I've seen numerous tutorials on how to create a "strong" password. This makes me laugh. These titles imply "one" password, which is wrong in and of itself. A person should have many passwords, all different, and all extremely long. People may ask how they're supposed to remember lengthy passwords and why their current password isn't good enough. Well, I'm going to show you.
Most indie game developers will never see a million dollars in their bank accounts, and I certainly doubt that Eul, the anonymous developer responsible for the original version of Defense of the Ancients (DotA), expected to. But now even the fans can earn a little green. Some lucky and talented DotA players are about to win $1,000,000 for playing the unreleased sequel to the free unsupported Warcraft III mod from 2003.
One of the coolest things about Twitter is the fact that you can get direct access to some of your favorite celebrities, and have one-on-one conversations with them in less than 140 characters. With Google+, you can have the same advantage, but you don't need to feel constricted by the 140 character limit. Although Google+ has been weeding out fake accounts, they do not currently have a system for celebrities to verify whether their accounts are legitimate or not.
Dactyloscopy isn’t going anywhere. Forensic science has much relied on fingerprinting as a means of identification, largely because of the massive amount of fingerprints stored in the FBI’s biometric database (IAFIS), which houses over 150,000 million prints. And thanks to the departure of messy ink-stained fingertips, biometric analysis isn’t just for solving crimes anymore.
Mark Burnett is, financially speaking, perhaps the most successful television producer today. While I had launched America's Most Wanted and COPS a decade earlier, Mark exploded onto network television with Survivor, the glossy and fantastical innovation to reality television. With Survivor now entering its 11th year, I recently interviewed Mark at the Los Angeles public radio station KCRW, where the podcast will be made available. Below, Mark's 10 steps from soldier-to-nanny-to-premiere-Holl...
Halloween just isn't Halloween without Jack O'Lanterns. Below, anything and everything you need to know on the art of pumpkin carving.
Propaganda and indoctrination at it's peak. My friends, today, when I was browsing through the net for news, I noticed something on MSNBC. It was a very short article, with a title that just wasen't true. Before talking about it, let me tell you why this is important.
Earlier in the week, Obama’s attorney general stated something that is quite alarming. “In this hour of danger, we simply cannot afford to wait until deadly plans are carried out, and we will not,” Eric Holder said during a speech at Northwestern University’s law school in Chicago. It's a very ambiguous statement. Why do people talk like this? Why can't they just talk straight to the point? Well, most of the time it's to hide something. Take a look at this video: What do you think of that! Th...
I was able to interview a counselor. I wanted to know some of their opinion on stress. The following are the response I gather.
1.) If you do not know something, keep our mouth shut.* No-one, I repeat no-one, is interested in your uneducated guesses about why something is the way it is, or why someone did something a certain way. At best, you will trick them into temporarily thinking you know what you’re talking about. At worst, you will convince them that you are speaking the truth and they will perpetuate your bullsh*t to others. Do not contribute to making the world a more foolish place just because you had to say ...
Reverse shells are useful for issuing commands to a remote client when the client is behind something such as a NAT. You might say, "But can't a normal shell or simple SSH tunnel do the same thing?". No, it can't. All over the internet I see a lot of confusion regarding the difference between a normal shell and a reverse shell. Let's clear this up before we get started.
Carol Baldwin-Moody of Wilmington Trust describes the challenges that are present in her line of work as senior vice president and chief risk officer. There is a strong legal backing to every major issue in today’s society. Baldwin-Moody has come across several scenarios that aren’t covered by the dated constitutional law in effect today. In past years, a risk officer was thought to be a management concept that would be useful, but not worth the investment. Lately, a risk officer career has b...
This Null Byte is the first part in a mini-series on the art of Social Engineering. I will be teaching you how to effectively defend yourself against it.
Like the recent XSS 0day exploit found in the Mac and Windows versions of Skype, a similar one has been found in the Skype app for iPhone. The vulnerability allows an attacker to send a message that contains malicious JavaScript code in the "Name" parameter. This code can steal your phonebook, crash the app, and potentially do a lot worse. The URI scheme is improperly identified for the web-kit browser. Instead of going to a blank browser page, it defaults to "file://". The code could steal a...
Exploring a new city is tough if you're all by your lonesome. But if you have your iPhone on you, you're not alone at all... there's tons of great apps available for discovering the city around you. We've previously featured an app that helps you decide on what bar or club to attend, as well as one that shows you the hidden world unbeknown to most tourists (sometimes even the local population). When it comes to dining out, Yelp helps considerably, but it doesn't provide you with personalized ...
I found this site by looking for a how to make whipped soap. I was looking for ideas for a mans soap. We all know men use it but they don't buy it. Not Usually but their ladies love to buy things for them. I know I love to create things my sweat heart can use and is good for him. He loves to try some of the things I make. He is my Ginny Pig and a good sport as well.
We've all done it. You're sick. You don't want to go to the doctor so you just Google it. Soon, you've perused dozens of websites with conflicting information, you're no better informed than when you started, and your confusion makes you feel worse about your predicament. Would you have been better off not Googling in the first place?
Warning If you don't trust that these steps are safe or that they won't work, than have your computer/laptop backed up so you can restore it if necessary.
We were invited to my Wife's Cousins house for Thanksgiving Dinner and I wanted a unique but fabulous dessert. I had Doug find us a recipe and this is what he came up with. It is a Pumpkin Bread Pudding with a caramel whiskey sauce. By that, I mean a Bread Pudding made with Pumpkin Bread, that has a cramel Bourbon sauce drizzled over it when its done. This required that we find a good recipe for Pumpkin Bread. I also put Doug on this bit of research and he came up with a whopper of a recipe. ...
National Geographic recently published a retrospective of the lovely Jane Goodall, one of the world's most accomplished conservationists. The feature includes every image of Goodall to ever appear in the magazine for the past fifty years.
How do we really come to the decisions that we make? Is it just flip a coin and hope for the best or is there some underlying procedure that we go through, consciously or unconsciously, that guides our course of action?
1. Extend your engagement. A longer planning period means a better chance of getting the best vendors in your price range. Plus, you can typically lock in rates that might increase by the time your wedding date arrives.
Anonymity is very important to many internet users. By having your "e-identity" exposed online, you can be stuck with a number of unwanted issues, such as:
Tonight is the night. Christmas Eve. The night where Santa Claus and his trusty reindeer soar across the skies to deliver presents to all the good little boys and girls around the world. But tell me— do you know where Santa Claus is right now?
This how-to is aimed at the uncynical, bright-eyed outsider who wants to become a television producer…the talented person who believes he or she has the ‘it’ to crack Hollywood. The ‘Sammy’ who just arrived in 90210.
Jackass can try bungee jumping from an awesomely tall building but instead of having the normal bungee gear..y'all can make it out of cloth.
Smartphones are crazy awesome. You can do your banking, track your children, find directions, and even pretend to have a mustache. The only thing that these personal supercomputers are missing is physical interaction with the environment.
There is a secret world hidden just beneath the surface of every pond, lake, and stream. Those waters are filled with wails of hideous creates murdering other hideous creatures for food and sport. Beautiful animals like dragonflies and damselflies that you see in the light of day start their lives in this sparse spartan hellscape. Luckily, being giant mammals, we can pluck these creatures from the depths and look at all of their cool behaviors! All you need is a pond, net, and curiosity.
In this article, I'll show you how to build a coil gun. A coil gun is a device that fires magnetic projectiles at high velocities, using electricity. Coil guns require no explosive propellant, therefor can be fired an infinite amount of time, providing that there is ammunition and available electricity.
L.A. Noire is the newest Rockstar (GTA4, Red Dead Redemption) game created by Team Bondi ( The Getaway). The game is set in the late 1940’s in Los Angeles. The main character, Phelps, is a war veteran rising through the ranks from police officer to detective. The game is presented in mini episodes (one case per episode) and flashbacks. Once you finish a case, you go straight to the next one. Having played four cases where the character moves from police officer to detective, here are my initi...
No game is perfect. Well maybe except for Super Mario Brothers 3. In the last two posts I've been praising Tera but it's not without its shortcomings.
In December 2009, Angry Birds was released to the public. The iPhone and iPod touch were the first to take on the demand, then a devoted HD version for the iPad. Since then, it's transcended iOS devices to appear on Android, Nokia, Palm phones, and many others. Next, it broke away from mobile devices with versions available on PSP, PS3, Xbox 360, Wii, Nintendo DS, 3DS, Windows PC and Mac computers. Facebook and Windows Phone 7 apps are in the works.
No time for elaborate practical jokes this April Fool's? Not a problem, it's 2011—meaning, apps can do just about anything these days. Measure beauty, check for STDs, even fix late night drunken social media stupidity. So why not pranks? Below, 10 digital solutions for your April Fool's Day wickedness.
So your mom may have told you not to spoil your appetite with that chocolate chip cookie you were eating before dinner, but did you ever think about what that energy drink your sipping on looks like in terms of its sugar content? The article "20 Worst Drinks in America" takes a look at what is hiding in that sinfully sweet soda. You may not ever dream of eating 6 Krispy Creme glazed donuts in one sitting but thats how much sugar you are putting in your body when you have a 16 oz Rockstar Ener...
Make this Valentine's Day one to remember! Well... because you forgot. But don't worry, you can still make that heart pitter-patter for your love by saving face and getting some last minute Valentine gift ideas on the cheap. There's no reason to shop at Hallmark or buy expensive jewelery—just use your heartwarming ingenuity to make those cheeks blush.
The last few months of WikiLeaks controversy has surely peaked your interest, but when viewing the WikiLeaks site, finding what you want is quite a hard task.
Pranks are fun, but finding a way to maximize the affect of a prank can be tricky. Toilet papering the whole campus or repainting all of the parking spaces slightly smaller can take a long time and a lot of resources. A better plan of attack is to booby trap the choke points where your victims are forced to pass through. Think like a guerrilla. A dorm doorway is a good idea.
Social engineering is described as the clever manipulation of the natural tendency of human trust. All of the passwords, locks, and encryption in the entire world are useless against a good social engineer who can charm or trick you into giving it up.
If you're hungry, eat now, because this list is probably going to put you off consuming vittles for so long that you'll end up looking like the love child of Nicole Richie and Skeletor. Now that you've been officially warned, help me count down the ten most WTF food items on this beautiful blue marble we call Earth.
We had a blast during last week's social engineering calls. One of our attending social engineers was so clever that she convinced several people on Craigslist that lost items were hers, even if it seemed she couldn't be trusted. But females are better social engineers, naturally. Some say that females have a special knack for manipulating men, but I think that's preposterous. I can't see why that would be true in a million years (note my sarcasm).