This week's crop of Snapchat lenses is jam packed with pop culture, and spot-on examples at that. Post Malone and Famous Dex are super hot right now, and there's a ton of buzz surrounding Arrested Development's latest season. If you just stumbled here and don't know what to d ...more
In this video tutorial, viewers learn how to do an arresting technique for handling and restraining. As the opponent begins to punch you, grab the opponent's wrist with one hand. Then push the other arm under the opponent's bicep and under the armpit. Now pull the opponent tow ...more
Acclaimed Cinematographer Adam Kimmel Arrested: The beleaguered Moneyball is going to need a new cinematographer, as its DP Adam Kimmel was arrested last week on charges he sexually assaulted a child in Connecticut. Kimmel (whose credits include Capote, the Spike Jonze short I ...more
Okay, a bit of a disclaimer before we get to the achievement talk. To do this one, you'll have to have bought the Old World Blues DLC for Fallout: New Vegas. Now, in order to get the 'Cardiac Arrest' achievement, you'll have to recover the Stealth Suit Mk II from the X-13 Tes ...more
China's Baidu, the Chinese equivalent of Google, live streamed a video yesterday of CEO Robin Li riding a self-drive vehicle along the streets and highways of Beijing. Since it's illegal to even test driverless cars on public roads and streets in China, the stunt culminated i ...more
Here are 2 pins for arresting techniques in jiu itsu. One attacks the elbow the other the shoulder.
You see someone doing something illegal and there are no police officers around. Do you have the right to play cop? Here’s the lowdown. You Will Need: * Restraint * Common sense *Warning: Making a citizen’s arrest can put you at risk for physical injury and lawsuits. If you ...more
Multiple airport screeners have been arrested for allegedly taking handsome bribes to look the other way while loads of illegal drugs slipped through security at Los Angeles International Airport, federal officials announced today. Two current and two former officials at the ...more
George Clooney has since been released after paying a $100 fine for trespassing. Clooney was among the group of congressmen and activists arrested for ignoring warnings and crossing a police line outside the embassy
“The UK government is rounding on protesters ahead of this summer’s Olympics, issuing the first court order to ban an Occupy activist from the event. The unprecedented security measures for the Games have been branded as over-the-top,” reports RT. One such banning order was h ...more
Ok, so this is going to be a prank on the driver that picks us up from the airport when you guys fly us to L.A.. The driver will pick us up and all the way to where ever we're goin we'll just be cool or we could act like we're on the phone or something so he'll be wondering wh ...more
There are nearly 100,000 unique onion service addresses online with over two million people using Tor every single day. Join me as I explore a small fraction of what the Tor network has to offer. It's puzzling to imagine about 100,000 .onion websites in existence. Readers who ...more
With the mass arrests of 25 anons in Europe and South America, and the rumors of an FBI sweep on the east coast of America floating around, times look dicey for hackers. Over the past few days, a lot of questions have been posed to me about removing sensitive data from hard dr ...more
Pokémon GO made waves as the first augmented reality game to gain popular adoption. In fact, it was so popular that it only took a few days to uncover some the benefits and serious issues with combining physical and digital worlds. The Good The game always aimed to get playe ...more
As protests surge in the wake of George Floyd's murder by a Minneapolis police officer, powerful photographs and videos from the demonstrations have gripped the world, putting our nation's very real and very justifiable widespread civil unrest out into the digital world. Unfor ...more
Assuming that you're not going to knit a sweater and celebrate New Year's Eve with Ryan Seacrest and Jenny McCarthy on ABC's “New Year's Rockin' Eve," it's a pretty safe bet to say that you're probably going to consume alcohol—a considerable amount of alcohol. Similar to the ...more
Story, Characters, and Structure Note: The first half of this review is spoiler free. There are spoiler warnings once you approach the later parts of the review. If you’re curious of the game but don’t want to be spoiled, just read the first half. For those of you that have f ...more
In the first part we differentiated the two types of control, mental and physical. In part 2 we will dig deeper into Physical crowd control and analyze examples that are present today. Physical Crowd Control This is the easy one. Wikipedia says: Crowd control is the controll ...more
“Bad Burrito” Summary: this is basically a prank within a prank. The person (who does not know it’s a prank within a prank) will go to a Mexican restaurant (or any place that serves spicy burritos). It must have an out door seating area, like a sidewalk. He sits down and star ...more
throw a party and have the jackass crew invited and have set up underag girls..an planted drugs..swat team butes in an arrests th jackass crew and interrogate them..tellem theres two girls accusin them of rape and see how many cries
According to security firm Kaspersky Lab, CoinVault and Bitcryptor ransomware are officially dead. "Kaspersky Lab has added an additional 14,031 decryption keys to the free repository noransom.kaspersky.com, enabling all those who have fallen victim to CoinVault and Bitcrypto ...more
Are you a horrible parent if you let your 4 year old play Grand Theft Auto, a pretty vulgar and violently explicit video game? Nah. Also, your 4 year old won't play like your average 13 year old or even 17 year old. This kid, instead of beating up hookers and going on murderou ...more
Welcome back, my novice hackers! As we saw in my first tutorial on Facebook hacking, it is not a simple task. However, with the right skills and tools, as well as persistence and ingenuity, nothing is beyond our capabilities. One of the cardinal rules of hacking is: "If I ca ...more
Nintendo fans rejoice! Not only can you play classic NES games on your iPad or iPhone without jailbreaking, you can play Game Boy Advance and Game Boy Color games. And that's not it. Now, thanks to @angelXwind, we can add Nintendo DS to our list of non-jailbreak emulators for ...more
Here is the final part in Null Byte's series on mastering the skills in The Elder Scrolls V: Skyrim. We have already covered the slick and brutal methods to raise our Spellcasting and Combative skills. Skyrim's intelligent new leveling system has trumped the former methods of ...more
SCRABBLE. To some it's just a game, but to me it's life or death. Well, not really, but it feels that way anyway. On a normal weekend, a game becomes much like Jon Thomas' "friendly game of death Scrabble." Video: . When I'm playing a game of SCRABBLE, my friends are not frien ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more
You're minding your business when your Apple Watch taps you. To your surprise, the watch claims your heart rate dipped abnormally low. The news might come as a shock — especially if you have no history of a heart condition — but before you panic, you should take the time to fu ...more
Your Apple Watch sends you notifications from friends, family, and the apps that are important to you. Occasionally, however, the watch may scare the heck out of you with a notification warning of an abnormal, elevated heart rate. If you have no history of heart conditions, th ...more
Banksy, Cope2, Invader, Retna, Mr.cartoon, They all have a few things in common. Firstly, they are all extremely talented and well known urban artists. Secondly, they all have very memorable and very, very cool names. Banksy is the most well known of the bunch, and in my opin ...more
In recent years, Hollywood has taken a shine to hackers, with hackers appearing in almost every heist or mystery movie now. This can be both good and bad for our profession. As we know, whichever way Hollywood decides to depict our profession is how most people will perceive i ...more
Former Vice President Dick Cheney was so fearful of attacks, he had his heart defibrillator re-calibrated to block incoming wireless signals so that highly skilled hackers couldn't send him into cardiac arrest. If hackers could potentially kill by turning someone's own defibr ...more
It's been a while when the major web browsers first introduced HTTP Strict Transport Security, which made it more difficult to carry Man In The Middle (MITM) attacks (except IE, as always, which will support HSTS since Windows 10, surprised?). SSLStrip and the HSTS Chronicles ...more
Welcome back, my tenderfoot hackers! So many readers in the Null Byte community have been asking me questions about evading detection and hacking undetected that I decided to start a new series on digital forensics. I applaud each of you for your concern, as the last thing I ...more
Open-source intelligence researchers and hackers alike love social media for reconnaissance. Websites like Twitter offer vast, searchable databases updated in real time by millions of users, but it can be incredibly time-consuming to sift through manually. Thankfully, tools li ...more
Nmap is more powerful than you know. With a few scripts, we can extend its functionality beyond a simple port scanner and start to identify details about target servers sysadmins don't want us to know. Possibly the most popular and well-known reconnaissance tool currently ava ...more
This week, Silk Road was shut down for good when the FBI seized the anonymous online marketplace after Ross Ulbricht, aka Dread Pirate Roberts, was arrested. This comes just two weeks after another illegal marketplace called Atlantis shutdown. However, there are plenty of othe ...more
Please, before attempting to recreate this video, make sure you are doing it to a lock that belongs to you and not someone else. Remember, nobody wants to get arrested for doing something stupid. Anyway, in this video tutorial, you'll find out how to open any locked door using ...more
Welcome back, my nascent hackers! One of the many reasons I write this blog is to help you keep the Internet free and open. Throughout human history, whenever a government or other powerful entity has wanted to subjugate a people or group, the first thing they do is isolate t ...more
WikiLeaks. In recent weeks, it's been the hottest topic on the web. It's been attacked on a multinational level by political influence peddling. First, U.S. Senator Joe Lieberman swayed Amazon's decision to stop hosting WikiLeaks. Then, Tableau Software removed graphs from th ...more
I'm one of those types of people who waits until the very last minute to find a Halloween costume, and thanks to last year's attempt at buying one at a local costume shop the day before Halloween, I will just settle for the things I have lying around in my house from now until ...more
Although the Samsung Galaxy Note 2 is a speedy device, one feature that feels a bit slow is swiping down from the Status bar to see the Notification tray when I'm using a full-screen app. When a full-screen app is open, I have to swipe down not once, but TWICE, on the upper po ...more
A PirateBox creates a network that allows users to communicate wirelessly, connecting smartphones and laptops even when surrounding infrastructure has been disabled on purpose or destroyed in a disaster. Using a Raspberry Pi, we will make a wireless offline server that hosts f ...more
The hidden blade from Assassin' Creed is a super fun weapon to use, and Ezio a very distinctive and cool idea for a Halloween costume. IF you've come to the same conclusions, watch this video to learn how to make a DIY working hidden blade out of Knex that will not get you arr ...more
Hello Intro Today its another installment of my series which is something many of you enjoy, so here is part 4. Provide False Information: Many things fall into place when one has to successfully become a ghost hacker, and one of the key things is what you're telling peopl ...more
Megaupload was one of the very first file-sharing sites I ever used. But since 2005, the beloved (and pretty gangster) Kim Dotcom, has been in a legal battle with the U.S. Justice Department over copyright infringement. Major movie studios and music labels went after Megauplo ...more
Many of us experience highly emotional "freakouts", so to speak, more often than we'd like. Weather you experience them personally, or via your loved ones, it can be very difficult to think rationally during an episode, and for some people it can take quite a while to calm dow ...more
Welcome back, my fledgling hackers! As nearly everyone has heard, Target Corporation, one of the largest retailers in the U.S. and Canada, was hacked late last year and potentially 100 million credit cards have been compromised. Happening just before Christmas, it severely da ...more
A deck of cards may be a magician's best way to demonstrate his or her's sleight of hand, but for the prankster, it's the perfect way to deliver a shocking 300 volts of electricity! And that's exactly what I'm going to show you how to do today. Stuart Edge used it in his "Elec ...more
Over the past couple of weeks, there have been a series of high-profile hacks and leaks. From the rooting of CombinedSystems, to a secret FBI conference call leak, all the way to the distributed denial-of-service (DDoS) attacks on U.S. government sites—with a lot in-between. A ...more
A dead man's switch is a fairly simple concept. If you don't perform a specific task before a set amount of time, it'll perform a specific action you set. They can be handy not just for hackers but for everyone who wants to protect themselves, someone else, or something tangib ...more
I recently bought a new telescope and thought I would share a few images that I have taken with it. I am very new to astrophotography, but I hope to be able to post up some more images in the near future. Moon (at slightly gibbous phase): Crop of the Moon from the image abov ...more
For all pickle aficionados, apparently the combination of sour pickles and sweet Kool-Aid is surprisingly delectable. Popular in Mississippi, Kool-Aid drenched pickles are a popular treat coined Koolickles. Sound unappetizing? Don't knock it 'til you try it. The New York Times ...more
The shooting of Walter Scott (who was unarmed) has been dominating the news these past few weeks. Scott, who ran away from police officer Michael Slager after a routine traffic stop, was shot in the back and pronounced dead shortly thereafter. Unlike similar cases where a cop ...more
We've talked before about EXIF data—or metadata—attached to photos and how it can expose information about your location, what type of device you're using, and even the device or camera's unique identification number. If you think it's not that big a deal, just ask John McAfe ...more
Hearts are fairly easy to cut out of paper, but origami hearts take a little more work, and that means more appreciation from their recipient. Even better, flying origami hearts. What better way to tell your loved one you care on Valentine's Day than with some bat-winged heart ...more
This is a simple but hilarious prank! Find someone to prank. It could be anyone. Have the "pranker" ask the person if they would hold something for a second. Have the pranker give the person the item. As soon as the person has the item, have a few cop cars pull up. Have t ...more
The latest film addition in the American-produced Millennium series, The Girl in the Spider's Web, was just released on Blu-ray a few days ago. As you could expect, the movie has many hacking scenes throughout, just like the previous English and Swedish language movies centere ...more
If you have seen the movie Fast and Furious 7, you know what "God's Eye" is. Well this might spark interest to you. If You Don't Know if you don't know what God's Eye is, basically it's a software that is able to access any phone, camera, microphone, anything that is digital ...more