Last time, we looked at archaic cryptography, so you should have a basic understanding of some of the concepts and terminology you'll need. Now, we'll discuss one of the most important advances in computer security in the 20th century—public key cryptography.
I recently posted a link to what seemed to be a very useful guide on Lifehacker for creating a TOR button in Chrome. However, when I tried it myself, it did not work. Also, it lacked a warning on the limits of Tor, which I think are important. Therefore, I decided to create an updated and more comprehensive tutorial.
Are you the expert hacker we're looking for? Do you have a great idea for an article on Null Byte? Do you have a passion to write, and more importantly... teach?
We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials on any skill level, and about anything you feel like sharing that...
When it comes to webcams these days, most people are using their laptops over desktops. The cameras are centered, integrated, and require no configuring. They're a cinch and usually have great resolution. So, then what do we do with all of those old wired desktop webcams that we've accrued over the years? Even if you still use an external USB one, chances are you're not using it daily, so why not come up with a better use for it?
Lock picking is defined by locksmiths as "the art of opening a lock without the key". There's many ways to accomplish this, but I'm specifically interested in using a lock pick set. Since locks vary in shapes and size, it's better to stick with just one kind of lock at first. Most locks are based on fairly similar concepts, so sharing methods across locks is possible.
I'm sure we've all heard about MSN and Yahoo! Messenger, right? They can be useful, but the setup can be quite time consuming for those who need to use it just once or twice—and the privacy statements are a real bother. For example, we must provide our real details. You could use Fake Name Generator, but if you get caught, you will have your account suspended. I don't have a law degree, but to my understanding the United States recently passed legislation that gives the authorities the power ...
In this article, I'll show you how to make a portable prank stun-baton. Powered by static electricity, simply charge up the baton, and discharge it for a static surprise. The concept behind this device ties in with Leyden jars, and their tendencies to retain static electricity.
Here's a nasty little Null Byte. An open redirect vulnerability was found in both Facebook and Google that could allow hackers to steal user credentials via phishing. This also potentially allows redirects to malicious sites that exploit other vulnerabilities in your OS or browser. This could even get your computer flooded with spam, and these holes have been known about for over a month.
When it comes to social engineering, Null Byte is here to show you how it's done. Social engineering is the key fundamental to unlocking tons of possibilities and opportunities in your everyday life. So, what is social engineering? Social engineering can be called many things. It's taking nothing and turning it into something. It's taking the bad and making it good. Above everything else, it's the art of manipulating the world and people around you—coercing that salesman into giving you a low...
If you have made the switch from Windows to Linux, I want to congratulate you in advance. I'm sure you have noticed a huge performance increase when using Linux over other operating systems. This is only half the battle, though! Most users who are new to Linux end up using Ubuntu. I have no gripes with Ubuntu, but I do not agree with their philosophy. It almost mimics Windows. Ubuntu favors ease of use, and despite valiant efforts by the development team thus far (Ubuntu is crazy fast), all o...
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills.
Gone are the days when you had to carry a clunky DynaTAC to make phone calls, pocket phone book for you contact list, Sony Discman for your tunes, and wallet for you cash and credit cards. Today, all you need is your smartphone. To be specific, Google's Nexus S 4G on Sprint.
Since PDF files are so popular in both our daily life and work, we see them everywhere. And sometimes we find there are terrfic images or text in the PDF files and we want to save them as seperate files for future use, such as in a presentation or post. Here's the question: how can we save those elements from the non-editable file formats?
Carpe Fulgur translates to something along the lines of "Seize the Lightning" in Latin. Sometimes that is enacted with golf clubs by idiots. But the three intrepid indie video game localizers who work under that name are trying to do it the right way: metaphorically. They are translating and publishing Japanese games for the Americans market—games that have seldom been seen before because every other company thinks it's mad to release them here.
Different genres of social media have changed the world, but they are not omnipotent. In most cases this is a good thing, but not in the case of Operation Rainfall. It has been a purely well meaning social media movement that should have led to a great boon for the North American gamer public, but instead has served as a reminder of how stone aged Nintendo of America's (NOA) corporate thinking remains.
Three years ago, Double Fine productions held an in-house event called the Amnesia Fortnight. The company was split into four teams, each of which set out to spend two weeks developing an idea for a small game and present it to the other groups at the end of the duration. All of the ideas turned out to be winners, and founder/owner Tim Schafer secured publishing deals for all four games to be released on a combination of XBLA and PSN. In honor of the excellent Trenched becoming the third game...
Do you know how you are perceived by your peers? In real life and online? In the physical world, you could be seen as intelligent, thoughtful and hard-working, but on the Web you could be looked at as irrational, selfish and slothful. There's just something about the Internet that takes away a person's judgement and replaces it with impulsiveness—especially when it comes to Facebook.
Aside from food, oxygen, sunlight and water, there are other necessities that humans arguably need today to survive—clothing, love and shelter among them. Almost everyone wears clothes, needs somebody (or something) to love and a place to call home. And what's the one thing that connects all three? Something we all have? Keys.
Takoyaki, a very popular Japanese street food, is a spherical dumpling with grilled octopus. What's fun about cooking is that you don't always need to follow the classic recipe for things. I wanted to take this humble snack and turn it into something a little more decadent. Mine includes scallop, foie gras, dried mushrooms, and caviar. Here's what you'll need:
ATTENTION COLLISION REPAIR INDUSTRYHave you ever put your stud in your stud gun to repair a dent and the stud falls out before it reaches the panel? Sure it has, it has happened to all of us. However, the new Magna-Spot eliminates this problem with their exclusive (MPS), which secures the pins in the electrode. You can read the press release below to learn more of the benefits.ENTER AND WIN THE NEW MAGNA-SPOT STUD GUNDetails to this contest are going to be revealed in layers as follows:
If you want to install laminate flooring on your stairs I would recommend that you do a lot of research and find the information you will need to do it correctly. Installing laminate flooring on stairs can be tedious and time consuming and is a lot different than installing laminate flooring on a floor.
Student group hopes to keep bikes on campus By Conrad wilton · Daily Trojan
Microsoft SharePoint is a business management system introduced by MICROSOFT. It has many build in functions to work in web based environment easily. Microsoft SharePoint 2010 is released on April 17, 2010. It is introduced with the promise of better performance than its predecessor version for both developers and IT professionals. It is entitled as “Business Collaboration Platform for the Enterprise and The Web”.
This one smells like a fish story. It is not. Tuesday April 13, Dave and I got up to surf westward at 7 in the morning. First rate waves. Headache cold water....sun blocked by the cliffs. Fast, clean, beach break. 3-4 foot sets, mostly lefts. About 15 dolphins swam by. Blase blase. We always see dolphins. But then some bigass whale with barnacles breaches. We are speechless. It is about 20 feet from us. We follow it for about thirty seconds and pinch ourselves. Have-you-ever? No...
Every summer my husband and I plant a tomato plant. We do this to enjoy the plump red tomatoes right off of the vine.
To use a circular embroidery guide on a sewing machine, loosen screw at back of the presser foot ankle just enough to insert a circular embroidery guide from left. The radius of the circle is determined by placement of the guide in the holder. Secure the guide with a screw. Place the stabilizer under fabric. Mark the center point on fabric with marking pen. Align the center of the fabric with the rubber point of the circular embroidery guide. Put a flat tack under the fabric and up through th...
Moving a 2000 pound safe isn't easy... I was working as manager for a construction company that was performing an up fit on a century old building in downtown Concord, N.C. The owners wanted us to move a two thousand pound (that's a ton!) safe up to the second story so that it could be displayed in their new office. The safe was located between the first and second floors in a small office that was used for accounting purposes in the old days when said building had been a hardware store.
Collision Repair Related Careers When you think of a career in collision repair you probably think of a body repair or paint technician. However, there are a lot of related careers that collision repair can lead to. For Example, you can work in auto parts stores, dealerships, insurance companies, paint representatives, trainers, etc. In this article we are going to examine a career as an auto estimator.
James from Handsome Alvin, the Australian, acoustic duo band who perform in pubs and clubs around Brisbane, wants to teach you an acoustic guitar lesson.
If you are having a bad hair day or just don't feel like putting in the time to do your hair, a French braid is the perfect remedy. It is chic and easy to do. Follow these easy steps and you are all set. Brush out your hair
"Boho" hair is natural and free-flowing and doesn't take a lot of time or tools. Often this look is a result of sleeping or a day at the beach. Here we show you how to achieve that look without doing either! Part
A Self-Protection Guide 1) You can help protect yourself from violent crimes.
If you are a pet owner, going on vacation can be stressful. Usually, you need a friend or neighbor to come over everyday and feed your pets. However, by enslaving robots you can keep your pet happy and enjoy a stress-free holiday.
Spring has sprung, which means it's time to plant all those delicious vegetables and lucrative cash crops. If you are like me, every year you meticulously plan every aspect of your garden before dutifully neglecting it all summer. I decided enough was enough and built this simple automatic watering system.
Dreams are like an internal human holodeck. Inside your mind, anything is possible, from your grandest wishes to your worst nightmares. This is all well and good, but what if you could control your dreams and become the omniscient god of a handpicked reality whenever you go to sleep? Inception took this idea to the logical extreme by invading other people's dreams.
For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. Before someone can learn how to root a box, they need to learn how not to be found. I can not stress that point enough.
As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt and decrypt as you need. GPG is a great open-source version of Pretty Good Privacy (PGP), a similar application used for encryption, but licensing and patent problems led to the development of GPG in its wake.
There are so many hackers around these days, and they are becoming very smart. So smart that they have successfully taken down many government websites. The most recent attack was on the Department of Justice (DOJ). To read about the history of these hackers, check out Wikipedia.
Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm here to teach you how to create a general encrypted container—not the complex hidden TrueCrypt volume.