Defend-you

How To : Make a Blaze Trap in Minecraft

Welcome to Minecraft World! Check out our advanced tutorials and come play with us on our free server. The Nether is a dangerous place. It usually takes days of playing, creating enchanted armor, and using advanced potions until one is able to safely traverse the Nether. The ...more

News : Data Pirates (AKA Cops) Can Hack Your Cell Phone

By now, many of you may have heard about iPhone tracking and recording your location data, but is there anything else being extracted from cell phones without our knowledge? If you're a Michigan state resident, the answer is an alarming "maybe". Michigan's police department h ...more

Social Engineering, Part 1 : Scoring a Free Cell Phone

This Null Byte is the first part in a mini-series on the art of Social Engineering. I will be teaching you how to effectively defend yourself against it. What is Social Engineering? Social Engineering is the art of hacking humans. It's when a person is manipulated into doing ...more

How To : The Top 80+ Websites Available in the Tor Network

There are nearly 100,000 unique onion service addresses online with over two million people using Tor every single day. Join me as I explore a small fraction of what the Tor network has to offer. It's puzzling to imagine about 100,000 .onion websites in existence. Readers who ...more

How To : Defeat SSL in Practice with SSL Strip

SSL stands for Secure Socket Layer. It's an encryption standard used on most sites' login pages to avoid their users' passwords being packet sniffed in simple plain-text format. This keeps the users safe by having all of that traffic encrypted over an "https" connection. So, w ...more

How to Get Better at Halo : Reach

Introduction Halo: Reach is Bungie's latest and final addition to the franchise. Microsoft has claimed the title and from now on 343 Industries will be working on the Halo franchise. In my opinion, Bungie's last game is the best out of all of them. These are some tactics and ...more

Gaming : The 9 Best Games to Play When You're Taking a Dump

My bathroom is like my own private arcade room. Whenever I'm seated comfortably on the toilet, no one is going to disturb me, so I can play anything I want on my smartphone. You probably do it, too — and your parents, kids, friends, colleagues, and boss — so don't be afraid to ...more

How To : Why You Should Study to Be a Hacker

Welcome back, my budding hackers! People often ask me, "Why are you training hackers? Isn't that illegal?" Although I usually give them a short version of this post, there are MANY reasons why YOU should be studying hacking. Before I begin, I want to re-emphasize to all of y ...more

News : 8 Tips for Creating Strong, Unbreakable Passwords

This weekend, hackers broke into the servers of the popular shoe shopping site Zappos, giving them access to the personal information of 24 million Zappos customers. The user data taken included names, email addresses, billing and shipping addresses, phone numbers, the last fo ...more

How To : Detect Script-Kiddie Wi-Fi Jamming with Wireshark

Due to weaknesses in the way Wi-Fi works, it's extremely easy to disrupt most Wi-Fi networks using tools that forge deauthentication packets. The ease with which these common tools can jam networks is only matched by how simple they are to detect for anyone listening for them. ...more

How To : Make a cardboard shield

In this tutorial you'll learn how to make a cardboard shield, quickly and cheaply. All you need is some stuff you've probably already got around the house. Get to work, so you'll be ready to defend yourself against any barbarian invaders with cardboard swords! Materials neede ...more

How To : Use Traffic Analysis to Defeat TOR

As was mentioned by the great OTW last week, TOR, aka The Onion Router, has had its integrity attacked by the NSA. In an attempt to reduce the anonymity granted by the service, the NSA has opened a great many nodes of their own. The purpose is presumably to trace the origin of ...more

How To : Hack The Last Stand with Cheat Engine (09/23/09)

This is a Cheat Engine guide on how to hack this flash game - The Last Stand. Kongregate Acheatment shows you how to hack The Last Stand with Cheat Engine (09/23/09). This Last Stand cheat will give you a speed hack with only 2 balls. Play the free online flash game The Last ...more

How To : Things to Do on WonderHowTo (02/29 - 03/06)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more

News : duck hunting

items needed for stunt: 4 mini motorbikes 4 paint ball guns loads of feathers glue and rotten eggs Tips eggs for the ducks have balance and co-ordination duck hunting cover wee man and preston in the eathers using the glue have Johnny Knoxville,ryan dunn,Bam Margera and chris ...more

How To : Easily Generate Hundreds of Phishing Domains

A convincing domain name is critical to the success of any phishing attack. With a single Python script, it's possible to find hundreds of available phishing domains and even identify phishing websites deployed by other hackers for purposes such as stealing user credentials. ...more

How To : Do a Krav Maga choke with a push defense

This how-to video demonstrates Krav Maga Worldwide Sherman Oaks 3rd degree Dave Bluestein teaching defense against a basic choke from the front with a push. Follow along and improve your Krava Maga skills or just learn how to defend yourself from an attack. Watch this video ma ...more

Fallen Empires : The Worst Ever?

I started playing MTG in 1994, the same year that the Fallen Empires set hit the market. It was, in fact, the first new set released after I started playing, making me one excited nine-year-old. I harangued my father, he took my friends and I to Gameworks again and again, and ...more

How To : Simulate a RAT on Your Network with ShinoBOT

A remote administration tool, or RAT, is a piece of software used for remotely controlling machines. They are commonly used by tech support to gain remote access for troubleshooting purposes, but RATs are also an important part of a hacker's advanced persistent threat (APT) to ...more

How To : Things to Do on WonderHowTo (12/21 - 12/27)

WonderHowTo is made up niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week: A holiday-themed cell phone photogr ...more

How To : Hide DDE-Based Attacks in MS Word

In a previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when a Microsoft Word document is opened. The biggest challenge of this attack is that it requires getting the user to agree to a pop-up prompt. Fortunately ...more

News : Can We Hack the Hackers?

Welcome back, my rookie hackers! For some time now, I have been contemplating this issue, can we hack back the hackers? As someone who plays on both sides of the cyber security ping pong match, I've wondered whether I can use my hacking skills in self-defense of my clients. A ...more

Just Released : Dungeon Defenders Gameplay Footage

Dungeon Defenders is finally out on the PC, Xbox 360, and PS3. We've previously featured the tower defense RPG, and if you haven't had a chance to check out the PAX interview with Trendy Entertainment, now would be a good time. While there have been quite a few PC and indie c ...more

News : What Is a White Hat Hacker?

In recent weeks, some people have been shunned from the Null Byte community because they expressed "black hat" aspirations. This is because Null Byte is the "white hat" hacker training/playground. Although most of us think we know what that means, it does beg the question; "Wh ...more

How To : Defend with a backhand shot in badminton

For backhand defense the thumb is placed on the back of the racket handle at a slight downward angle. When the shuttle is smashed the defending player brings the racket head slightly upwards and forwards to meet it. Although the forearm plays a major role in backhand defensive ...more

How To : Why Keeping Good News to Yourself Is a Good Thing

Can't stand seeing your Facebook news feed full of peoples' good news and awesome accomplishments? Those oversharing friends are, in a sense, hampering their great news simply by sharing it. If you hold back and keep your accomplishments from friends, you might find even more ...more

Prev Page
  • Hot
  • Latest