Private Chatting Search Results

Weekend Homework: How to Become a Null Byte Contributor (2/10/2012)

We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials on any skill level, and about anything you feel like sharing that...

Weekend Homework: How to Become a Null Byte Contributor (2/3/2012)

We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials on any skill level, and about anything you feel like sharing that...

How To: Safely Overclock Your GPU, CPU & RAM for Better Speed & Performance

Overclocking is quite an awesome thing. When computer components are designed, they are made to run at a certain speed, otherwise known as their clock and bus speeds. These limits are not actually limits. You can overclock components, which essentially makes them go faster than their set limitations. This can save you a lot of cash when newer components come out and you don't have enough money to upgrade. However, when you overclock components, you must be careful and make sure that the machi...

How To: Code Your Own Twitter Client in Python Using OAuth

This is my attempt to show people some cool things we can do with programming, and to give a small incentive for people to join the weekly Community Bytes. I wanted to make a tutorial on how to use Twitter from the command line with Python. This would have been an easy project to do not too far back, and a good bit of practice for a beginner to programming. It teaches that you can do useful stuff with programming. However, a while ago Twitter started using something called OAuth to access the...

How To: Chain VPNs for Complete Anonymity

Big name individual hackers and hacker groups everywhere in the news are getting caught and thrown in jail. Everytime I see something like this happen, I won't lie, I get a little sad. Then I wonder, how are these guys getting caught? If a group like LulzSec, with all the fame and "1337-ness" can get caught, I think my hacker comrades are doing something wrong.

How To: How Cross-Site Scripting (XSS) Attacks Sneak into Unprotected Websites (Plus: How to Block Them)

XSS stands for cross-site scripting, which is a form of web-based exploitation that uses client-side vulnerabilities in a web page to execute malicious JavaScript codes. JavaScript is referred to as "cross-site" because it usually involves an external website containing the malicious code. That code is most commonly used to steal cookies with a website that the attacker created and hosted on another server. The cookies can then be used to escalate privileges and gain root access to someone's ...

News: Google+ Pro Tips Weekly Round Up: Refining Sharing

One of the primary goals of a social network is for you to share what you find interesting with your followers and friends, but on Google+, sharing has so many layers that it can be confusing for most people to really take advantage of it properly. Some of the tools in place that enable you do deal with spam and manage your privacy aren't very clear, so this week's round up is all about how you can share what you want with who you want on Google+.

News: Has Chain World's Journey from Game to Religious Icon Ended?

At GDC 2011 this past March, three of the world's best game designers participated in a contest called Game Design Challenge. Each presented their vision for a game that fit the prompt "Bigger than Jesus: games as religion" before an audience, with applause to determine the winner. Jenova Chen, John Romero, and Jason Rohrer all spoke, and Rohrer won in a landslide with his revolutionary game called Chain World.

Dead Island: Almost Dead on Arrival

Dead Island (PC, PS3, 360) had the worst launch of any game in recent memory. The wrong version of the game was released on PC, matchmaking was down for three days on PC, saves were deleted without notice making people start from scratch, and the Feminist Whore (a file found describing one of the character's skills) fiasco. The game just wasn't ready for release.

News: Will Games Ruin Google+ Like They Ruined Facebook?

Last week, Google+ took a crucial step towards becoming exactly like Facebook. As of now, there are games available for download within the service, most notably Angry Birds, which is already available on at least one of the devices owned by everyone in America today. Some of the other popular games include Bejeweled Blitz and Zynga Poker, and out of all of the available titles, all come from four companies that have come to form the four-headed dragon of U.S. casual gaming: EA, Zynga, PopCap...

Camera Plus Pro: The iPhone Camera App That Does it All

Even with Apple's forthcoming iOS 5 updates to its default camera application, those upcoming features can't match what already exists in Global Delight's Camera Plus Pro. For $1.99, Camera Plus Pro provides users with over 100 tools for every part of the picture taking process, including video recording. It works with all versions of the iPhone, iPod touch, and iPad 2 with iOS 4.1 or the later update. Let's examine what it can do, and why you will want to replace Apple's default camera with ...

Minecraft: Her Crushed Dreams

What happens when a person who has never played a building sandbox game tries it for the first time? Reality happens. The harsh reality of human nature. You would think playing with friends in a creation game would be utopia, but in truth it's more like being stuck with people that would walk all over you if it provided a softer path.

Minecraft: My Uncle, the Serial Killer

Do you ever really know someone? I mean really really? Super really? Sometimes we can talk and be with people normally for years and then bam: five people dead, house on fire, dog missing. All the while people shake their heads and regret that if they had just put the little clues together all of this could have been averted.

Privacy Is So 2001: An Anime Video Game Novel About Social Media

Japanese people are into many things Americans find weird—like YouTube's beloved canine-hosted cooking show or Daito Manabe's light up LED grills or even more insane, a vending machine that distributes live crabs. In light of these cultural oddities, the Japanese phenomenon of visual novels (NVL, or bijuaru noberu), seems relatively normal. A meeting place of books and video games, visual novels are a sort of "Choose-Your-Own-Adventure" for the new generation.

Meat, Manners, and Mayhem: Vegetarian-Carnivore Communication

If you’ve watched The June the Homemaker Show, you’ve heard me mention once or twice that I’m a vegetarian. Over the course of my restricted diet eating, I’ve noticed that vegetarianism is a touchy subject among vegetarians and carnivores alike, particularly in meal-type situations. Here are some things for omnivores and, uh, not-omnivores to keep in mind when talking to each other about food preferences.

News: Parent "Agents"

I’m seeing a flood of posts on youth football forums and even getting a few e-mails from youth football coaches complaining about “player agents” also known as parents. Most of these unhappy coaches are dealing with parents that have non-issues, have an agenda, are misinformed, don’t know much about the game of youth football or are just people that gain great pleasure from complaining. The 80/20 rule is more like 95/5 in youth football, 95 percent of the problems are caused by 5 percent of t...

News: OMG. Surf then touch a Bigass Whale at Westwards

This one smells like a fish story.  It is not.  Tuesday April 13, Dave and I got up to surf westward at 7 in the morning.  First rate waves.  Headache cold water....sun blocked by the cliffs.  Fast, clean, beach break.  3-4 foot sets, mostly lefts.  About 15 dolphins swam by.  Blase blase.  We always see dolphins.  But then some bigass whale with barnacles breaches.  We are speechless.  It is about 20 feet from us. We follow it for about thirty seconds and pinch ourselves.  Have-you-ever?  No...

How To: Earn An Income By Writing Auto Repair Estimates

Collision Repair Related Careers When you think of a career in collision repair you probably think of a body repair or paint technician. However, there are a lot of related careers that collision repair can lead to. For Example, you can work in auto parts stores, dealerships, insurance companies, paint representatives, trainers, etc. In this article we are going to examine a career as an auto estimator.

News: The Amendments

How many of you know all the amendments of the Constitution? Do you even know how many there are?? Well, many of the people I speak to don't. And let me tell you, that's a bad thing. Knowing even the basics of the Amendments can have a profound effect in your lives. Ever got pulled over by a cop? Did you know you can deny his request to search your car (unless he sees something 'suspicious')? If you own a gun, you sure know about the Second Amendment. Here's a neat one: a public phone booth i...

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services

For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. Before someone can learn how to root a box, they need to learn how not to be found. I can not stress that point enough.

How To: Defeat SSL in Practice with SSL Strip

SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, whenever you see "https://" in front of the URL in your browser, you know you're safe... or are you?