Protects Journalism Search Results

News: Easy Skype iPhone Exploit Exposes Your Phone Book & More

Like the recent XSS 0day exploit found in the Mac and Windows versions of Skype, a similar one has been found in the Skype app for iPhone. The vulnerability allows an attacker to send a message that contains malicious JavaScript code in the "Name" parameter. This code can steal your phonebook, crash the app, and potentially do a lot worse. The URI scheme is improperly identified for the web-kit browser. Instead of going to a blank browser page, it defaults to "file://". The code could steal a...

How To: Bypass Windows and Linux Passwords

If you're interested in bypassing Windows and Linux passwords, there is a great tool from the good people at Kryptoslogic. Have you ever forgotten your administrator password? Have you ever bought a used computer with a password on it? Well, Kryptoslogic have created a boot-disc call 'Kon-Boot', which allows you to bypass any Windows 32 or 64 bit OS, as well as Linux passwords. There is both a paid and freeware version available.

News: Video Games Deemed Art AND Protected Free Speech!

It's been a great year for video games, kind of. Sure, the AAA release lineup has been a trainwreck and hacking has been a bigger problem than ever. But two things have happened involving the federal government that have made video games more legitimate in the United States than ever before. The Supreme Court ruling establishing that video games were the equivalent of movies and books, not porn, was the more significant decision. But in May, the National Endowment for the Arts made another si...

How To: Create password-protected zip files with WinRAR

If you have a group of large files that need to be sent to a client, you might want to compress it into one single file for easy access or even protect its content from outsiders with a password. This video will teach you how to create password-protected zip files with WinRAR. WinRAR provides full RAR and ZIP file support, and can decompress CAB, GZIP, ACE and other archive formats. Make sure to hit "play tutorial" in the top left corner of the video to start the video. There is no sound, so ...

How To: Don't Get Caught! How to Protect Your Hard Drives from Data Forensics

With the mass arrests of 25 anons in Europe and South America, and the rumors of an FBI sweep on the east coast of America floating around, times look dicey for hackers. Over the past few days, a lot of questions have been posed to me about removing sensitive data from hard drives. Ideas seem to range from magnets to microwaves and a lot of things in-between. So, I'd like to explain a little bit about data forensics, how it works, and the steps you can take to be safe.

How To: Restore Your American Girl Doll's Shiny Silky Hair

In this tutorial, we learn how to restore your American Girl doll's shiny silky hair. You can wash and condition the hair, use a flat iron on the lowest setting, trim the ends and fly-aways with scissors, and more! If you have done all of this and it's just not shiny enough, you can help fix it. First, you will put a plastic bag around her body. After this, this is the bag so her skin won't be affected. Now, cover her face with a towel so just her hair is left. Now, take some Son of A Gun spr...

How To: Change the oil and oil filter in an Infiniti G35

Infiniti is like no other car, it has emotion, it has soul, it inspires. There's a difference between being physically transported and emotionally moved, and you can tell them apart when you sit inside this magnificent automobile. Although the Infiniti is like a dream car, it has its problems just like any other brand of vehicle. There's maintenance, minor repairs, major repairs, needed replacement parts, oil changes, headlight adjustment, low tires, transmission and everything else you can t...

How To: Install shoe molding

If you have hardwood floors in your house, take a look at your baseboards. Right in front of the baseboards there is usually a smaller, curved molding about ¾” tall. How does this short molding look? Is it painted over, chipped and/or just beat up in general? If so, you can easily replace this molding and make a huge difference in the overall appearance of your room. And, it is fairly easy to do.

How To: Change Your Bicycle's Tire, Inspect for Damage, and Detect Hidden Problems

Many things cause a bike tire to deflate. Glass, sharp rocks, tacks, and nails can pierce the tire and puncture the tube within. A tube can be pinched between the rim and tire causing the tube to split when inflated. If a tire has a hole in it, the tube, which is filled with air pressure, will bulge out of the opening and pop. As well, the valve holding the air pressure in the tube can be damaged or faulty.

Freedom watch: Not a single Democrat voted for ending raids on raw milk

Here’s some news for those who still somehow believe the political left in Washington cares about the People. After U.S. Senator Rand Paul introduced an amendment that would have ended armed FDA raids on raw milk farmers (http://www.naturalnews.com/035966_Rand_Paul_FDA_censorship.html) and legalized free speech about the curative properties of medicinal herbs, nutritional supplements and superfoods, are you curious how many Democrats voted in favor of this?

Know Your Rights: How to Escape Unlawful Stops and Police Searches with Social Engineering

Law enforcement can make a lot of folks cringe. Too often do we hear on the news, and even experience in our own lives, the unjust way that an unacceptable portion of law enforcement treat the very citizens they are supposed to protect. People's rights are violate each and every day by law enforcement, simply because they are timid and uneducated with the laws of society. This dirty trickery shouldn't be played on harmless citizens under any circumstances.

How To: Conceal a USB Flash Drive in Everyday Items

Technology in computers these days are very favorable to the semi-knowledgeable hacker. We have TOR for anonymity online, we have SSDs to protect and securely delete our data—we can even boot an OS from a thumb drive or SD card. With a little tunneling and MAC spoofing, a decent hacker can easily go undetected and even make it look like someone else did the hack job.

News: Flaw in Facebook & Google Allows Phishing, Spam & More

Here's a nasty little Null Byte. An open redirect vulnerability was found in both Facebook and Google that could allow hackers to steal user credentials via phishing. This also potentially allows redirects to malicious sites that exploit other vulnerabilities in your OS or browser. This could even get your computer flooded with spam, and these holes have been known about for over a month.

How To: The Hacks Behind Cracking, Part 2: How to Generate Software Keys

If you've ever heard software piracy terminology being discussed, I'm sure the term KeyGens came up. KeyGens is short for key generator, which is a program that exploits algorithmic faults in software by generating software license keys that appear to be genuine. Normally used as a technique to protect the source code software and prevent piracy, a key generator exploits the key algorithm to effectively nullify the need for any software licenses. For example, we must try to find patterns in t...