Private Letter Search Results

How To: Safely Log In to Your SSH Account Without a Password

SSH is amazing, and we praise its existence on Null Byte for many reasons. Notably, it allows us to reroute our traffic through encrypted ports on our local host to be sent to its destination when on the go. You can even control your home computers remotely over a secure and encrypted connection. This is handy for a multitude of reasons.

How To: Encrypt Your Sensitive Files Using TrueCrypt

Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm here to teach you how to create a general encrypted container—not the complex hidden TrueCrypt volume.

Secure Your Computer, Part 3: Encrypt Your HDD/SSD to Prevent Data Theft

Welcome to Part 3 in my series on protecting your computer from prying eyes (Part 1, Part 2). In today's segment, we will be going over drive encryption using the TrueCrypt program on Windows OS. Drive encryption is a technique that masks your data with a cryptographic function. The encryption header stores the password that you have entered for the archive, which allows the data to be reversed and read from. Encrypted data is safe from anyone who wants to read it, other than people with the ...

News: Enter The World of Catherine

Stuck in a relationship that is going nowhere? Do you wake up and it's nine years later and nothing has changed? Do you also dream of sheep? You know, in the non erotic sense? Well welcome to Catherine, a puzzle game of non-commitment and text messaging.

What You See Is What You Get: The Street Art of RERO

Inspired by the beauty of traditional signage printed on doors and buildings, Rero is a French graffiti artist who makes a simple, yet heavy mark. Using the universally common Verdena typeface, Rero brands abandoned public spaces in extreme disarray with his own codified messages based on theories of public use of imagery and private property.

YouTube Phreaking: How to Extract a Phone Number from a YouTube Clip

Every key on a telephone keypad has its own sonic signature, a sort of calling card composed of two distinct tones: one high, one low. While it's easy to tell the difference between the individual pitches in a single row—see, for example, this article on using your cell phone as a musical instrument—, it's often difficult to differentiate between notes within the same column. Unless, of course, you outsource the work to a computer! Which is what Uruguayan hacker [Charlie X-Ray] recently set o...

Real Life Cyborg: Man Plans to Implant Camera in the Back of His Head

Professor Wafaa Bilal of New York University plans to soon undergo a surgical procedure that would temporarily implant a camera in the back of his head. The project is being commissioned for an art exhibit at a new museum in Qatar. The Iraqi photographer will be a living, breathing cyborg for an entire year, during which the implanted camera will take still photos every minute, simultaneously feeding the images to monitors at the museum.

News: Think You Have an STD? Pee on Your Phone to Find Out

Relax, it's not as messy as it sounds. Pee-on-a-stick, at home STD tests may be available in UK pharmacies soon, complete with an incredibly convenient app that would save you a trip to the clinic. It works like this: if you suspect you may have an STD, you would pee on a device which is then inserted into your mobile phone. The app then "diagnoses" your sample and returns results.

News: Advertising in Alan Wake

These are great times. It is about time advertisers invaded our video games in the same way they do our driving (billboards), walking (fliyers, posters), and our private home (emails, bulk mail, text messages).

News: Don't cheat!

Cheating ruins everything. Cheating makes game play unfair for others who may be truly competitive and strategic. Cheating makes others disrespect and un-friend you. There can be unforeseen consequences, like getting viruses, trojans or your account hacked from downloading a cheat/bot program. And you will get banned from the game for violating terms of service.

News: Conrad Schnitzler - Conrad and Sohn

What more is there to say about the almighty Conrad Schnitzler? One of the original founders of Tangerine Dream and Kluster (later Cluster), his contributions to the world of German experimental electronic music have been enormous. With album, cassette, and cd releases miles long, his discography would take a lifetime and a pretty penny to catch up to. 'Conrad and Sohn' is a pretty unique release, even for Schnitzler. The album was a private press release that he did with his son in 1981. App...

How To: Watch Comey Testify Live on Your Smartphone

In light of his recent controversial firing, Former FBI Director James Comey will testify to the Senate Intelligence Committee in a highly anticipated open session today at 10 AM EST / 7 AM PST. The testimony will be in regards to alleged Russian involvement in the 2016 presidential election. It will be the first time the former FBI director will speak in public since the firing. So, you do NOT want to miss it.

News: Signal, Snowden's Favorite Secure-Messenger App, Is Now on Your Desktop

Encryption is on everyone's mind these days, from the FBI's battles in court with Apple to WhatsApp's recent announcement of end-to-end encryption for their one billion users. Now you can add Signal, whistleblower Edward Snowden's favorite messaging app, back to that whirlwind discussion. Created by Open Whisper Systems, Signal is an encrypted messenger app that allows you to send text, images, video, and audio messages without the fear of prying eyes. They already have an Android and iOS app...

Facebook Photo Privacy: Are You Safe?

Almost everyone uploads their very personal photos in facebook trusting facebook's privacy settings. But question is - is facebook's privacy settings really that trustworthy? Few months ago, while browsing facebook, I found that one can easily access your private photos using the same browser you used to browse facebook.

How To: Privacy? What Privacy? Quora Now Publicly Shows the Posts You View: Here's How to Disable It

In an effort to help posters see the various ways that people discover their posts, Q&A site, Quora has decided to make who views each post, public, along with information on how each viewer came to see the question (ex: through an email, a followed tag, or other public stream). This would probably be an interesting, helpful, and universally liked feature, except for one thing...

News: Booty dance

It is Saturday. Party. Dance. I have wanted a tutorial/breakdown of the booty dance for more than a year. Hell, I did not even know what to call the move before this video entered my life.

Don't Get Doxed: 5 Steps to Protecting Your Private Information on the Web

If you follow the Anonymous, Occupy, and IT security scenes, you have no doubt heard about a dox release. What is it? How can it hurt you? And most importantly, how can you protect yourself from it? Some of these steps might seem common sense, while others will be an ah-ha! moment. Your private info is both your biggest weakness and your biggest weapon in your battle to remain anonymous. You must learn how to use it as both.

News: The Cosmic Connection

The recent report of the ubiquity of extrasolar planets coupled with the fact that it bodes well for searches for life friendly Earth twins, brought me back to my reading of Carl Sagan's 1966 Intelligent Life In The Universe and later article in Sky & Telescope where he came up with a remarkable number in favor of such.