One of a Search Results

Community Contest: Code the Best Hacking Tool, Win Bragging Rights

Here's something fun for the Null Byte community to do—a coding competition! This week, I wanted to get everyone involved by offering you all a nice library of possible program types to choose from and try to code. At the end of this competition, all of the submitted programs will be reviewed by the community and myself. The coder that receives the most votes will be dubbed THE BEST.

How To: Protect Your Door with High Voltage

In this article, I'll show you how to create a simple yet effective way of scaring off intruders. Of course, there are methods around this approach, but it's great for office pranks and general fun. The project requires a little background knowledge in electronics and circuitry, like reading schematics and using a soldering iron.

News: Awesome Trick with Prepaid "GoPhones" Nabs You Free Text Messaging for Life

You might be sitting there thinking that I'm crazy, but the truth is you're only partially right. You can get free text messaging for life, all for a cheap, one-time fee. But, how can that be possible? An exploit in AT&T's prepaid GoPhones is the culprit behind this sweet, oh-so rare opportunity for exploitation. The exploit grants a lifetime of free texting, assuming that the company stays afloat from now until the end of time.

Community Byte: HackThisSite, Realistic 4 - Real Hacking Simulations

We'd like this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with (anyone want to donate one?), we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But for now, back to the normal flow of things...

Weekly Tips #2: Using the Right Environment

Another way to make your build really stand out is to choose the right environment. This can either be accomplished by just taking the time to look for suitable land, or by terraforming the world to fit your needs. Like the last one, this tip does not require plugins like Voxel Sniper, yet can really improve the quality of a build.

Making Electromagnetic Weapons: The Theory Behind EMP Generators

This is the third part of my electromagnetic pulse series (see Part One and Part Two). By now, I've covered the hardware and general concept of electromagnetic pulse generators, but how exactly do they disable electronics? How can an invisible field of energy have such a catastrophic effect on computers, cell phones, and most any other electronics? I'll be answering all these questions in part three of Making Electromagnetic Weapons.

How to Pick Locks: Unlocking Pin and Tumbler Deadbolts

Lock picking is defined by locksmiths as "the art of opening a lock without the key". There's many ways to accomplish this, but I'm specifically interested in using a lock pick set. Since locks vary in shapes and size, it's better to stick with just one kind of lock at first. Most locks are based on fairly similar concepts, so sharing methods across locks is possible.

How To: Remain Anonymous and Chat Securely with Cryptocat

I'm sure we've all heard about MSN and Yahoo! Messenger, right? They can be useful, but the setup can be quite time consuming for those who need to use it just once or twice—and the privacy statements are a real bother. For example, we must provide our real details. You could use Fake Name Generator, but if you get caught, you will have your account suspended. I don't have a law degree, but to my understanding the United States recently passed legislation that gives the authorities the power ...

How To: Relieve a Jellyfish Sting

What should you do if you ever get stung by a jellyfish? First things first—do not urinate on your jellyfish sting. Contrary to popular belief, human urine can aggravate any stingers stuck onto your skin, causing more venom to release. Your best bet for relieving your jellyfish sting is to get yourself some vinegar, shaving cream and a razor.

News: Find you local Representative

Why Should I care? You should care since the decision they make are based on what us the people want. So if you do not want make your voice or opinion heard you will not get what you want. So as a result will ether mean you will benefit or hate the result?

How To: Electron Spirographs with a Cathode Ray Tube

In this article, I'll be showing you how to make a cool visual representation of sound using an old cathode ray tube (CRT) television, a stereo, and a sound source. You'll also need a pair of wire cutters, and a few screwdrivers. To properly understand this project, it's a good idea to learn a little bit about how CRT TVs work. Check out this article on how they work.

News: Local Politicians in the Los Angeles area.

Representative Henry A. Waxman is in charge of California’s 30th Congressional district. He is part of the House Energy and Commerce Committee. Ever since he began his career in the government business, he has been involved with health and environmental issues. He represents cities such as Santa Monica, Beverly Hills, Agoura Hills, Calabasas, Hidden Hills, Malibu, Westlake Village and West Hollywood, as well as such areas of Los Angeles as Beverly-Fairfax, Pacific Palisades, Brentwood, Beverl...

Gov't Involvement: Through The Eyes of The Student

Insight Description: In our government class, each student was required to participate in any branch of government from local such as working with your community representatives; state; working with your senator or an organization and federal; which you can entreat in a presidential campaign. The total number of students who participated was Twenty-one and each individual needed to complete at least Ten hours or more.

Watch Out iMovie: Avid Studio Is Now Available for iPad

Despite starting on Macintosh computers, Avid focused their non-linear video editing programs on Windows systems after stiff competition from Final Cut Pro. But now they're coming back around, with Avid introducing their first iPad version of the Avid Studio home editing software, a miniature version of their industry-geared Media Composer. It will be directly competing with Apple's own iMovie for iPad.

How To: Make a Change-of-IP Notifier in Python

In this article I'll show you how to make a simple IP address notifier. The program will text you your new IP address, in the event that it changes. For those of you with dynamic IPs, this is very useful. I'm constantly frustrated when my IP changes, and it's handy to be notified via text when it happens. To use the program, you'll need Python 2.7 or later, urllib2, and a program called "text" (see this article here to get it).

How To: Keep Your Computer Organized in Windows 7

At some point, we all go from organized to disorganized. Let's assume you are a business executive working in a busy corporate building. Chances are you are going to get a heavy workload and it will impact how clean your workspace is. However, this article is about keeping your desktop clean and clutter free, along with the use of software to find documents you have misplaced.

How to Make a Jacob's Ladder: Chained Lightning

In this article, I'll show you how to create a simple yet accurate demonstration of the "rising ionized gas" principle. In other words, a transformer, two metal prongs and lots of evil laughter. Remember those large "towers" in the background of Frankenstein movies with a "lightning bolt" rising upwards every few seconds? That's called a Jacob's Ladder; one of the coolest awe-inspiring demonstrations of high voltage. Here's a video of the final product: Materials and Tools

News: Astronomical Observing News (02/01 - 02/06)

This week's AON might be a little short, but finally, the Garradd comet's peak has come! I picked the Garradd comet to follow because it's a bright and easy-to-follow comet. Be sure to observe it! If you need help finding it, you can find more information here.

How To: Find Out Who Unfriended You on Facebook

How many Facebook friends do you have? The average person on Facebook has around 140 friends while some hit the ridiculous Facebook friend limit of 5,000. Facebook states that its services are for people you know in person. I don't think anyone has 5,000 friends in person, do you? Personally, I don't even think Megan Fox has 5,000 friends in person, so how could any regular person have that many? But that's beside the point.

Community Byte: HackThisSite, Realistic 3 - Real Hacking Simulations

We're aiming for this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with, we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But, for now, back to the normal flow of things...

Weekly Tips #1: Building Around Your Environment

One of the best ways to make a great build is to build around the environment. Fancy plugins like World Edit and Voxel Sniper aren't always necessary. In the real world, people can't just edit the environment to their every whim and need. They have to work around it. Not only does building around your environment help to make your build look nicer, it helps to make it look more realistic. In the above picture, I could only make a small house because I wanted this build to work with the enviro...

How To: Encrypt Your Sensitive Files Using TrueCrypt

Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm here to teach you how to create a general encrypted container—not the complex hidden TrueCrypt volume.

How To: Scan for Viruses in Windows Using a Linux Live CD/USB

Many windows users, if not all, run into a virus infection once in a while. This is unavoidable when using Microsoft's operating system. Without digressing too much, the fact that Windows is such a popular OS with no controlled software sources makes it easy for viruses and malware to spread. And while there's a plethora of antivirus tools for Windows, sometimes infections (such as certain scareware) can disable the install and/or use of antivirus systems and render your OS unusable until cle...