Numerous Forums Search Results

Weekend Homework: How to Become a Null Byte Contributor

We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowledge. There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials...

How To: Remotely Control Computers Over VNC Securely with SSH

VNC is a great protocol that you can use on Windows and Linux machines to remotely control computers. This is useful if you need to control your computer when away from home, help your grandma check her email, or help a client with a disk cleanup. VNC is secure in the sense that it requires authentication in order to make the connection, but after that, the data is sent over the internet unencrypted. This means that an attacker could sniff your traffic and snoop everything that's going on. Th...

UDP Flooding: How to Kick a Local User Off the Network

Only so much data can be passed through the network and to your computer's networking interfaces. This is limited by the amount of bandwidth you have. The more bandwidth you have, the faster your network connections will be. Not only this, but your transfers will be more parallel and distributed so that all of your speed isn't taken up by one transfer. When all of your bandwidth is sapped and unable to be used, this is called a denial of service, or a DOS.

How To: The Hacks Behind Cracking, Part 2: How to Generate Software Keys

If you've ever heard software piracy terminology being discussed, I'm sure the term KeyGens came up. KeyGens is short for key generator, which is a program that exploits algorithmic faults in software by generating software license keys that appear to be genuine. Normally used as a technique to protect the source code software and prevent piracy, a key generator exploits the key algorithm to effectively nullify the need for any software licenses. For example, we must try to find patterns in t...

How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration

If you've ever wondered how software pirates can take software and crack it time and time again, even with security in place, this small series is for you. Even with today's most advanced methods of defeating piracy in place, it is still relatively easy to crack almost any program in the world. This is mainly due to computer processes' ability to be completely manipulated by an assembly debugger. Using this, you can completely bypass the registration process by making it skip the application'...

News: Null Byte Is Calling for Contributors!

We're officially seeking Null Byters interested in teaching others! Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowledge. There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials of any skill level, and anything you feel like...

How To: Make Icosahedral Planet Ornaments

In honor of the new Astronomy World, I thought we should look at a few planetary icosahedrons. The icosahedron is the most round of the Platonic solids with twenty faces, thus has the smallest dihedral angles. This allows it to unfold into a flat map with a reasonably acceptable amount of distortion. In fact, Buckminster Fuller tried to popularize the polyhedral globe/map concept with his Dymaxion Map.

Community Byte: HackThisSite Walkthrough, Part 4 - Legal Hacker Training

Another Community Byte announcement from Null Byte! The Community Byte projects serve to teach people in a co-operative, hands-on manner. Learning from experience and immersing yourself in a subject is the best way to learn something foreign to you. In our sessions, we have started to both code and complete HTS missions. There is something for everyone here, so make sure you join in on the fun learning experience.

How To: Make Sierpinski Carpet Cookies

Since it is now the holiday season, I thought we could spend this weekend making some baked goods that have mathematical patterns on them. In this post, we'll look at making cookies that have a fractal pattern based off of a modification of the pixel cookie technique.

Goodnight Byte: HackThisSite Walkthrough, Part 1 - Legal Hacker Training

Friday's Community Byte was weird. The intent was to do a HackThisSite mission, but upon time to begin, everyone in there was programming without my assistance, with the help of Sol Gates. This is great! It's really awesome that everyone enjoys programming that much and will make the effort to learn even when I am not present. So, a tip of my hat to Mr. Sol Gates and the rest of you fine people.

Community Byte: Hack Our IRC Bot to Issue Commands

Last week's Community Byte we got off to a great start! We had a few people build our IRC bot, and all went well. We had some great contributers, ideas, and people willing to learn. So, needless to say, we will be having another. Let's try to get a few more people involved this time!

How To: How Cross-Site Scripting (XSS) Attacks Sneak into Unprotected Websites (Plus: How to Block Them)

XSS stands for cross-site scripting, which is a form of web-based exploitation that uses client-side vulnerabilities in a web page to execute malicious JavaScript codes. JavaScript is referred to as "cross-site" because it usually involves an external website containing the malicious code. That code is most commonly used to steal cookies with a website that the attacker created and hosted on another server. The cookies can then be used to escalate privileges and gain root access to someone's ...

Social Engineering, Part 2: Hacking a Friend's Facebook Password

Welcome to the second Null Byte in a series educating you on Social Engineering awareness and techniques. Today, I'm going to show you how a saavy Social Engineer would trick a friend into unknowingly surrendering their Facebook password. My intent is to warn and demonstrate how easy it is to succumb to phishing via Social Engineering, and therefore expose yourself.

How To: Get Packet Injection Capable Drivers in Linux

In this Null Byte, we are going to be installing Packet Injection capable drivers in Linux. These are the open-source drivers required to sniff wireless traffic, inject packets to crack a wireless access point, and go into "monitor-mode". These drivers are superior because they are the fastest available drivers.

How To: Use Cygwin to Run Linux Apps on Windows

You'll see a lot of Linux action going down here at Null Byte. We use Linux for hacking-related stuff because it provides a more relaxed programming environment, making it easy to write exploits and tools. Linux has many features Windows is lacking, such as full control over the OS right down to the Kernel and massive availability of mature, open source (read: free & tweakable) tools & projects.

News: Scrabble Showdown Game Show a Disgrace to Competitive Scrabblers Everywhere

Scrabble has invaded just about every medium out there. It started as a mere board game, but has since spawned numerous board game spinoffs and variations, an electronic version, mobile apps for just about anything (Android, iPhone, iPhone, iPad and Kindle), games for both PC and Facebook, and video games for handheld consoles like the Nintendo DS and Sony PSP. Heck, it's even on the PlayStation and Xbox 360 gaming consoles. And it hasn't forgotten about film. You can see Scrabble featured in...

Google+ Pro Tips Round Up: Week 8

It's been an eventful week for Google+. Facebook decided to up its game and start rolling out several major updates intended to address privacy concerns. We got a glimpse into the future of Google+ via an insightful discussion between +Bradley Horowitz and +Tim O'Reilly. And Google decided to integrate the +1 button more fully with Google+ by allowing users to share directly from the +1 button. That's not all, though—scroll down for more news & updates that occurred in the past week.

News: Famous Indie Game Makers Immortalized in 'The Indie Game Legend'

The indie game scene is constantly expanding, but in 2008, Minecraft, Braid and Angry Birds had not been released, along with all of the other indie games that established the financial viability of the format. Indie games were the all-but-exclusive purview of free Flash game sites and the proud users of TIGsource.com. The Independent Gaming Source is a massive forum for indie game developers to share their projects with like-minded individuals, while seeking help and approval of their games.

News: Operation Rainfall Fails to Secure Great RPGs for America... For Now

Different genres of social media have changed the world, but they are not omnipotent. In most cases this is a good thing, but not in the case of Operation Rainfall. It has been a purely well meaning social media movement that should have led to a great boon for the North American gamer public, but instead has served as a reminder of how stone aged Nintendo of America's (NOA) corporate thinking remains.

Instacast: A Better Way to Listen To & Manage Podcasts

Though it could be argued that Apple's popular and widely used iTunes media player was responsible for the growth and explosion of podcasting, I would argue that iTunes is not the best way to manage and listen to your podcast subscriptions—if you're a iPhone, iPad, or iPod Touch user. Instead, you will find that a $1.99 mobile app called Instacast (iTunes App Store link) is a much better method. Below, a short video introduction to Instacast, plus a written breakdown of its features. Mobile L...

The Witcher 2: First Impressions

Do you have an awesome rig that is able to run anything you throw at it at 60 fps with maximum settings? Prepare to be humbled. The Witcher 2 is the first game in quite some time to tax your system the same way Crysis did when it first came out.

News: Hetero, Gay or Bi? Bed Your Soulmate in Dragon Age 2

When you grab a video game off the shelves, finding love is probably not your end goal. Most games focus on letting the player shoot guys, order other guys to shoot guys, or build houses. Mass Effect 2 comes closer than most titles to offering virtual romance, but the relationships are shallow and strictly heterosexual. I found whoring my way around the Normandy much more satisfying as a gameplay option than developing an emotional connection to another character.