Phishing Simulation Search Results

Goodnight Byte: HackThisSite, Realistic 1 - Real Hacking Simulations

Last Friday's mission was to accomplish solving HackThisSite, realistic 1. This is the first in a series of realistic simulation missions designed to be exactly like situations you may encounter in the real world. This first mission, we are asked to help a friend manipulate the website voting system for a Battle of the Bands vote count in his favor.

How To: Test Drive Gmail's New Interface

Google's hard at work beefing up their new Google+ social network, and while they continue to improve new features like Circles and Hangouts, they haven't lost track of their other online features already widely in use. If you're already a part of the Google+ project (currently closed to invites right now), you've probably noticed the changes in Picasa Web, but Gmail has been getting some great updates as well—and you don't have to be in the Google+ network to use them.

How To: Get Rid of All that Space Junk

How about a laser? One that is strong enough to nudge debris out of earth orbit. That's what NASA contractor James Mason wants to do, and his lab simulations suggest that the idea is possible. Mason wants to use a 5kW ground-based laser and a ground-based 1.5 meter telescope to spot potentially hazardous space waste and shove it off, by about 200 meters per day of lasering. It's kind-of like air traffic control for near earth orbit.

News: NASA to Bomb the Moon (For Real)

No joke. This is not an Onion headline. This coming Friday, October 9th, NASA is actually planning on bombing the moon in search for water. The missile, a Centaur rocket, will blast off from Cape Canaveral, Florida, aiming at the moon's South Pole. Scientists will then analyze the debris from the explosion for traces of water ice or vapor.

How To: Create a half tone grid pattern in Photoshop

In this video tutorial you will learn to take an image and turn into a half tone grid pattern. A halftone is the simulation of a continuous-tone image, such as a shaded drawing or a photograph, with groups of dots. A halftone breaks a continuous-tone photo into tiny dots. Create a half tone grid pattern in Photoshop.

Community Byte: HackThisSite Walkthrough, Part 2 - Legal Hacker Training

With the rather large success of the Community Byte activities, both programming and HackThisSite, I have decided to continue to do both activities every session! With that said, when programming sessions occur, they will be lead by Sol Gates in Gobby. Also, the programming mission will no longer be to code a tool, we have changed it to be even more "noob friendly". This means that instead of coding a tool, you will be walked through puzzles and challenges that must be solved by coding a scri...

How To: Recover Deleted Files in Linux

File recovery on Linux is a bit different than Windows. It requires different software than the Windows counterparts because every OS has their own file system. Windows uses NTFS, or FAT file systems, while on the other hand, Linux uses ext-based file systems. I personally use ext4 file system because it's the latest and greatest ext-journaling system and supports a large level of directory recursion and file sizes, but most installations still use ext2 or ext3. When files are deleted from a ...

How To: Cheat Yoville for hundreds of YoPoints (07/08/09)

How to hack Yoville! Yoville cheats, tricks, hacks. Yoville is a game that can be played on Facebook or MySpace. In the words of Yoville's Facebook app, YoVille is a world where you can buy new clothes for your player, purchase items for your apartment, go to work, and meet new friends. Yoville is a city building simulation game.

Community Byte: HackThisSite, Realistic 5 - Real Hacking Simulations

Eventually, we plan on doing some root the box competitions here at Null Byte, but we're still looking for a server to play on. Anyone want to donate one? You won't regret it. Root the box is like 'king of the hill', except you have to hack a server and maintain access. Each server will have numerous known security holes, but until then, let's get back to the regular weekly coding sessions and realistic hacking missions on HackThisSite.

Community Byte: HackThisSite, Realistic 4 - Real Hacking Simulations

We'd like this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with (anyone want to donate one?), we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But for now, back to the normal flow of things...

Community Byte: HackThisSite, Realistic 3 - Real Hacking Simulations

We're aiming for this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with, we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But, for now, back to the normal flow of things...

Community Byte: HackThisSite, Realistic 2 - Real Hacking Simulations

The community tore up the first realistic mission last week. You've applied the techniques learned in the basic missions to a real scenario, so I'm pretty content. The realistic missions are where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding and hacking sessions. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, f...

Community Byte: HackThisSite, Realistic 1 - Real Hacking Simulations

Community byters, it's time to get serious. We are finally moving on to the realistic missions in HackThisSite. This is where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding and hacking sessions. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, from novice programmers to aspiring hackers.

How To: Protect Your Facebook Reputation with Reppler

Do you know how you are perceived by your peers? In real life and online? In the physical world, you could be seen as intelligent, thoughtful and hard-working, but on the Web you could be looked at as irrational, selfish and slothful. There's just something about the Internet that takes away a person's judgement and replaces it with impulsiveness—especially when it comes to Facebook.

How To: Snag Prime Seats at an NBA Game

There is no fan experience in professional sports quite like watching an NBA game live. Partly, this can be attributed to the combination of fluid teamwork and jaw-dropping athleticism the players exude in the form of size, speed, jumping ability, grace, and strength. What truly differentiates the NBA from the spectators' perspective, though, is the figurative nakedness of the players. While the NFL buries its athletes beneath pads and masks, the NBA presents its talent in shorts and a tank top.

Scrabble Challenge #12: Can You Unscramble the Derivative Words?

Last week's challenge brought up a good question (thanks Lisa) regarding the functionality of the Official Scrabble Players Dictionary, 4th Edition, both online and in print form. The word TACTICAL was the answer to the first puzzle in that challenge, but when you search for the word directly in the print version, it can't be found. Likewise, when you search the online dictionary on Hasbro's site, you won't find it either. Go ahead, try it. You won't find it looking for TACTICAL specifically.

How To: Detect Facebook Spam

Spam is everywhere and Facebook is no exception. In fact, spammers are constantly stepping up their game by tricking unsuspecting Facebook users to participate in quizzes, games, apps, or "new features" that are actually dangerous computer viruses, spyware, or other trojan horses in disguise. Their attempts even trick people into unknowingly becoming spammers themselves.

Next Page