I recently posted a link to what seemed to be a very useful guide on Lifehacker for creating a TOR button in Chrome. However, when I tried it myself, it did not work. Also, it lacked a warning on the limits of Tor, which I think are important. Therefore, I decided to create an updated and more comprehensive tutorial.
Are you the expert hacker we're looking for? Do you have a great idea for an article on Null Byte? Do you have a passion to write, and more importantly... teach?
Law enforcement can make a lot of folks cringe. Too often do we hear on the news, and even experience in our own lives, the unjust way that an unacceptable portion of law enforcement treat the very citizens they are supposed to protect. People's rights are violate each and every day by law enforcement, simply because they are timid and uneducated with the laws of society. This dirty trickery shouldn't be played on harmless citizens under any circumstances.
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects.
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects.
Lost the product key for your game? If you have to reinstall the game and don't have that key anymore, you're out of luck, especially if you didn't "buy" the game. But never be in fear of losing product keys again with today's Null Byte, where we'll be practicing a little bit of mind-kung fu.
I'm sure we've all heard about MSN and Yahoo! Messenger, right? They can be useful, but the setup can be quite time consuming for those who need to use it just once or twice—and the privacy statements are a real bother. For example, we must provide our real details. You could use Fake Name Generator, but if you get caught, you will have your account suspended. I don't have a law degree, but to my understanding the United States recently passed legislation that gives the authorities the power ...
Many windows users, if not all, run into a virus infection once in a while. This is unavoidable when using Microsoft's operating system. Without digressing too much, the fact that Windows is such a popular OS with no controlled software sources makes it easy for viruses and malware to spread. And while there's a plethora of antivirus tools for Windows, sometimes infections (such as certain scareware) can disable the install and/or use of antivirus systems and render your OS unusable until cle...
Three Days without You Poem Description:
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects.
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server.
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects.
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. So you have a deep mine, an epic home, a bountiful farm, and mob traps galore, but have you ever considered linking them together into one cohesive unit? With the use of a minecart train station you can turn your disjointed Minecraft manor into a well oiled machine and cut travel times in half.
In the age of automatic video editors and all around software-assisted creativity, how can a humble blogger help people master a program if said program does all the work for you?
Have you ever wondered how credit card numbers work? I mean, how they really work? How do they come up with the numbers? Credit cards actually follow a very specific pattern. Let's take a look at how they're set up.
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server.
WonderHowTo is made up niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects.
Since the Geminid Meteor shower is intensifying more every year, grab your binoculars and lay down in a field to enjoy the show! If you are going to observe one day, do it on the peak: December 14th.
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Getting up and down in Minecraft can be extremely time consuming without the assistance of fly mods or speed hacks. If you're a pure player looking for a safe and effective way to travel vertically, why not try the Minecraft water elevator? It's a simple to use device that neither requires neither expert know-how or miles of redstone wiring. It's even faster than many piston elevators.
Google+ is taking over more and more of Google's core properties. This week, we've seen several announcements from Google blogs about new products, new features, new looks, new integrations. If you're like me, you actually want to know where to go for all the latest information on Google products.
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server.
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. No self-respecting Minecraft house is complete without a state of the art automatic cobblestone generator. But what does the average Minecrafter need with a bunch of cobblestone? To put it simply, sometimes you just need a bunch of blocks. I cannot tell you how many times I have been in the midst of a trap, animal pen, or basement only to find myself short on the second most common block of them all.
Having an SSH or Secure SHell to tunnel your traffic through is something we have talked about many times at Null Byte. As we know, it allows us to securely route and encrypt our traffic through a remote server, effectively anonymizing us and protecting our traffic from all forms of analysis—simultaneously. We have gone over how to make a home SSH tunnel. However, the question has come up, "How can I get an SSH tunnel to somewhere other than my computer?" This would be useful in a situation w...
Flash memory can be a tad unpredictable at times. I have had 4 flash drives die out on me over the last few years, and they usually die without warning. When a flash memory based device dies, the data is likely impossible to recover. Adversely on an HDD, or Hard Drive Disk, even if the disk dies out, someone will probably be able to fix it and get it back to working order—at least long enough for you to back up your data. Hard drives are a bit more forgiving. As you can guess, due to the unpr...
More password cracking action from Null Byte! Today we aren't going to be cracking passwords per se, rather, we are going to learn the basics of generating rainbow tables and how to use them. First, let's go over how passwords are stored and recovered.
An information technology degree from Kaplan University could be the first step towards a potential information technology career.* Earning an IT degree online can seem like a daunting task, but Kaplan University faculty and staff are available to students through email, instant messaging, and phone calls as well as weekly online seminars.
At Kaplan University, our main focus in developing our online MBA programs is career development. We believe the time and effort that is required to obtain a master’s degree online should be apparent the first day the student begins their new career. Earning an MBA could be a step in the right direction towards a fulfilling and satisfying career.*
Nearly every game takes strategy to win, but when it comes to games like Scrabble and Words with Friends, you've also got to have a lexically inclined mind full of wonderful and weird words. Most start out by learning all of the two-letter words in the Scrabble dictionary, then work their way up to three-letter words. But where do you go from there?
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills.
Having a custom Linux distro can be the coolest thing ever. Most of you will probably be satisfied with any particular Linux distribution, but I know I'm not the only one out there who wants it to have custom configurations and programs preloaded while leaving the bloatware behind.
Increasingly, I'm turning to Google+ as a source of news, and it looks like I'm not the only one. On Thursday, news of a small earthquake broke on both Twitter and Google+. One curious user, +Keith Barrett, decided to try and find out which social network was faster with the news. Turns out it was a tie. As Google integrates Google+ more closely with the rest of its services, and more users post relevant stories, I think we'll start to see Google+ as a place that can create and break stories,...
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills.
It’s been a pretty big week for Google, and Google+ itself. There were a number of articles proclaiming the end of Google+, because allegedly traffic dropped over 60% after it opened to the public. Then +Steve Yegge accidentally posted a long rant on Google+ itself, which was originally meant only for Google employees and colleagues to see. Interestingly enough, the most inflammatory content wasn’t actually about Google itself, but about the horrible work environment at Amazon. The accidental...
XSS stands for cross-site scripting, which is a form of web-based exploitation that uses client-side vulnerabilities in a web page to execute malicious JavaScript codes. JavaScript is referred to as "cross-site" because it usually involves an external website containing the malicious code. That code is most commonly used to steal cookies with a website that the attacker created and hosted on another server. The cookies can then be used to escalate privileges and gain root access to someone's ...
In these weekly Scrabble Challenges, so far we've covered two-letter words, double bingos, high scoring moves, triple-triples, last moves, parallel plays, phoneys and opening moves. For this week's puzzle, we're revisiting the strategy for opening moves.
Apple's "Let's talk iPhone" event has just ended, and the information isn't anything that wasn't already anticipated. Much to everyone's hopes, the iPhone 5 was not the headliner of the event. Instead, Apple's new CEO Tim Cook unveiled the iPhone 4S to the 250-seat audience, a speedier version of the iPhone 4. Here's the details.
Anyone who likes shooters is going to hate me for saying this: the best game of the 2000's for me was Psychonauts by Double Fine Studios. It came out in 2005 for the original Xbox, achieving critical acclaim, but never selling very well due to its sheer kookiness and poor marketing. Over the ensuing years it has become a cult classic, with downloadable re-releases on Xbox 360 (sadly no longer available). PC has allowed gamers who missed out on the original to bask in its ageless glory.
I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to remember lengthy passwords and why their current password isn't good enough. Well, I'm going to show you.
The noble board game has stalwartly staved off elimination in the face of more technologically advanced video games for four decades. Try as they might, video games just can't seem to surpass them as an easy-to-use diversion for large groups of seated indoor people.
In this Null Byte, we are going to be installing Packet Injection capable drivers in Linux. These are the open-source drivers required to sniff wireless traffic, inject packets to crack a wireless access point, and go into "monitor-mode". These drivers are superior because they are the fastest available drivers.