Here's a delicious Byte of information for you. A proof of concept program on Linux was coded to exploit a known bug in how the Linux Kernel (versions 2.6.39+) handles permissions for the /proc/pid/mem directory. /proc/pid/mem is an interface for reading and writing directly t ...more
Last Friday's mission was to accomplish solving HackThisSite, realistic 2. This second mission in a series of realistic simulation missions was designed to be exactly like situations you may encounter in the real world, requesting we help a friend take down a racist hate-group ...more
Cell phone jammers, a DIY endeavor for the darker crowd. I'm pretty sure we've all considered having one at some point: whether the obnoxiously loud woman next to you is announcing private bedroom stories to a crowd on the subway, or your kids are grounded from using the phone ...more
Last Friday's mission was to accomplish solving HackThisSite, realistic 1. This is the first in a series of realistic simulation missions designed to be exactly like situations you may encounter in the real world. This first mission, we are asked to help a friend manipulate th ...more
If you saw my last tutorial on retiring early and wealthy, you now know how anyone can invest a small amount of money over the course of their life, and by exploiting compound interest, achieve an extremely comfortable and easy going retirement. In Part 2, we are going to dive ...more
Null Byte is looking for forum moderators! Last Friday's mission was to accomplish solving HackThisSite, basic mission 9. This mission delves a little further into Unix commands and remote directory traversal (which is just a fancy term for going through folders blindly). Th ...more
This tutorial is in response to mail to Facebook. Scott Wilde leads you through the process. You can start by creating a brand new profile page. In this case, Mr. Wilde created a profile page for his dog Java Wilde so he could have a fresh new page without having to alter his ...more
MyShoppingGenie is an online shopping application that can help you find the best deals on products you search for. It works with major search engines such as Google, Bing, Yahoo! and AOL. It's totally free and simple to setup and use. Once installed, MyShoppingGenie will po ...more
Google+ is nearly complete. We've got hangouts, pages, photos, games, and lots of ways to share what we love and build an audience. But it seems like Google isn't quite done yet. Since most of Google+ has been "shipped", it's now time to "ship the Google" as +Larry Page mentio ...more
Since the introduction of Google, people have been in love with the search engine website that has grown into a beast of site. With Google, you're able to not only search for whatever you desire, but you can create an email address, keep up with your contacts, keep in touch wi ...more
It's easy to find your friends in Orkut just in one click. Step 1. Add Google toolbar. Step 2. Click add button located on the right side of the search button in Google toolbar which directs you to a web page where you will have various add on buttons. Step 3. Click the links ...more
Everyone in the world uses tablets these days, so it's no wonder that the Samsung Galaxy Tab has different languages built right in. To change your language on the Android tablet, all you need to do is navigate to the Settings menu. Instructions for Older Tab Models This fir ...more
Windows Vista comes with a list of pre installed fonts. You can also add new fonts to your operating system. To install a font you will need to download it from the internet first. Go to Google and search for you favorite fonts. Open any of the website and download a font. Sav ...more
The video shows us how to use audacity to record audio. Firstly you need to have the software audacity installed in your system and for that Google and search for 'audacity' and after that you get a link to save and install the software. Once the installation is done, open aud ...more
Although Grand Theft Auto 4 was released, many people are still going to want to play GTA San Andreas. Here's how to download and install GTA San Andreas Multiplayer. First, go to Google and search GTA San Andreas Multiplayer. Then, click on the first result that comes up. Go ...more
Learn to add sound effects and audio controls to Sony Movie with this video. 1. First, go to your audio track in Sony Movie Studio. Under voice (on the left) click the effects button. 2. You can use the 3 included or click the plus in the upper right corner. 3. You can use any ...more
Here's something fun for the Null Byte community to do—a coding competition! This week, I wanted to get everyone involved by offering you all a nice library of possible program types to choose from and try to code. At the end of this competition, all of the submitted programs ...more
We're aiming for this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with, we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain acces ...more
I feel like doing a bit of chemistry today, how about you? To my knowledge, thermite is the hottest burning man-made substance. Thermite is a pyrotechnic composition of a metal powder and a metal oxide that produces an exothermic oxidation-reduction reaction known as a thermit ...more
The community tore up the first realistic mission last week. You've applied the techniques learned in the basic missions to a real scenario, so I'm pretty content. The realistic missions are where the learning gets intense and where we can apply real knowledge to extremely rea ...more
Following the first part in this series on advanced cracking techniques, we are going to go over how we can intelligently crack passwords using the old-fashioned bruteforce method. These unique cracking techniques aren't widely used, because most crackers are Script Kiddies wh ...more
How did it happen? How did your ultra-secure WPA password on your wireless network get broken into? Well, you might have just found yourself at the mercy of a cracker. Crackers are malicious computer users who specialize in breaking into things. Whether it be passwords, login ...more
Here's a nasty little Null Byte. An open redirect vulnerability was found in both Facebook and Google that could allow hackers to steal user credentials via phishing. This also potentially allows redirects to malicious sites that exploit other vulnerabilities in your OS or bro ...more
I'm pretty sure that it's a universal dream for everyone in the world to retire early. Who wants to to be stuck with the rest of the country and retire when you're almost 70 years old? You heard me right, 70! Most people can't go out and do the things they love to do by the ti ...more
Community byters, it's time to get serious. We are finally moving on to the realistic missions in HackThisSite. This is where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding ...more
VNC is a great protocol that you can use on Windows and Linux machines to remotely control computers. This is useful if you need to control your computer when away from home, help your grandma check her email, or help a client with a disk cleanup. VNC is secure in the sense th ...more
Only so much data can be passed through the network and to your computer's networking interfaces. This is limited by the amount of bandwidth you have. The more bandwidth you have, the faster your network connections will be. Not only this, but your transfers will be more paral ...more
If you've ever heard software piracy terminology being discussed, I'm sure the term KeyGens came up. KeyGens is short for key generator, which is a program that exploits algorithmic faults in software by generating software license keys that appear to be genuine. Normally used ...more
With the purchase of my latest computer, installing Linux turned into a nightmare from Hell. The graphics drivers are probably the biggest issue that anyone with a newer computer will run into when installing Linux. AMD and NVIDIA are the dominant ones on the market, both of w ...more
As Google+ is still in its Limited Field Trial phase, joining can feel quite lonely. You can't exactly get all your friends and family in during the brief periods when the invitation system opens up. You can, however, add several interesting people to your "Following" Circle t ...more
This tutorial will walk you through the steps required to install the Ubuntu 9.10 operating system (Karmic Koala) on your computer. I have a Suzuki Kuiper 1411 HKS notebook computer with 2.1 GHz Intel Dual Core processor, 4GB RAM and 320GB hard drive. It has a dedicated 256MB ...more
While a lot of internet threats are rather over-hyped, there are some serious things to be cautious of when going online. Probably the biggest risk to the average internet user is malicious software. Commonly knows as "malware," this term refers to any program that exists sole ...more
Huzzah! My sentences have been recorded! This is normally the most exciting part of beginning a language with this method, because you actually had another person do something for you that is really of great value. I remember receiving my first recording in Japanese. I listen ...more
How to Create Scenery in FSX This article will show you how to create scenery objects in Microsoft Flight Simulator X (unfortunately not available to the Standard FSX, but it is available to standard FSX with the Acceleration Expansion Pack) that you can see in the 'real world ...more
Every day of the week, WonderHowTo curators are hard at work, scouring the web for the greatest and most inspiring how-to videos. Every Friday, we'll highlight our favorite finds. Farm achievements in Halo: Reach Can't wait for Halo: Reach to come out next week? We've got an ...more
This video tells us the method to remove Trojan Virus from the computer. This can be done in a couple of steps. The first step involves the downloading of a specific application from the web. We have to search this application in Google. Type 'malwarebytes' in the search engin ...more
You wouldn't think that something so simple as a "suggested users" list would create so much controversy, but Google+ seemed to have accidentally ignited a firestorm when they introduced a new feature over the weekend: the "Suggested People to Follow" list now appears when a n ...more
Howdy, hobos! Last week's WTFoto challenge meandered on much like its namesake, the vagrant. We had a couple good submissions that warmed my heart with laughter. I thought my examples were pretty on point, but my confidence is pretty low right now because I failed a recent IQ ...more
In this tutorial, we learn how to protect a Windows PC from spyware & malicious software with Dave. You can get spyware from downloading random things, so a great way to make sure you don't download these things, is to use Firefox and search your items before you download them ...more
This video tutorial belongs to the software category which is going to show you how to add a watermark in Camtasia Studio. Open up Camtasia Studio and either import a video or open up a saved video to add a watermark. You got to edit your video and be ready to publish it becau ...more
ClassroomNext demonstrates how to change your Facebook privacy settings. To adjust your Facebook privacy settings, first log on to Facebook and open up your profile page. If you would like to change your privacy settings so that your pictures are not indexed by search engines ...more
In this walk-through video ClearTechInfo shows you how to download, install and test Adobe Acrobat Reader. First download the software from the mentioned website making sure to un-check the Google tool-bar option. Install the software for all users as shown accepting the licen ...more
Check out this quick video tutorial on how to install Opera Mini 4 on the T-Mobile Shadow cell phone. Opera Mini is a web browser designed primarily for mobile phones, but also for smartphones and personal digital assistants. It uses the Java ME platform and consequently requ ...more
In this how to video, you will learn how get VMWare Fusion on your Mac. This will allow you to install Windows and run them on the same computer. First, go to the mediafire page and download the files. Next, download and install Unarchiver to join the files together and extrac ...more
Self-storage may not be a new industry, but it is one that is rapidly reshaping its operations to suit a progressively more modernized customer base. In order to stay competitive with your self-storage facility, you'll need to keep an open mind, embrace current marketing trend ...more
Three-dimensional printing is one of the many wonders of modern technology. It's the first step towards real life Star Trek replicators and Timeline-esque teleportation chambers. While we aren't at the level of reconstructing strands of DNA, it's already possible to make tons ...more
¬¬Just about every business has a website these days but very few businesses know how to effectively use their websites to get more customers. There are two different things that a business owner needs to do to increase their website traffic: optimize their site so that search ...more
Since the internet is becoming more and more important all the time in regards to overall marketing plans for many companies, it’s imperative that the company website be up to the task of attracting visitors and converting them into customers. There are many methods and techni ...more
You can create some great image effects when you combine Google SketchUp with other graphics software such as Photoshop or Gimp. Take a look at this instructional video and learn how to use the fog setting in SketchUp to create a depth map that you can use in Adobe Photoshop f ...more
Youtube.com is one of the most visited websites in the world, and has been for years now. Ever since it's creation in 2005 people have been making videos for every purpose, including the infamous "How to Boil Water" video. But how can one make money from posting videos on Yout ...more
In this video from iPT2gGeec we learn how to control an iPhone from your computer. You need a jailbroken iPhone to do this and use a program called Veency. Open Cydia. Search for Veency. Install it. That is all you need to do with your iPhone. Now to get it to work on your co ...more
Have an old bike combination lock that you can't remember the code for? If it's a simply four-digit cable lock, you can easily figure out the combination with a quick peck-and-go method. Best of all, this technique doesn't require any tools or special know-how, and let's you r ...more
Nine-year-old Azura of Middle Road, Worcester (England) inadvertently pranked her whole neighborhood (and whoever else happened to be browsing the area on Google Street View) when she dropped "dead" to the pavement. Daily Mail reports: "It is a suburban scene much like milli ...more
Cakes. They're delicious and we eat them at birthdays, weddings, and wakes (that aren't ours). In the splendorous world of culinary creations, there is no comestible that allows for such decorative flexibility as the cake. It can be simple, it can be complex. It can be amazing ...more
For those of you behind on their international politics, Vladimir Putin has once again been elected as President of Russia. And right now, there are over 20,000 protesters in Moscow yelling about election fraud. Now, whether or not you think they're right, or whether or not yo ...more
In this video, we learn how to get a new domain name from Google. First, go to the Google domain website and search for a domain name that you want. After this, check the availability of it, then continue to register it. Once you get the registration page, enter in your inform ...more
In this video, we learn how to make your Facebook profile less public. First, log onto your Facebook account, then go to your privacy settings. Through there, go to search and choose who you want to allow to search for you on your site. After this, save your settings and move ...more
You can SSH on a iPod which is jail broken. To do this you will need the Cydia application. Open the application on your device. From the main menu of the application go to the search feature. Search for SSH. The first result is Automatic SSH. Click on it to download. Install ...more
We've all had photos taken of us that we hate. Celebrities, on the other hand, have the fortune of having their photo retouched to perfection. But what happens when the person doing that retouching suffers a stroke? Beyoncé It Ain't So! Apparently, Beyoncé wasn't white enoug ...more
Besides Wikipedia and teachers (in that order), textbooks are the go-to source of information during our school years. Today, we take a look at what happens when the people writing these voluminous tomes get attacked by a sudden bout of ennui. Forward Fellow Feeling Frisky I ...more