T Hesitate Search Results

How To: Use Android Device Manager to Find, Wipe, & Lock Your Android Phone or Tablet

If you haven't heard yet, Google made it possible a couple months ago for every Android user running 2.2 or higher to track his or her smartphone or tablet using their Android Device Manager service. It's a super easy way to track, lock, and secure erase your Android device from the web without ever having to download a third-party application, like Droid Finder, since it occurs in the background via Google Services.

Social Engineering: How to Use Persuasion to Compromise a Human Target

Social engineering makes headlines because human behavior is often the weakest link of even well-defended targets. Automated social engineering tools can help reclusive hackers touch these techniques, but the study of how to hack human interactions in person is often ignored. Today, we will examine how to use subtle, hard to detect persuasion techniques to compromise a human target.

How To: Attack on Stack [Part 1]; Smash the Stack Visualization: Introduction to Memory, Registers and Assembly.

Hi everyone. Recently I've been studying some topics about Assembly, memory and exploitation, and thought I could write something nice, easy and fast about it, just because I like to share what I learn, and probably sharing what you learn and trying to explain it to a stranger is the best way to learn it better. It worked for me, and I hope it will be useful for you too.

How To: The White Hat's Guide to Choosing a Virtual Private Server

Conducting phishing campaigns and hosting Metasploit sessions from a trusted VPS is important to any professional security researcher, pentester, or white hat hacker. However, the options are quite limited since most providers have zero-tolerance policies for any kind of hacking, good or bad. After researching dozens of products, we came out with 5 potentials that are ideal for Null Byte readers.

Guide: Privacy Matters

Greetings all. Today I intend to append a new series to my mini-collection of posts. This series will consist of informative guides for the purpose of depicting certain aspects of the White Hat profession that I believe are of profound importance. Furthermore, I will keep this series simple for everyone to follow, regardless of your tech level. So without further ado, let's get right into it.

How To: Fake Captive Portal with an Android Phone

Have you ever used an open wifi, which after you connect displays a website to enter your credentials to get internet? That website is called captive portal and widely used in airports, hotels, universities etc. Have you ever wondered what would happen if someone would set up an open wifi with the same name displaying a very similar web page asking for credentials? Usually if there are multiple wifi networks with the same name and encryption, devices only display the one with the highest sign...

How To: Survive and Thrive in the Victorian Era

I don't know how many of you had this experience in your youth, but when I was a kid, I used to actively think about what would happen if I suddenly woke up in a fantasy land, or were to pass through a portal into another space and time. I knew it wouldn't really happen, but when you're a kid, these can be important issues to you. So I slept with my glasses on every night, just in case. Photo from George Pal's The Time Machine.

How To: Android CyanogenMod Kernel Building: Monitor Mode on Any Android Device with a Wireless Adapter

Hi, everyone! Recently, I've been working on a pretty interesting and foolish project I had in mind, and here I'm bringing to all of you my findings. This guide's main aim is to document the process of building an Android kernel, specifically a CyanogenMod kernel and ROM, and modifying the kernel configuration to add special features, in this case, wireless adapter Alfa AWUS036H support, one of the most famous among Null Byters.

Hammock - Breathturn (DP: Larkin Seiple)

I hesitate to even post screengrabs from this piece.  The storytelling by this creative team (dir. David Altobelli & DP Larkin Seiple) is so perfect that taking stills out of context doesn't do it justice.  At first, I was disappointed that the automatic thumbnail Vimeo chose was so nondescript but ultimately it's for the best.  Here's just a tease:

How To: Light up a lighthouse in a photo using Photoshop

In this video tutorial we will see how Stuart Little "lights up" a lighthouse inside a photo. You will learn how to use the lighting filter command within Photoshop to do the trick. After learning it, don't hesitate to experiment on "lighting" other buildings! Click on the screenshot of the video and it will generate a larger pop-up of the actual video. Light up a lighthouse in a photo using Photoshop.

News: My Introduction

My name is Elvis. I'm from Film & Theatre Arts charter high school. I'm in this world to help people become better poets/writers. I'm going to help Serigo make this world better, adding different things, and giving advice on how to express yourselves better. I'm also going to be putting up some of my own stuff wether it's poetry or music, I've made myself. I'm heard to help so if anything is need don't hesitate to ask.

Butler: The Ultimate Time Saving App for Mac

As a follow up to my article 10 Time Saving Menu Bar Applications for the Mac, this video covers Butler, one of my favorite menu bar applications. Produced by ManyTricks.com, Butler can help you quickly launch applications, websites, and other items on your Mac. It also includes a web search feature, a clipboard manager, a hot key launcher, and much more.

Words and Stuff: Zine Reviews

Curious about the newest obscure zines to hit the streets? Words and Stuff is a great website full of reviews on zines (mostly in the punk, politics, eroticism, and art arena) that either give the thumbs up or the thumbs down on what's worth purchasing.

News: Run USB through phone lines

One of the many reasons Circuit City should go out of business is their sale of ridiculously expensive cables, wire and cords. The secret to the industry of Monster Cables is that it is unnecessary and ineffective. Gold-plated or otherwise, Monster's $100 cables are not intrinsically better than the cheaper versions they're stocked next to. Don't believe us?