Private Chatting Search Results

News: LIST OF CRITERIA

When joining this site... it requires me to fulfill a list of obligations for getting the world going... More so... you can't have the perks without the work basically! So this is my final edit to our world and we can be officially off. Mikeyssmail on this becomes official and more... So thanks to all the fans who are jumping from Facebook to here! I think this is our future at this website... we have everything we need to share with and keep our own lives private! Enjoy!

News: Ice Diving in Kazakhstan For Underwater Forests

Quick, winter is coming to a close, time to catch the tail end of the winter sport season. This could potentially include ice diving in Kaindy Lake (if you happen find yourself in Kazakhstan, home of Borat). Kaindy Lake was created by an enormous limestone landslide, and as a result, a forest was submerged. In the summer, half drowned trees emerge from the water, creating a dramatic effect. In the winter, ice divers brave the freezing waters to explore the depths.

News: Extremely-thoughtless-to-privates Surfing at Latitude 66/33

Latitude 66/33, a.k.a. the North Pole, a.k.a. the new best kept secret surf spot. This past spring, surf photographer and filmmaker Yassine Ouhilal, plus four other surfers, went to the arctic to surf. They began their expedition in Norway, and ended up surfing in beautiful midnight snow showers, riding waves under the incredible Northern Lights.

Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Final Session)

We had a blast during last week's social engineering calls. One of our attending social engineers was so clever that she convinced several people on Craigslist that lost items were hers, even if it seemed she couldn't be trusted. But females are better social engineers, naturally. Some say that females have a special knack for manipulating men, but I think that's preposterous. I can't see why that would be true in a million years (note my sarcasm).

Community Byte: HackThisSite, Realistic 5 - Real Hacking Simulations

Eventually, we plan on doing some root the box competitions here at Null Byte, but we're still looking for a server to play on. Anyone want to donate one? You won't regret it. Root the box is like 'king of the hill', except you have to hack a server and maintain access. Each server will have numerous known security holes, but until then, let's get back to the regular weekly coding sessions and realistic hacking missions on HackThisSite.

Community Byte: HackThisSite, Realistic 4 - Real Hacking Simulations

We'd like this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with (anyone want to donate one?), we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But for now, back to the normal flow of things...

Community Byte: HackThisSite, Realistic 3 - Real Hacking Simulations

We're aiming for this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with, we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain access. Each server will have numerous known security holes. But, for now, back to the normal flow of things...

Community Byte: HackThisSite, Realistic 2 - Real Hacking Simulations

The community tore up the first realistic mission last week. You've applied the techniques learned in the basic missions to a real scenario, so I'm pretty content. The realistic missions are where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding and hacking sessions. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, f...

Community Byte: HackThisSite, Realistic 1 - Real Hacking Simulations

Community byters, it's time to get serious. We are finally moving on to the realistic missions in HackThisSite. This is where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding and hacking sessions. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, from novice programmers to aspiring hackers.

How To: Update to the New Gmail Look (And See What's Changed)

It's live! Google has finally unveiled the much-hyped makeover of their Gmail email service. As of yesterday, anyone who wants to update to the new Gmail look can, but in the coming days it will be forcefully pushed to Gmail users everywhere. If you enjoyed the look of the old Gmail, you've only got a few more days to bask in the design before it becomes a mere memory.

News: Creating Social Structures in Minecraft

Minecraft is the most basic and barren open sandbox building game. There are a limited number of materials and recipes to craft. But with these few building blocks, people have been able to creatively build some amazing structures and cities. There is a physical limitation, but the beauty of the game is turning that limitation into a strength.

CISPA: What You Need to Know

Though under a lot of the average consumer's radar, the CISPA is now making rounds again with a coalition of advocacy rights groups. The act, known as the Cyber Intelligence Sharing and Protection Act, forces companies to ignore existing privacy laws and share information with the Federal Government. This short article will bring you up to date on this bill. The CISPA is another bill 'designed' to help prevent thefts and prevent them in cyberspace. But again, like all the previous bill before...

WTFoto News Scoop Sundays: Wrath of the Religious Roommate

The angry New Yorker stereotype sure doesn't miss anyone. A woman from New York is suing her former Catholic college for not doing 'enough' for her while her dorm roommate was having too much sex. We're not entirely sure if the college even handed out ties to hang on doorknobs, let alone provide each room with a humidifier that has 3-4 different soothing sound loops for stress relief and relaxation.

Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations

Last Friday's mission was to accomplish solving HackThisSite, Realistic 5, the fifth and last in my series of realistic hacking simulation missions. This time, telemarketers are invading people's privacy, and it was up to us to stop them! The job was to get root on the site and delete the contact database in order to return the right of privacy to its victims.

Goodnight Byte: HackThisSite, Realistic 4 - Real Hacking Simulations

Last Friday's mission was to accomplish solving HackThisSite, realistic 4. The fourth in a series of realistic simulation missions was designed to be exactly like a situation you may encounter in the real world. This time, we are told "Fischer's Animal Products is a company that slaughters animals and turns their skin into overpriced products which are then sold to rich bastards! Help animal rights activists increase political awareness by hacking their mailing list."

How To: Sneak Past Web Filters and Proxy Blockers with Google Translate

Do you need proxy access, but cannot have it for some reason? The most common perpetrator behind the issue is the network you're trying to access the pages from. Some networks will block websites, then go as far as filtering out all of the web queries for terms like "proxy" because it can get around their filter. Quick web proxies can be used for tons of other things, though.

News: Awesome Trick with Prepaid "GoPhones" Nabs You Free Text Messaging for Life

You might be sitting there thinking that I'm crazy, but the truth is you're only partially right. You can get free text messaging for life, all for a cheap, one-time fee. But, how can that be possible? An exploit in AT&T's prepaid GoPhones is the culprit behind this sweet, oh-so rare opportunity for exploitation. The exploit grants a lifetime of free texting, assuming that the company stays afloat from now until the end of time.

How To: Build Your Own "Pogo Mo Thoin" to Flash Any Xbox 360 DVD Drive for Under $5

The biggest struggle with flashing DVD drives on Xbox 360s has been the price tag of the probe to extract keys on some drives. The probe and kit is required to extract the DVD key, which is needed to perform a drive repair, flash, or backup of any kind. Who wants to pay big bucks for the "pro" kit and then get added to a huge waiting list behind a million other people looking to buy the same product? We can hack the same thing together at home!

How To: Get the New Google Navigation Menu

Get the New Google Navigation Menu Although Google introduced the new Google bar last week, I still didn't have the new look yet. I was curious to see if I could find it, and discovered that +Maximiliam Majewski found a workaround to get access to the new Google bar. It's no longer the black navigation bar at the top of the page, but rather a drop-down menu on the left-hand side, from the Google menu. Install a browser extension that allows you to edit the cookies.

How To: Run a Virtual Computer Within Your Host OS with VirtualBox

With the computer's rapid increases in power and efficiency, computer virtualization has taken the scene by storm. With virtualization software, and powerful enough computer hardware, your computer can run a virtual computer within itself. This effectively gives you multiple OS's on the host OS. This can be used for a lot of cool stuff that your computer would normally be limited by. Let's take a look at a few.

How To: Permanently Delete Files to Protect Privacy and Passwords

Permanently deleting files is something that a lot of people aren't aware of. Actually, most people think that once a file is deleted, it is gone forever. This is not the case. Hard drives write to the disk via magnetic charges, positive and negative correlate to 1s and 0s for binary. This is then interpreted into information for the computer to use and access.

News: Complete Arch Linux Installation, Part 2: Graphical User Interface & Packages

Welcome to the second part of the Arch Linux installation tutorial! We are installing Arch because of the amount of users who want to learn how to get into Linux. Arch is a simple, minimalistic distro, designed not to hold the users hand, but to push them to know their system and customize it to the core. This will make you feel accomplished, as well as give you the extra edge of being knowledgeable of the GNU/Linux operating systems.