recently on Xbox Live. In the unfortunate event that you decided to do something against Microsoft policy, and have consequently gotten yourself banned from Xbox Live, you may have come to the realization that doing whatever got you banned from Xbox Live in the first place was not worth the risk.
Hardware hacks are something I feel we don't get enough of at Null Byte, so today I figured I would introduce a fun one. I've always been a curious hardware hacker. Taking things apart and learning how their internals work has always been a part of my nature. Quite some years ago, my father showed me a really cool trick on how to hack normal radios to scan frequencies that are normally non-listenable. This little hack allowed us to scan frequencies belonging to law enforcement, and even frequ...
We love tearing apart security here at Null Byte. Several years back, upon returning items to Wal-Mart due to a malfunction, I noticed something very peculiar about the way their overall procedure goes. I brought the item up to the desk, and the woman asked if it didn't work, which I responded affirmatively. Without a moment's notice, she takes it right off to the defective items area and asks if I would like cash or store credit.
For newbies to astronomy, expensive equipment is an understandable deterrent. But with some thorough Google searching, you can find plenty of How-To's for making your own tools for less. Below are a few sites with several cool projects to offer.
Many companies were disappointed when Google+ rolled out and banned the creation of accounts specifically for businesses and brands. Fortunately, today, Google began rolling out Google+ pages, for them to start connecting with customers and followers. For an example of what a Google+ Page looks like, check out the one for the +The Muppets:
Best quotes: "A supply of tea with milk and sugar would be nice. If it is tea I really like, I like it without milk and sugar. With milk and sugar, any kind of tea is fine. I always bring tea bags with me, so if we use my tea bags, I will certainly like that tea without milk or sugar.
Like the recent XSS 0day exploit found in the Mac and Windows versions of Skype, a similar one has been found in the Skype app for iPhone. The vulnerability allows an attacker to send a message that contains malicious JavaScript code in the "Name" parameter. This code can steal your phonebook, crash the app, and potentially do a lot worse. The URI scheme is improperly identified for the web-kit browser. Instead of going to a blank browser page, it defaults to "file://". The code could steal a...
We've all seen FOX News commentators get worked up about silly non-issues. It occurs more than we'd like, but what happened last week on popular morning show FOX and Friends was not only a misleading and pointless attack on video games, it was an unintelligible attack on a mediocre and forgotten game from 2007, along with a handful of recent indies that no FOX and Friends viewers, or any of their close family members, had ever heard of before this broadcast.
Deus Ex: Human Revolution (DX:HR) was the biggest AAA release two weeks ago, which has drawn rave reviews and sold well across the entire world. But if you've actually played the game, then you've seen something annoying that it and many other games share. It happens at the beginning of the game—every time you turn it on.
Mobile devices can do just about anything these days, thanks to third-party developers. iPhones and Android devices have been known to do some pretty wild things. Need a dupe key made? Scan and order one with your iPhone. Want to know if you're hotter than Justin Bieber? Compare your facial features. Are you a policeman who needs to ID a suspect? Scan their fingerprints and irides. Want to control your Canon DSLR remotely? Use your Android phone.
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills.
Crysis 2 is the current standard for high-quality graphics in video games. No other game looks so smooth, so colorful, so... ultra-real. German developer Crytek has built their reputation on PC game technology to the limit, and the CryENGINE 3 graphics engine they used to make Crysis 2 might be the most powerful tool for creating 3D video game graphics on Earth. As of yesterday, it's also free for anyone, yourself included, to download from Crytek's website here.
After a decent amount of downtime, one of the best indie game sites on the internet has finally relaunched! PixelProspector is a one-man gaming blog and YouTube channel devoted to the weird and beautiful world of indie games. In the first half of 2010, it received a huge boost in popularity from its video 235 Free Indie Games in 10 Minutes, a hypnotic montage of the best indie games the site had to offer at that point. And to celebrate the relaunch of the blog, which now has an improved desig...
More than a year ago, Twitter rolled out the first phase of its Promoted Tweets ad service, which consisted of selected tweets from advertising partners like Best Buy and Sony Pictures receiving "promoted" exposure in the search results pages on Twitter and in the trends lists. These ads were clearly labeled as such, so it was never any real bother to Twitter users.
There's a lot of talk going around about Google's new social network and how it's heavily influenced by Facebook, but truth be told, how could they build Google+ without taking a note
Team Fortress 2 (TF2) is one of the best multiplayer games of all time. It took nine years to make, and the developers have supported it with more post-release free updates than any other game ever. Four years after its release in 2007, it is still immensely popular, and although its price has gone down, Valve has managed to continue making a massive profit by introducing the first successful microtransaction model in a mainstream American shooter. That model has been so successful that it lo...
Xe Systems, the Private-Defense-Contractor-Formerly-Known-As-Blackwater, has been busy attempting to re-brand themselves. They have a new name, several new sub-names, and have at least titularly shifted their focus to training rather than mercenary work. Controversial founder Erik Prince is no longer with the company, which is now owned by a large investment consortium.