Over Executed Search Results

How To: Hack Together an Accelerometer-Aware Mobile Website by Accessing Motion Sensors in JavaScript

Christian Cantrell, Adobe's Air Product Manager and Evangelist, has released a video to demo websites that take advantage of the motion sensors in a mobile phone, tablet, or laptop via JavaScript. Now, let's take a look through the code and break down the core pieces that you'll need in order to build your own sites that can determine the 2-axis tilt, 3-axis gyroscope, and compass direction of the mobile device it's being displayed on.

How To: Detect Facebook Spam

Spam is everywhere and Facebook is no exception. In fact, spammers are constantly stepping up their game by tricking unsuspecting Facebook users to participate in quizzes, games, apps, or "new features" that are actually dangerous computer viruses, spyware, or other trojan horses in disguise. Their attempts even trick people into unknowingly becoming spammers themselves.

News: Artist to Schlep Mammoth Chunk of Ice from Greenland to NYC

It's an ambitious How-To project to say the least, or more specifically, an over-the-top political art installation by San Francisco artist Brian Goggin. You may have previously heard of Goggin for his "Defenestration" project—an installation of "frozen" furniture, being tossed mid-air from a San Francisco apartment building. But Goggin's latest project sounds significantly more challenging to execute, considering the elaborate game plan involved:

News: High School Grad Builds 8-Bit Computer from Scratch

Age doesn't matter in the world of programming, only skills, and recent high school grad Jack Eisenmann definitely has them. He recently built a homebrew 8-bit computer from scratch, calling it the DUO Adept. A worn television makes up the monitor and speaker system, an old keyboard acts as the input controller and the actual computer itself is housed inside a clear Rubbermaid container, consisting of 100 TTL chips and a ton of wire.

What You See Is What You Get: The Street Art of RERO

Inspired by the beauty of traditional signage printed on doors and buildings, Rero is a French graffiti artist who makes a simple, yet heavy mark. Using the universally common Verdena typeface, Rero brands abandoned public spaces in extreme disarray with his own codified messages based on theories of public use of imagery and private property.

News: Möbius Pasta + Jell-O Jigglin' at 6200 FPS

Food is the meeting place of left and right brainers: Culinary arts call for creativity, but is also deeply rooted in the What, Why and How of basic science—baking powder vs. baking soda, the rising of dough, the falling of a cake, etc. Below, two plays on left brain principles—the Möbius strip and the law of gravity—both executed with right brain flair.

HowTo: Make Kitty Crack

As a non-cat owner, catnip is a mystery to me. So, people essentially... drug... their cats? Weird. Google catnip, and you will find a whole slew of incredible images related to the topic...

News: DIY RC Helicopter Rig Captures Amazing Canon 7D/5D Aerial Footage

One of the greatest innovations in the DSLR revolution is not only being able to execute shots you never dreamed possible, but you'll find it's affordable, too. I can't think of a better example than this remote controlled DSLR helicopter rig, designed specifically for the Canon 7D and 5D. Advertised as "high definition, low altitude photography and videography," HeliVideo's founder, Eric Austin combines his experience and love of remote controlled helicopters with his knowledge as a videogra...

How To: Do a v-up ab exercise

The V-up is one of the more challenging ab exercises. While it may appear simple, there are several factors that make this exercise difficult to execute properly. Some of these factors include timing of the movement, counterbalancing, hip positioning, flexibility, and abdominal strength.

News: Null Byte's First Technical Excellence Tutorial Contest Ends Feb. 15, 2016!

As you all know, the first Null Byte Technical Excellence Tutorial Contest ends this coming Monday, Feb. 15, 2016. If you are working on another great article or your first article, try to complete it and submit it before midnight Pacific Standard Time (PST) to be considered in this contest. The winner of this contest will not only receive a certificate verifying the technical excellence of their tutorial, but they will also receive a free copy of the Professional version of the Exploit Pack ...

How To: Disable Autorun

Hello, Hackers/Viewers, Today's topic is going to be based on how to disable autorun for Removable Disks and Drives. Doing that is very easy, i you read the below!

News: Copy a key with a Coke can

Attention cheapskates and locksmith apprentices, this key copying solution is stunningly simple. We've really mulled over this one. As you can read in the comments below, people struggle with executing this successfully. But it can and will work. You just have to modify your key to fit your needs.

IPsec Tools of the Trade: Don't Bring a Knife to a Gunfight

Pull up outside any construction site and you'll see tools scattered about—hammers, jigsaws, nail guns, hydraulic pipe benders—these are the tools of the trade. You would be hard-pressed to build a home or office building with just your hands! On that same page, security professionals also have their own go-to tools that they use on the job site, only their job site is your server.

How To: Create a Reverse Shell to Remotely Execute Root Commands Over Any Open Port Using NetCat or BASH

Reverse shells are useful for issuing commands to a remote client when the client is behind something such as a NAT. You might say, "But can't a normal shell or simple SSH tunnel do the same thing?". No, it can't. All over the internet I see a lot of confusion regarding the difference between a normal shell and a reverse shell. Let's clear this up before we get started.

News: Easy Skype iPhone Exploit Exposes Your Phone Book & More

Like the recent XSS 0day exploit found in the Mac and Windows versions of Skype, a similar one has been found in the Skype app for iPhone. The vulnerability allows an attacker to send a message that contains malicious JavaScript code in the "Name" parameter. This code can steal your phonebook, crash the app, and potentially do a lot worse. The URI scheme is improperly identified for the web-kit browser. Instead of going to a blank browser page, it defaults to "file://". The code could steal a...

News: Unity3D Could Change the Gaming World Now That It Has Flash

Big news from the world of game development engines. For several years, Unity3D has been the free 3D game development engine of choice for aspiring and indie game designers around the world. While it isn't as powerful as Unreal Engine 3 or CryEngine, it's free and much easier to use. Now, according to an announcement made by Unity yesterday, Unity 3D is about to unleash a huge weapon that neither of those other engines can claim: Flash compatibility.

How To: Replace the LCD Screen on an LG KF600 Cell Phone

Introduction In this article you will find instructions to replace a broken LCD screen of a LG KF600 phone. To execute these steps a new replacement LCD should be bought beforehand. Stores that sell replacement KF600 LCD screen can be found on the Internet. These instructions can also be used for other type LG phones that are part of the same family or have the same internal structure.

How To: Connect multiple shapes into one shape in Illustrator

In this Illustrator CS2 video tutorial you will learn to execute Pathfinder Connect. The command lets you connect multiple shapes into one shape. You have to click Expand button to see the result. Make sure to hit "play tutorial" in the top left corner of the video to start the video. There is no sound, so you'll need to watch the pop-up directions. Connect multiple shapes into one shape in Illustrator.

How To: Scan for Viruses in Windows Using a Linux Live CD/USB

Many windows users, if not all, run into a virus infection once in a while. This is unavoidable when using Microsoft's operating system. Without digressing too much, the fact that Windows is such a popular OS with no controlled software sources makes it easy for viruses and malware to spread. And while there's a plethora of antivirus tools for Windows, sometimes infections (such as certain scareware) can disable the install and/or use of antivirus systems and render your OS unusable until cle...

How To: Setup an Asterisk Server

Over the years, I have enjoyed playing with Asterisk. I have found Asterisk to be extremely powerful and fun to play with. There are several books and many scattered how to articles out there, but most are outdated and the information required to build Asterisk from beginning to end can be a bit daunting. I wanted to combine all the steps into a single article and share my experience with everyone. If I have left out any steps please let me know.

UDP Flooding: How to Kick a Local User Off the Network

Only so much data can be passed through the network and to your computer's networking interfaces. This is limited by the amount of bandwidth you have. The more bandwidth you have, the faster your network connections will be. Not only this, but your transfers will be more parallel and distributed so that all of your speed isn't taken up by one transfer. When all of your bandwidth is sapped and unable to be used, this is called a denial of service, or a DOS.