One Bath Search Results

How To: Protect Your PHP Website from SQL Injection Hacks

As a web developer, I often read articles about hackers (from the lowly to the knowledgeable) infiltrating websites via the dreaded 'SQL Injection' method and completely taking control, changing, gaining access, or destroying the owner's data. As a fellow web developer, I'm sure you want to know how to protect against it. Well, here it is! In this article, you will find out what SQL Injection is, what you can do to protect against it, and additional recommendations that are easy to do and onl...

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Two: Onions and Daggers

In the first part of this series, we learned about darknets, as well as how they came about. But these patches of forgotten Internet are not the oasis of free information you might think. Despite being hidden—or just harder to come across—these networks are no more safe then anywhere else on the 'clear' Internet. The nature of networking and routing means your location is always known in server logs. It only takes one phone call to your ISP with your IP address to obtain both your physical ad...

News: Oceania Palace - hidden light trick

My palace for a city that has no fewer than 7 100k block structures (will have 15-20 when the central blvds are finished - map link : http://www.minecraftworldmap.com/worlds/_IgOQ ). Today's tip - at the start of the video - how did I put in the lighting for players to navigate the palace hedgemaze (at the start and end of the video).

News: Photos of Mercury and the crescent Moon

Tonight, I saw Mercury for the first time. Mercury is a hard planet to see, even though it is quite bright, because it's orbit is so close to the sun. The angle Mercury makes with the Earth and the Sun is never more than about 25 degrees and most of the time it is much less. As a result, you can't ever see Mercury during the night but at a couple of times in it's orbit you can see it at either dawn or dusk. Right now, Mercury is close to it's greatest eastern elongation and can be seen low in...

Snapshot: 12w08a

Snapshot: 12w08a brings us a few nice things a few things I'm not so sure about and a few things I just hope Mojang doesn't incorporate into the next official update.

News: The Right Linux Distro

As many of you Null Byters may know, I was planning on writing this article a week or two ago. Better late than never! So, let's get right to it then—choosing the right Linux distro for your needs.

Master the Power: How to Make Fluorescent Tubes Glow with Your Bare Hands

I'm sure most everyone has some kind of fluorescent light source in their home; those long white tubes that emit a bright white light when turned on, or maybe a few of the CFL power-saver bulbs. These bulbs actually require very little "power" (i.e. a high voltage:almost no current ratio) to emit light. In fact, static electricity is enough to make them flicker. Inside these tubes is a gas, and when electricity flows through that gas, it gets "excited" and produces light.

How To: Use Firefox Add-Ons and Greasemonkey to Make Google+ Perfect

Although +Google Chrome has been getting many deserved kudos for its innovations and speed, many people still prefer to use +Mozilla Firefox as their primary browser. If you’re a dedicated Google+ user, you know that there are many Google+ Chrome browser extensions available to modify your Google+ experience. What you may not know is that there are also Firefox extensions you can use for Google+.

News: Astronomical Observing News (2/21 to 2/27)

There's not much going on this week in the skies above, but there are a lot of conjunctions to take a peek at! And of course, there's the comet Garradd that's still showing its tail to us down here on Earth, so make sure to catch it before it's gone. The rest that's going on this week:

Uncrackable: Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt and decrypt as you need. GPG is a great open-source version of Pretty Good Privacy (PGP), a similar application used for encryption, but licensing and patent problems led to the development of GPG in its wake.

Farewell Byte: Goodbye Alex, Welcome Allen

Hello, fellow Null Byters. Today, with mixed feelings, I want to let you know that this is my last official post as the admin of Null Byte. I've come to the decision that I need to spend more time focusing on my studies. Over the past 5 months, I have enjoyed building this community and teaching people unorthodox methods of doing things, creating things, and hacking them. But I'm also excited to be delving deeper into the studies that brought me here in the first place.

News: Need Of Detoxification

Taking good care of our colon should be one of our capital concerns. Do you know that like the air we breathe, the colon additionally becomes polluted with toxins? Toxin accretion will appear for as continued as you continuously eat. These toxins become the account of a abatement in activity and added problems like constipation, gas, bloating, etc. So now, imagine how acceptable activity could be after these toxins!

News: Tactics for Using Stairs in Minecraft

The stair is considered by many people to be one of the, if not the most, versatile blocks in Minecraft. They can completely change the look and feel of a build and increase its quality. In this post, I will highlight just a few of the options you have for using them.

News: Fallout Inspired underground bunker

As my in game name (TehGeekFather) would suggest I tend to like things on the Geekier side of things. Games being one of them. (duh I'm on a Forum dedicated to Minecraft) That being said I am a huge Fallout fan. (NO! not the band. <Sigh>) I'm referring to the post apocalyptic series first developed by Black Isle Studios, the roll playing game division of Interplay, back in 1997. Fallout 1 and 2 were pretty big back then open game play, being able to complete tasks in different ways depending ...

Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations

Last Friday's mission was to accomplish solving HackThisSite, Realistic 5, the fifth and last in my series of realistic hacking simulation missions. This time, telemarketers are invading people's privacy, and it was up to us to stop them! The job was to get root on the site and delete the contact database in order to return the right of privacy to its victims.

Advanced Social Engineering: The Mind Hacks Behind Brainwashing

Brainwashing is something that happens to us every day, whether you believe it or not. It doesn't take fancy tools or space-age technology. Even if our country didn't intentionally brainwash people (believe me, they do), our country's media is brainwashing people nonstop. Just sit back and think about it for a second—about the way things work in the world and media. But before you do that, let's learn what brainwashing really is.

Weekend Homework: How to Become a Null Byte Contributor (2/17/2012)

Grab your thinking caps and get your hack on. Null Byte is officially seeking contributors on a weekly basis who are willing to take the time to educate the Null Byte community on anything, from hardware hacks to life hacks. Contributors that write tutorials will be featured on the Null Byte blog, as well as the front page of WonderHowTo (providing it's up to par, of course).

Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Final Session)

We had a blast during last week's social engineering calls. One of our attending social engineers was so clever that she convinced several people on Craigslist that lost items were hers, even if it seemed she couldn't be trusted. But females are better social engineers, naturally. Some say that females have a special knack for manipulating men, but I think that's preposterous. I can't see why that would be true in a million years (note my sarcasm).