Sensitive Search Results

How To: Noob's Introductory Guide to Hacking: Where to Get Started?

There is a vast amount of knowledge out there on computers! In fact, it is so vast that no single person could ever possibly ever learn everything there is to learn about hacking or computers in general. People usually specialize in a certain field: cryptography, computer security, networking, software development, testing, and so on...It's probably a bit premature to decide what you want your speciality to be, but keeping the question in the back of your mind will help give you direction in ...

How To: Encrypt your Skype Messages to Thwart Snooping Eyes Using Pidgin

Skype is a great service. It allows a free solution for VoIP to VoIP calls, and cheap VoIP to landline calling. However, a very disturbing, little known fact that might push you away from Skype does exist. If you closely read the terms of service agreement, it clearly says that Skype is allowed to decrypt your messages whenever they please. Here at Null Byte, we tend to enjoy our anonymity, don't we?

News: The Good and the Ugly of Console Controller Add-Ons

Video game controllers are our windows into the soul of the machine, our sole means of interacting with them. More often than not, consumers seem displeased by their controllers; it's comforting to blame sticky, poorly laid out buttons for messing up your game than your own lacking skills. The original "fatty" Xbox controller was so large it caused mass consternation and prompted Microsoft to replace it with a smaller version in a matter of months.

How To: Don't Get Caught! How to Protect Your Hard Drives from Data Forensics

With the mass arrests of 25 anons in Europe and South America, and the rumors of an FBI sweep on the east coast of America floating around, times look dicey for hackers. Over the past few days, a lot of questions have been posed to me about removing sensitive data from hard drives. Ideas seem to range from magnets to microwaves and a lot of things in-between. So, I'd like to explain a little bit about data forensics, how it works, and the steps you can take to be safe.

Making Electromagnetic Weapons: The Theory Behind EMP Generators

This is the third part of my electromagnetic pulse series (see Part One and Part Two). By now, I've covered the hardware and general concept of electromagnetic pulse generators, but how exactly do they disable electronics? How can an invisible field of energy have such a catastrophic effect on computers, cell phones, and most any other electronics? I'll be answering all these questions in part three of Making Electromagnetic Weapons.

Weekend Homework: How to Become a Null Byte Contributor (1/29/2012)

We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials on any skill level, and about anything you feel like sharing that...

Weekend Homework: How to Become a Null Byte Contributor (1/12/2012)

We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials of any skill level, about anything you feel like sharing that is ...

How To: Defeat SSL in Practice with SSL Strip

SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, whenever you see "https://" in front of the URL in your browser, you know you're safe... or are you?

News: Protect Your Dropbox Files from Prying Eyes (+ 2 Alternative File Hosting Options)

Dropbox continues to make headlines with their recent programming blunder which left the accounts of its 25 million customers wide open during a four-hour time span. During the duration, anyone in the world could access any Dropbox profile by typing in any password. And seeing as this wasn't the first security failure, everyone, including the most loyal users are considering dropping the Dropbox.

News: So You Just Bought Your First DSLR. Now What?

Moving up from a point and shoot to a digital single lens reflex camera is a big step. And actually, a DSLR can be a better buy than a new point and shoot, many of which rival the prices of entry level or used DSLRs. Keep in mind when you buy a new body, the lenses are the most important elements. Once you start investing in them, it makes it much harder to switch brands. So if it isn’t too late, do some research.

HowTo: Read Your Own Mind

The days of trundling hoops, hopscotch and painted wooden rocking horses are long since past. The latest trend in toys? Biofeedback. Electroencephalography. A decade into the 21st century, the toy market is awash in products that incorporate functional neural sensors.

How To: Bypass Windows and Linux Passwords

If you're interested in bypassing Windows and Linux passwords, there is a great tool from the good people at Kryptoslogic. Have you ever forgotten your administrator password? Have you ever bought a used computer with a password on it? Well, Kryptoslogic have created a boot-disc call 'Kon-Boot', which allows you to bypass any Windows 32 or 64 bit OS, as well as Linux passwords. There is both a paid and freeware version available.

How To: Who Is Anonymous? How the Wall Street Journal and the NSA Got It Wrong

Over the past couple of weeks, there have been a series of high-profile hacks and leaks. From the rooting of CombinedSystems, to a secret FBI conference call leak, all the way to the distributed denial-of-service (DDoS) attacks on U.S. government sites—with a lot in-between. As governments move to close their long fingers around the free speech that exposes their secrets, this shadowy collective of loose-knit, but like-minded individuals are hell bent on preventing them. Or are they?

News: The Value and Worth of Daily Positive Affirmations

I've been dealing with emotional difficulty for many years. It started when I had surgery for the epilepsy I was dealing, and quite literally, dying with. Since the surgery on March 28, 1990 I have had no seizures, but I have had plenty of emotional difficulty. Along with that, surviving some traumatic events has added some emotional baggage...in other words struggling...along the way.

News: Building-Sized Überorgan Emits Heavenly Music and Farts

Tim Hawkinson is an artist who truly inspires. The Los Angeles based artist creates complex, whimsical sculptures with simple mechanics and basic materials. One of his most notable pieces is the art-world-renowned "Uberorgan", a giant football field sized, fully-automated bagpipe, cleverly constructed with plastic sheeting and pieces of electrical hardware.

How To: Use the control panel with InDesign CS3

This video shows you how to use the new context-sensitive control panel in InDesign to access frequently-used editing features without opening additional panels. You learn how control panel options adapt to the type of object you select, such as an image, text, or table. Check out this video created by Adam Pratt now! Use the control panel with InDesign CS3.

News: All-for-One & One-for-All

This stunt involves the entire Jackass Crew wearing nothing but speedos and connected by ropes that are attached to them by the waist one-by-one like a linked chain. The length of the rope should be roughly 2-3ft long separating each person. A ledge or platform about 1ft in width can be either wood planks or some type of industrial metal, if all of their weight won’t be able to support the wood. This platform is sitting over a pool by a couple of feet. Inside of the pool is some kind of disgu...

Next Page