Post Cleansing Reactions Search Results

News: Fun Times On The Server

Today I was the only admin online at like 2:30 to 3:45. I had to deal with 27 people....asking me to World Edit all of their builds, and I explained how to apply online 3 different ways to 1 person...it was horrible. The other people who were online with me were getting super upset at this Guests. They were rude, and not able to understand super simple things.

How To: Make These Sonic Distance Sensors for the Bad Driver in Your Life

Today's fancy cars come with all sorts of options, from power mirrors to working seat belts. Some of us condemned to live in the reality of capitalist recession have no car, or perhaps a very modest one. But your modest car can still have some cutting edge technology wedged into the trunk and dashboard if you know what you want and where to look for parts. Today, we make a parking sensor using a sonic range finder, just like in the vehicles our owners drive!

News: The Avengers (2012) Poster and Fan Art

After his fall from Asgard into space, the Asgardian Loki meets the Other, the leader of a warmongering alien race known as the Chitauri. In exchange for retrieving the Tesseract,2 a powerful energy source of unknown potential, the Other promises Loki a Chitauri army with which he can subjugate the Earth. Nick Fury, director of the espionage agency S.H.I.E.L.D., arrives at a remote research facility during an evacuation. Physicist Dr. Erik Selvig is leading a research team experimenting on th...

How To: Make a High-Powered Compressed Air Rocket Gun

In this article, I'll show you how to make a high-powered, long-range, air-powered rocket gun. This launcher is based on a sprinkler valve, a modified propane tank, and a few other components. Though not hard to make, this device is VERY dangerous! The rocket can seriously harm, if not kill any living thing it's shot at. Here's a video of it in action, quite an accurate shot by my friend Chris... Parts

How To: Stop Bike Thieves Dead in Their Tracks! Make a Magnetically Controlled Bike Alarm

Bikes are a great form of transportation. They use human energy more efficiently than any other machine. You can keep it in your closet or hallway. You can even take it on the train in a pinch. However, this portability is also the bike's biggest draw back. If you own a bike in the city, chances are it will be stolen. Locks barely deter thieves armed with bolt cutters and crowbars. Throw the bike thieves for a loop and make a tilt-sensitive alarm. It will hopefully startle your bike's assaila...

DIY Scientists Beware: When NOT to Use Household Chemicals for Your Projects

The only thing better than successfully pulling off a new experiment is doing it with household materials. You get to laugh in conceit as professional scientists everywhere spend all their grant money on the same project you just accomplished with some under-the-sink chemicals! However, there are times when DIY gets dangerous. Some household chemicals are not pure enough to use and some are just pure dangerous. Let's take a look at two problems I have encountered in the course of mad sciencing.

News: Obama's Rise

So far, I've talked a lot about what's going on in the world around us, but it's time I come back to politics for a bit. That said, the name of this world is somewhat misleading, in the sense that I talk about everything, not just politics! But I digress again.

Fire Texting: How to Write Secret Messages with Fire

Writing secret notes with lemon juice was one of my favorite pastimes as a child. All it took was a small flame to lightly scorch the paper and reveal the hidden message. Now that I'm tall and pay bills, lemon ink just isn't exciting enough anymore. Luckily, we can use another kind of invisible ink to write in fire! By using the saltpeter, we can whip up invisible fire ink in no time.

The League: Intro

Author's Note: Hi there, some of you may know but most of you probably won't. My name is Semeria and I am an author on the rising. I plan to be posting one of my novels on this website for people to read. Comment and let me know what you think and I hope you enjoy the story.

Know Your Rights: How to Escape Unlawful Stops and Police Searches with Social Engineering

Law enforcement can make a lot of folks cringe. Too often do we hear on the news, and even experience in our own lives, the unjust way that an unacceptable portion of law enforcement treat the very citizens they are supposed to protect. People's rights are violate each and every day by law enforcement, simply because they are timid and uneducated with the laws of society. This dirty trickery shouldn't be played on harmless citizens under any circumstances.

Community Byte: HackThisSite, Realistic 5 - Real Hacking Simulations

Eventually, we plan on doing some root the box competitions here at Null Byte, but we're still looking for a server to play on. Anyone want to donate one? You won't regret it. Root the box is like 'king of the hill', except you have to hack a server and maintain access. Each server will have numerous known security holes, but until then, let's get back to the regular weekly coding sessions and realistic hacking missions on HackThisSite.

News: Catch Creeps and Thieves in Action: Set Up a Motion-Activated Webcam DVR in Linux

When it comes to webcams these days, most people are using their laptops over desktops. The cameras are centered, integrated, and require no configuring. They're a cinch and usually have great resolution. So, then what do we do with all of those old wired desktop webcams that we've accrued over the years? Even if you still use an external USB one, chances are you're not using it daily, so why not come up with a better use for it?

Community Byte: HackThisSite, Realistic 4 - Real Hacking Simulations

We'd like this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with (anyone want to donate one?), we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But for now, back to the normal flow of things...

How to Pick Locks: Unlocking Pin and Tumbler Deadbolts

Lock picking is defined by locksmiths as "the art of opening a lock without the key". There's many ways to accomplish this, but I'm specifically interested in using a lock pick set. Since locks vary in shapes and size, it's better to stick with just one kind of lock at first. Most locks are based on fairly similar concepts, so sharing methods across locks is possible.

How To: Conceal a USB Flash Drive in Everyday Items

Technology in computers these days are very favorable to the semi-knowledgeable hacker. We have TOR for anonymity online, we have SSDs to protect and securely delete our data—we can even boot an OS from a thumb drive or SD card. With a little tunneling and MAC spoofing, a decent hacker can easily go undetected and even make it look like someone else did the hack job.

Community Byte: HackThisSite, Realistic 3 - Real Hacking Simulations

We're aiming for this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with, we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But, for now, back to the normal flow of things...

Community Byte: HackThisSite, Realistic 2 - Real Hacking Simulations

The community tore up the first realistic mission last week. You've applied the techniques learned in the basic missions to a real scenario, so I'm pretty content. The realistic missions are where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding and hacking sessions. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, f...

News: Advanced Cracking Techniques, Part 2: Intelligent Bruteforcing

Following the first part in this series on advanced cracking techniques, we are going to go over how we can intelligently crack passwords using the old-fashioned bruteforce method. These unique cracking techniques aren't widely used, because most crackers are Script Kiddies who have no idea what the concepts are behind cracking passwords, thus, word won't get around too quickly.