In this article, I'll show you how to make a high-powered, long-range, air-powered rocket gun. This launcher is based on a sprinkler valve, a modified propane tank, and a few other components. Though not hard to make, this device is VERY dangerous! The rocket can seriously harm, if not kill any living thing it's shot at. Here's a video of it in action, quite an accurate shot by my friend Chris... Parts
Hobby rockets are tons of fun. Vicarious astronaut adventures abound with every launch. What if you want to be closer to the action though? What if you want to feel what it's like to be in a rocket at takeoff? With the discovery of tiny keychain cameras, we have technology small and cheap enough to fit inside a model rocket!
Bikes are a great form of transportation. They use human energy more efficiently than any other machine. You can keep it in your closet or hallway. You can even take it on the train in a pinch. However, this portability is also the bike's biggest draw back. If you own a bike in the city, chances are it will be stolen. Locks barely deter thieves armed with bolt cutters and crowbars. Throw the bike thieves for a loop and make a tilt-sensitive alarm. It will hopefully startle your bike's assaila...
House plants are a refreshing reminder of the rich biosphere teaming with life just outside of our hermetically sealed human dens. They calm us and clean our air. But what would you do if you came across a glowing green flower on your dinner table? I would be startled, but not shaken.
There isn't much going on this week, but be sure to try viewing the Spica-moon conjunction. It will be hard to view with the full moon, but it will be spectacular if you can snag a peak.
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server!
Rockets are lots of fun when you are launching them. However, finding them can be an arduous if not maddening task. Fancy space rockets have lots of tracking equipment to make touchdowns as simple as pie. Today, we look at embedding LEDs into your hobby rocket for easy night flight fun!
The only thing better than successfully pulling off a new experiment is doing it with household materials. You get to laugh in conceit as professional scientists everywhere spend all their grant money on the same project you just accomplished with some under-the-sink chemicals! However, there are times when DIY gets dangerous. Some household chemicals are not pure enough to use and some are just pure dangerous. Let's take a look at two problems I have encountered in the course of mad sciencing.
Glass is one of the least reactive substances known to chemistry. It is the standard container material for almost all lab chemicals because it's so inert. But there are a couple of substances that have strong reactions with glass. Sodium hydroxide, aka solid drain cleaner or lye, can easily be stored in glass as a solid, but when molten, it reacts violently with glass and can actually dissolve it away! So, the next time you clog up your drains with broken glass beakers and flasks, rest assur...
You're never too young to start building your vast swarm of robotic minions. Taking over the world requires a whole lot of robots. The sheer volume of robots needed means your first wave will have to be made of cheap materials. After they take over key resources, you can upgrade to Kevlar and titanium. But to start, let's make popsicle stick insect robots!
Science-fiction writer Jules Verne predicted many scientific breakthroughs, including the moon landing, tasers, and nuclear submarines. In his 1874 book The Mysterious Island, Verne writes:
There's a time in everyone's life when they need to become immortalized and reprographed in a full-blown comic spread, complete with halftone dots and speech bubbles—or squares, if you're a square. With our favorite program Photoshop, you can quickly turn any hyperbolic celebrity into a comical farce. Even normal people can become vintage villains with a little pixelation.
If Null Byte had a large Batman-like spotlight calling for help, we would definitely be using it right now. However, we don't, so this is my digital equivalent. Information security is a huge field, far too much for one man to cover adequately, so I need your help!
The very people this humanitarian mission seeks to help are outraged at the portrayal of their problems and lands. In my previous post, I talked about how this new internet sensation is most probably a hoax designed to force us into a new war. Guess what? It was.
Around the world, X-People (yes... there are X-Women, too) are under attack from an intolerant sapiencentric ruling class. Integration without equality is a farce. Autonomy is denied outright. Human prejudice cannot abide a mutant state. Human fear, born to hate, imposes itself on the life of every mutant.
So far, I've talked a lot about what's going on in the world around us, but it's time I come back to politics for a bit. That said, the name of this world is somewhat misleading, in the sense that I talk about everything, not just politics! But I digress again.
Writing secret notes with lemon juice was one of my favorite pastimes as a child. All it took was a small flame to lightly scorch the paper and reveal the hidden message. Now that I'm tall and pay bills, lemon ink just isn't exciting enough anymore. Luckily, we can use another kind of invisible ink to write in fire! By using the saltpeter, we can whip up invisible fire ink in no time.
Last week, we had a great contribution from Christopher Voute, who introduced us all on some of the basic moves in Python. Now, who else will share their knowledge and tackle some of the topics below?
I recently posted a link to what seemed to be a very useful guide on Lifehacker for creating a TOR button in Chrome. However, when I tried it myself, it did not work. Also, it lacked a warning on the limits of Tor, which I think are important. Therefore, I decided to create an updated and more comprehensive tutorial.
If you're hungry, eat now, because this list is probably going to put you off consuming vittles for so long that you'll end up looking like the love child of Nicole Richie and Skeletor. Now that you've been officially warned, help me count down the ten most WTF food items on this beautiful blue marble we call Earth.
Author's Note: Hi there, some of you may know but most of you probably won't. My name is Semeria and I am an author on the rising. I plan to be posting one of my novels on this website for people to read. Comment and let me know what you think and I hope you enjoy the story.
Law enforcement can make a lot of folks cringe. Too often do we hear on the news, and even experience in our own lives, the unjust way that an unacceptable portion of law enforcement treat the very citizens they are supposed to protect. People's rights are violate each and every day by law enforcement, simply because they are timid and uneducated with the laws of society. This dirty trickery shouldn't be played on harmless citizens under any circumstances.
Eventually, we plan on doing some root the box competitions here at Null Byte, but we're still looking for a server to play on. Anyone want to donate one? You won't regret it. Root the box is like 'king of the hill', except you have to hack a server and maintain access. Each server will have numerous known security holes, but until then, let's get back to the regular weekly coding sessions and realistic hacking missions on HackThisSite.
When it comes to webcams these days, most people are using their laptops over desktops. The cameras are centered, integrated, and require no configuring. They're a cinch and usually have great resolution. So, then what do we do with all of those old wired desktop webcams that we've accrued over the years? Even if you still use an external USB one, chances are you're not using it daily, so why not come up with a better use for it?
Lost the product key for your game? If you have to reinstall the game and don't have that key anymore, you're out of luck, especially if you didn't "buy" the game. But never be in fear of losing product keys again with today's Null Byte, where we'll be practicing a little bit of mind-kung fu.
Lock picking is defined by locksmiths as "the art of opening a lock without the key". There's many ways to accomplish this, but I'm specifically interested in using a lock pick set. Since locks vary in shapes and size, it's better to stick with just one kind of lock at first. Most locks are based on fairly similar concepts, so sharing methods across locks is possible.
Technology in computers these days are very favorable to the semi-knowledgeable hacker. We have TOR for anonymity online, we have SSDs to protect and securely delete our data—we can even boot an OS from a thumb drive or SD card. With a little tunneling and MAC spoofing, a decent hacker can easily go undetected and even make it look like someone else did the hack job.
We're aiming for this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with, we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But, for now, back to the normal flow of things...
The community tore up the first realistic mission last week. You've applied the techniques learned in the basic missions to a real scenario, so I'm pretty content. The realistic missions are where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding and hacking sessions. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, f...
Following the first part in this series on advanced cracking techniques, we are going to go over how we can intelligently crack passwords using the old-fashioned bruteforce method. These unique cracking techniques aren't widely used, because most crackers are Script Kiddies who have no idea what the concepts are behind cracking passwords, thus, word won't get around too quickly.
How did it happen? How did your ultra-secure WPA password on your wireless network get broken into? Well, you might have just found yourself at the mercy of a cracker.
It has been suggested that about 150 million internet users will be affected by today's blackout of Wikipedia in protest of SOPA and PIPA. If you don't know what those are, go here and read up on it, and then take action yourself! After you've contacted your Representatives about these bills, you'll probably still need to get some work done today using Wikipedia's English-language site.
Here's a nasty little Null Byte. An open redirect vulnerability was found in both Facebook and Google that could allow hackers to steal user credentials via phishing. This also potentially allows redirects to malicious sites that exploit other vulnerabilities in your OS or browser. This could even get your computer flooded with spam, and these holes have been known about for over a month.
I'm pretty sure that it's a universal dream for everyone in the world to retire early. Who wants to to be stuck with the rest of the country and retire when you're almost 70 years old? You heard me right, 70! Most people can't go out and do the things they love to do by the time they're 70, unless they've been practicing good health and exercise their entire life.
Last week I reviewed Kinotopic, the iPhone app that lets you easily create cinemagraphs. While I loved the result, I found the app hugely flawed. Kinotopic forced you to use a Facebook log-in, and didn't store the finished video on your phone itself. Instead, you had to visit the Kinotopic website to see your cinemagraphs or link to your Kinotopic page using Twitter, Facebook or Tumblr.
Community byters, it's time to get serious. We are finally moving on to the realistic missions in HackThisSite. This is where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding and hacking sessions. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, from novice programmers to aspiring hackers.
As per Alex's request, I am posting about generating word-lists in Python. However, this is my FIRST attempt with Python, so please provide me with critiques and any and all comments. I really want to know what you think as there was a little bump here and there seeing as I am transitioning from C#.
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server.
Since the launch of Edit on a Dime several weeks ago, I’ve been putting a variety of automatic video editing apps though their paces. One of the first tested was Magisto, a web-based app that’s directly accessed through YouTube, which I enjoyed, but found some obvious problems with. Since then, I’ve been in contact with Oren Boiman, CEO and founder of Magisto, who was kind enough to address my concerns.
VNC is a great protocol that you can use on Windows and Linux machines to remotely control computers. This is useful if you need to control your computer when away from home, help your grandma check her email, or help a client with a disk cleanup. VNC is secure in the sense that it requires authentication in order to make the connection, but after that, the data is sent over the internet unencrypted. This means that an attacker could sniff your traffic and snoop everything that's going on. Th...