One Bath Search Results

Goodnight Byte: Coding a Web-Based Password Cracker in Python

Our mission for this week's Community Byte was to create a Python program to crack web-based passwords, like the ones you would see on an email or router login. I wanted it to be universal in the sense that it could be easily modified and adapted to another website just by changing a few variables. That was a success! Even though people weren't on time to the coding session, everything went well.

News: Google+ Pro Tips Weekly Round Up: Google+ Is Google

"Google+ is dead." How many times have you read that in the past few weeks? It seems like I can't get away from this notion that Google+, as a social network, is a total failure. Don't feel too sorry for them, though. +Bradley Horowitz isn't worried. In an interview with VentureBeat, he explains, “Six months from now, it will become increasingly apparent what we’re doing with Google+. It will be revealed less in what we say and more in the product launches we reveal week by week.” Indeed, som...

Secure Your Computer, Part 4: Use Encryption to Make a Hidden Operating System

This is Null Byte's fourth part in a series about fully securing our computers (Part 1, Part 2, Part 3). In our last Null Byte, we went over how to encrypt an entire operating system to protect our data, however, this doesn't fully protect us. In the case of legal extortion, the government can actually make you give up your cryptographic key to your computer so that they can look through it.

Secure Your Computer, Part 3: Encrypt Your HDD/SSD to Prevent Data Theft

Welcome to Part 3 in my series on protecting your computer from prying eyes (Part 1, Part 2). In today's segment, we will be going over drive encryption using the TrueCrypt program on Windows OS. Drive encryption is a technique that masks your data with a cryptographic function. The encryption header stores the password that you have entered for the archive, which allows the data to be reversed and read from. Encrypted data is safe from anyone who wants to read it, other than people with the ...

How To: Make Torus Knots from Soft Metals

Torus knots are beautiful knots formed by wrapping a line around a torus and tying the ends together to form a loop. The resulting knot has a star-like appearance when viewed from above. The 36 examples with the least number of crossings can be seen at the Knot Atlas's page on torus knots.

How To: Setup an Asterisk Server

Over the years, I have enjoyed playing with Asterisk. I have found Asterisk to be extremely powerful and fun to play with. There are several books and many scattered how to articles out there, but most are outdated and the information required to build Asterisk from beginning to end can be a bit daunting. I wanted to combine all the steps into a single article and share my experience with everyone. If I have left out any steps please let me know.

How To: Make a Dos-à-Dos Book from a Cardboard Box

This is a tutorial on making a dos-à-dos book by recycling a thin junk cardboard box (dos-à-dos means back-to-back). In the video, you'll see how a cardboard box that has four sides the same size will make a triple-book in one. To make a double-book, just take away one side. To make more than a triple-book, add more boxes to the mix. They're great, fun homemade journals!

How To: Recover Deleted Files in Linux

File recovery on Linux is a bit different than Windows. It requires different software than the Windows counterparts because every OS has their own file system. Windows uses NTFS, or FAT file systems, while on the other hand, Linux uses ext-based file systems. I personally use ext4 file system because it's the latest and greatest ext-journaling system and supports a large level of directory recursion and file sizes, but most installations still use ext2 or ext3. When files are deleted from a ...

How To: Make a Human Blockade Lockbox

I'll admit it, yes, I support protesting. It doesn't matter what my opinions are about any individual protest—overall, it is a human right and the only way to avoid tyranny. We can't deify Ghandi and demonize American protesters. That shows a silly shortsightedness that we can't afford to dabble in.

How To: Make Knot Sculptures from Soft Metals

In mathematics, a knot is a closed circle in a three-dimensional space that crosses itself multiple times. Since it is closed, it has no ends to tie, meaning you can't actually create such a knot. However, if you tie the ends together after you create a knot in the standard way, you will have something that is close to the mathematical description. In this post, we will explore the creation of mathematical knot sculputures using copper tubing and solid solder wire.

How To: Recover Deleted Files in Windows

Everyone has deleted a file or folder on accident before. Sometimes people even delete stuff on purpose, only to find out that they needed the files after all. If you're experiencing one of these mishaps, don't worry, file recovery is possible in most cases!

Community Byte: Coding a Web-Based Password Cracker in Python

Welcome to another Community Byte announcement! In the past two sessions, we have coded an IRC bot in Python capable of issuing commands. Since it can issue commands and most of you are new to programming, that project will stay idle for a while. Other commands such as voice and half-op can be easily hacked in via common sense, even if you weren't there for that session.

Math Craft Monday: Community Submissions (Plus Polyhedral Stellation)

It's another Monday, which means it's once again time to highlight some of the recent community submissions posted to the Math Craft corkboard. Additionally, I thought we'd take a look at the process of stellation and make some stellated polyhedra out of paper.Rachel Mansur of Giveaway Tuesdays posted a video from animator Cyriak Harris, which zooms into fractal hands, where each fingertip also has a hand and fingers. A few more details can be found here, as well as some other really cool pic...