Secure Australian Search Results

Weekend Homework: How to Become a Null Byte Contributor (2/10/2012)

We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials on any skill level, and about anything you feel like sharing that...

News: Catch Creeps and Thieves in Action: Set Up a Motion-Activated Webcam DVR in Linux

When it comes to webcams these days, most people are using their laptops over desktops. The cameras are centered, integrated, and require no configuring. They're a cinch and usually have great resolution. So, then what do we do with all of those old wired desktop webcams that we've accrued over the years? Even if you still use an external USB one, chances are you're not using it daily, so why not come up with a better use for it?

How to Pick Locks: Unlocking Pin and Tumbler Deadbolts

Lock picking is defined by locksmiths as "the art of opening a lock without the key". There's many ways to accomplish this, but I'm specifically interested in using a lock pick set. Since locks vary in shapes and size, it's better to stick with just one kind of lock at first. Most locks are based on fairly similar concepts, so sharing methods across locks is possible.

How To: Remain Anonymous and Chat Securely with Cryptocat

I'm sure we've all heard about MSN and Yahoo! Messenger, right? They can be useful, but the setup can be quite time consuming for those who need to use it just once or twice—and the privacy statements are a real bother. For example, we must provide our real details. You could use Fake Name Generator, but if you get caught, you will have your account suspended. I don't have a law degree, but to my understanding the United States recently passed legislation that gives the authorities the power ...

How To: Make a Prank Stun-Baton

In this article, I'll show you how to make a portable prank stun-baton. Powered by static electricity, simply charge up the baton, and discharge it for a static surprise. The concept behind this device ties in with Leyden jars, and their tendencies to retain static electricity.

News: Flaw in Facebook & Google Allows Phishing, Spam & More

Here's a nasty little Null Byte. An open redirect vulnerability was found in both Facebook and Google that could allow hackers to steal user credentials via phishing. This also potentially allows redirects to malicious sites that exploit other vulnerabilities in your OS or browser. This could even get your computer flooded with spam, and these holes have been known about for over a month.

How To: Social Engineer Your Way Into an Amusement Park for Free

When it comes to social engineering, Null Byte is here to show you how it's done. Social engineering is the key fundamental to unlocking tons of possibilities and opportunities in your everyday life. So, what is social engineering? Social engineering can be called many things. It's taking nothing and turning it into something. It's taking the bad and making it good. Above everything else, it's the art of manipulating the world and people around you—coercing that salesman into giving you a low...

News: Performance Hacks & Tweaks for Linux

If you have made the switch from Windows to Linux, I want to congratulate you in advance. I'm sure you have noticed a huge performance increase when using Linux over other operating systems. This is only half the battle, though! Most users who are new to Linux end up using Ubuntu. I have no gripes with Ubuntu, but I do not agree with their philosophy. It almost mimics Windows. Ubuntu favors ease of use, and despite valiant efforts by the development team thus far (Ubuntu is crazy fast), all o...

How To: Extract Images and Text From PDF Files

Since PDF files are so popular in both our daily life and work, we see them everywhere. And sometimes we find there are terrfic images or text in the PDF files and we want to save them as seperate files for future use, such as in a presentation or post. Here's the question: how can we save those elements from the non-editable file formats?

News: Seize the Lightning! Carpe Fulgur Imports Japanese Indie Games to the U.S.

Carpe Fulgur translates to something along the lines of "Seize the Lightning" in Latin. Sometimes that is enacted with golf clubs by idiots. But the three intrepid indie video game localizers who work under that name are trying to do it the right way: metaphorically. They are translating and publishing Japanese games for the Americans market—games that have seldom been seen before because every other company thinks it's mad to release them here.

News: Operation Rainfall Fails to Secure Great RPGs for America... For Now

Different genres of social media have changed the world, but they are not omnipotent. In most cases this is a good thing, but not in the case of Operation Rainfall. It has been a purely well meaning social media movement that should have led to a great boon for the North American gamer public, but instead has served as a reminder of how stone aged Nintendo of America's (NOA) corporate thinking remains.

News: Friday Indie Game Review Roundup: An Amnesiac Retrospective

Three years ago, Double Fine productions held an in-house event called the Amnesia Fortnight. The company was split into four teams, each of which set out to spend two weeks developing an idea for a small game and present it to the other groups at the end of the duration. All of the ideas turned out to be winners, and founder/owner Tim Schafer secured publishing deals for all four games to be released on a combination of XBLA and PSN. In honor of the excellent Trenched becoming the third game...

How To: Protect Your Facebook Reputation with Reppler

Do you know how you are perceived by your peers? In real life and online? In the physical world, you could be seen as intelligent, thoughtful and hard-working, but on the Web you could be looked at as irrational, selfish and slothful. There's just something about the Internet that takes away a person's judgement and replaces it with impulsiveness—especially when it comes to Facebook.

Takoyaki: Decadent Japanese Street Food with Foie Gras and Caviar

Takoyaki, a very popular Japanese street food, is a spherical dumpling with grilled octopus. What's fun about cooking is that you don't always need to follow the classic recipe for things. I wanted to take this humble snack and turn it into something a little more decadent. Mine includes scallop, foie gras, dried mushrooms, and caviar. Here's what you'll need:

News: COLLISION BLAST – MOTOR GUARD MAGNA-SPOT CONTEST

ATTENTION COLLISION REPAIR INDUSTRYHave you ever put your stud in your stud gun to repair a dent and the stud falls out before it reaches the panel? Sure it has, it has happened to all of us. However, the new Magna-Spot eliminates this problem with their exclusive (MPS), which secures the pins in the electrode. You can read the press release below to learn more of the benefits.ENTER AND WIN THE NEW MAGNA-SPOT STUD GUNDetails to this contest are going to be revealed in layers as follows:

News: Microsoft SharePoint 2010

Microsoft SharePoint is a business management system introduced by MICROSOFT. It has many build in functions to work in web based environment easily. Microsoft SharePoint 2010 is released on April 17, 2010. It is introduced with the promise of better performance than its predecessor version for both developers and IT professionals. It is entitled as “Business Collaboration Platform for the Enterprise and The Web”.

News: OMG. Surf then touch a Bigass Whale at Westwards

This one smells like a fish story.  It is not.  Tuesday April 13, Dave and I got up to surf westward at 7 in the morning.  First rate waves.  Headache cold water....sun blocked by the cliffs.  Fast, clean, beach break.  3-4 foot sets, mostly lefts.  About 15 dolphins swam by.  Blase blase.  We always see dolphins.  But then some bigass whale with barnacles breaches.  We are speechless.  It is about 20 feet from us. We follow it for about thirty seconds and pinch ourselves.  Have-you-ever?  No...

How To: Use a circular embroidery guide on a sewing machine

To use a circular embroidery guide on a sewing machine, loosen screw at back of the presser foot ankle just enough to insert a circular embroidery guide from left. The radius of the circle is determined by placement of the guide in the holder. Secure the guide with a screw. Place the stabilizer under fabric. Mark the center point on fabric with marking pen. Align the center of the fabric with the rubber point of the circular embroidery guide. Put a flat tack under the fabric and up through th...

How To: Move A Safe

Moving a 2000 pound safe isn't easy... I was working as manager for a construction company that was performing an up fit on a century old building in downtown Concord, N.C. The owners wanted us to move a two thousand pound (that's a ton!) safe up to the second story so that it could be displayed in their new office. The safe was located between the first and second floors in a small office that was used for accounting purposes in the old days when said building had been a hardware store.

How To: Earn An Income By Writing Auto Repair Estimates

Collision Repair Related Careers When you think of a career in collision repair you probably think of a body repair or paint technician. However, there are a lot of related careers that collision repair can lead to. For Example, you can work in auto parts stores, dealerships, insurance companies, paint representatives, trainers, etc. In this article we are going to examine a career as an auto estimator.

How To: French Braid Your Hair

If you are having a bad hair day or just don't feel like putting in the time to do your hair, a French braid is the perfect remedy. It is chic and easy to do. Follow these easy steps and you are all set. Brush out your hair

How To: Style Easy Boho Hair

"Boho" hair is natural and free-flowing and doesn't take a lot of time or tools. Often this look is a result of sleeping or a day at the beach. Here we show you how to achieve that look without doing either! Part

News: Anonymity, Darknets and Staying Out of Federal Custody, Part Three: Hidden Services

For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself. As always here at Null Byte, we are trying to make that happen. Before someone can learn how to root a box, they need to learn how not to be found. I can not stress that point enough.

Uncrackable: Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt and decrypt as you need. GPG is a great open-source version of Pretty Good Privacy (PGP), a similar application used for encryption, but licensing and patent problems led to the development of GPG in its wake.

How To: Encrypt Your Sensitive Files Using TrueCrypt

Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm here to teach you how to create a general encrypted container—not the complex hidden TrueCrypt volume.