With his abilities to slow, heal and deal splash damage, Kayle the Judicator is useful as a support DPS champion to fight with on the Fields of Justice. This tutorial shows you how to build Kayle as a strong caster to ensure victory for your summoner in your next League of Leg ...more
Despite the perception that Zilean is only a support champion, if you build him properly, he can hold his own, even an 1v2 battle. Here are some good insights into how to use Zilean effectively on the Fields of Justice. Become a champion at League of Legends. League of Legend ...more
Kennen, along with Shen, is another ninja you can play on the Fields of Justice. This tutorial goes into some useful strategy tips when you pick Kennen as your champion. He excels at crowd control, but can sometimes be squishy. Make sure you play him effectively! Become a cha ...more
Pantheon is a hoplite-style champion you can play on the Fields of Justice. This tutorial goes into the mechanics behind the Artisan of War, and shows you the best items, abilities and strategy to employ when you take him into battle. Become a champion at League of Legends. L ...more
Personalize your League of Legends champions by altering their skins! This method will only change their appearance for you. This shows you how to obtain custom skins and apply them to your favorite champion (or one you just want to change around). Become a champion at League ...more
Even if you're not a graphic artist, you can still use Photoshop to recolor the available skins for your League of Legends character. This tutorial shows you the tools and techniques to create your own skins for your favorite champion. Become a champion at League of Legends. ...more
Olaf the Berserker is a melee DPS champion available for your summoner to play in League of Legends. There are many different ways to build an effective Olaf. This video shows you what you should keep in mind as you assign your own abilities and runes to the Berserker. Become ...more
The Fist of Shadow is a ninja assassin character, a hybrid damage/ability champion. She's also good at harassing and farming during a battle. Here are a couple good strategy tips on how to maximize your build when Akali is your chosen champion. Become a champion at League of ...more
What can Pantheon do as your champion on the Fields of Justice? Quite a lot! There are several fun tricks available to the Artisan of War. Here's a good tutorial on how to build Pantheon to take advantage of his strengths while using your runes to compensate for his weaknesses ...more
Shen is a useful champion to play as a tank, despite also being able to ninja. Here's a detailed tutorial on how to build Shen to take advantage of all his abilities, masteries and runes (as well as items) so you can always stay fighting with Shen. Become a champion at League ...more
Minions are computer generated NPCs that spawn from the base nexus and attack enemies. You can't control your minions, but you can influence them by using smite and heal on them. Use your minions well and you'll win your games on the Fields of Justice! Become a champion at Le ...more
In League of Legends, you play the role of a powerful summoner, who may bring other champions to do battle on your behalf at the Fields of Justice. This short video explains how you can track your game stats and maintain your stable of champions using the summoner screens in t ...more
Play the Sad Mummy as your champion! This video goes into strategies and tips when you play the League of Legends character Amumu the Sad Mummy. Watch Amumu in play and see the best way to use his unique and passive abilities to ensure victory for your team! Become a champion ...more
In this article, I'll show you how to prank your friends on April Fool's Day with the very popular Google Voice, a computer to land/mobile calling feature. Basically, Google allows you to play whatever you like through the microphone port on your computer, and play it right th ...more
DARPA and Dallas's Southern Methodist University are collaborating on a super high tech camera, capable of scanning eyeballs in a moving crowd. Via Wired, "Called Panoptes, the devices use low-resolution sensors to create a high-res image that can be captured using a lightwe ...more
Wireless networks. Nowadays, everyone uses 'em, but most don't secure 'em. On average, I can drive up and down any block in my city and find at least one or two open or semi-open networks on any given day. With some changed MAC addresses for good measure, an attacker can use y ...more
If you're a frequenter of Null Byte, I bet you have at least some interest in information security. Furthermore, you have a hobby that if applied in certain ways, will get you arrested. I've received quite a few messages from the community here about federal cybercrime law and ...more
+Nik Cubrilovic discovered last week that Facebook could track your web activities even after you logged out of your Facebook account. After some blatant denials from Facebook spokespeople, Facebook decided to fix the logout issue, but not before +Michael Arrington, on his new ...more
Give your League of Legends champion a new look! Alter the .dds files in the game directory so you can import custom skins. This video walks you through the process for obtaining and installing custom skins. Be aware that this will only change the way champions appear to you. ...more
Katarina is one of the champions you can use in League of Legends, being able to both deal out damage and handle taking it herself. Here's a quick overview of what she can do, and the best way to incorporate this champion into a team game on the Fields of Justice. Become a ch ...more
Malzahar's strength is being able to damage over time. With his silence ability, he is also good at harassing the other team. Here's a video which explains what Malzahar can do as a champion, and then a demonstration of him in action on the Fields of Justice. Become a champio ...more
Laning is one of the more important phases during a battle on the Fields of Justice. This tutorial shows you the best way to use Nasus when you're trying to take or hold your lane. Make sure you choose the right abilities and items to make Nasus more than able to hold his own ...more
It can sometimes be difficult to win a solo queue game in League of Legends when paired with players you don't know. Here are a few tips and hints when you pick your champion in a way to compliment what your teammates are playing. Become a champion at League of Legends. Leagu ...more
Good skin care begins with knowing what kind of skin your have, what special issues you have, and what products work best for your skin. In this video we show you how to identify your skin type and choose skin care products that best suit you. Skin Care Routine Healthy diet a ...more
Tai Chi is an ancient form of Chinese martial arts that incorporates the use of meditative movements. Learn various applications of performing Tai Chi as a form of self defense from a professional Tai Chi instructor in this free video series. Part 1 of 17 - How to Adapt tai ch ...more
The limitless applications of 3D data visualization will enable a more efficient approach to many of life's problems. Each day, developers exploring this technology are finding new ways to solve these problems in mixed reality; 3D modeling, easier house management, spinal surg ...more
It is often said that the best hackers remain unknown, and the greatest attacks are left undiscovered, but it's hard for an up-and-coming penetration tester or white hat to learn anything unless one of those factors is actually known or discovered. But the end goal here in our ...more
The latest film addition in the American-produced Millennium series, The Girl in the Spider's Web, was just released on Blu-ray a few days ago. As you could expect, the movie has many hacking scenes throughout, just like the previous English and Swedish language movies centere ...more
Web application firewalls are one of the strongest defenses a web app has, but they can be vulnerable if the firewall version used is known to an attacker. Understanding which firewall a target is using can be the first step to a hacker discovering how to get past it — and wha ...more
As Microsoft works toward fulfilling its $480 million contract to supply modified HoloLens 2 headsets to the US Army, Airbus is preparing to supply advanced augmented reality apps for the device. On Thursday, the Airbus Defence and Space unit published a video demonstrating t ...more
After a hacker has configured Metasploit on a remote private server, created a resource script for automation, and created a simple payload, he or she can begin the process of remotely controlling someone's Windows 10 computer with just a few moments of physical access — even ...more
The leading platforms enabling augmented reality technology lead our headlines in Market Reality this week. Unity Technologies received a sizable investment and PTC striking another development partnership as its annual LiveWorx conference wraps up. Fittingly, both companies ...more
Advancements to Android's open source OS come in the form of ROMs and mods, available all over the web for anyone to find. Installing any of these modifications tends to wipe your phone clean, causing you to lose all of the precious data on your device. Remember when you used ...more
There is no shortage of defenses against cross-site scripting (XSS) since it is so prevalent on the web today. Filters are one of the most common implementations used to prevent this type of attack, usually configured as a blacklist of known bad expressions or based on regex e ...more
A Norwegian carrier's launch of a pilotless container ship next year could lead the way to a new era in sea transportation and shipping if successful. Norway-based Yara International ASA, a self-touted "Tesla of the seas," claims the eletric-powered vessel will be the world's ...more
As you've probably heard by now, Snapchat's new redesign isn't going over too hot with its users. Its stock plummeted last week when Kylie Jenner said she'd be moving on to more Instagram-y pastures. With all these factors, you'd probably assume that there is some empirical ev ...more
Quanergy CEO and founder Louay Eldada is, by any standard of measure, a pioneer in the development of LiDARs for driverless vehicles. Eldada's involvement with designing and engineering optical sensors dates back to his research work on LiDAR (light detection and ranging sens ...more
Data visualization has many applications in virtual and mixed reality, since a third dimension literally adds important depth to the represented information. A new app called HoloFlight is a good example of this, combining flight-tracking data and the Microsoft HoloLens to sur ...more
Locating and abusing files containing unsafe permissions is an easy and surefire way to elevate shell privileges on a backdoored macOS device. This time around, we'll be more aggressive and attempt to phish a user's login password by prompting a convincing popup message merely ...more
After installing Ubuntu as your primary OS, you should have protected against USB Rubber Ducky payloads, defended against hard drive forensics, and reduced the overall attack surface against physical strikes. When defending against network-based attacks, you'll want to minimiz ...more
The HoloLens is a natural medium for 3D data visualization, which offers a far more ideal approach over 2D screens to managing multiple resources simultaneously and grasping the bigger picture. We've already seen how management is using holograms to oversee cities, firefighter ...more
Pretty soon, every restaurant and store you walk into will know exactly what you're doing. Retail analytics companies like Euclid, ShopperTrak, RetailNext, and Prism Skylabs have penetrated hundreds of food shops and retail stores across the country, installing sensors that tr ...more
Every summer for the last 26 years, hoards of hackers have descended on the Las Vegas Strip for DEFCON, the biggest hacker conference in the US. There's a wealth of talks every season (DEFCON 27 has at least 95 scheduled), and there have been some essential topics to learn fro ...more
Once you've installed Ubuntu with security in mind and reduced the possibility of network attacks on your system, you can start thinking about security on an application level. If a malicious file is opened on your system, will an attacker be able to access every file on the c ...more
Following on the heels of the announcement that ThirdEye's Gen X2 MR glasses began shipping in September, ThirdEye has revealed it has developed an app that helps soldiers aim their weapons during battle situations. The company just posted a short clip of a soldier using the ...more
Bitmoji has experienced explosive success this year thanks to Snapchat. The app allows users to create their own personal emoji and send responses to other friends, and even though it's only two and a half years old, this customizable emoji app is growing at an impressive pace ...more
Welcome back, my greenhorn hackers! The Holy Grail of any hacker is to develop a zero-day exploit—an exploit that has never been seen by antivirus (AV) and other software developers, as well as intrusion detection system (IDS) developers. In that way, you can exploit systems ...more
Welcome back, my neophyte hackers! Digital forensics is one of the fields often overlooked by aspiring hackers. In a rush to exploit every and any system they can, they often ignore learning digital forensics—the field that may lead to them being traced. In addition to learn ...more
When it comes to blocking unwanted calls, your Android device comes stocked with a native blocking feature that allows you to reject certain phone numbers. That being said, the native blocking feature on the Samsung Galaxy Note 3 isn't the prettiest or the smartest, with its n ...more
I'm not admitting to anything, but let's be honest, most of us download content on the Web from time to time. With copyright holders laying down the law more and more often, it can't hurt to do so with caution. And even if you aren't downloading copyrighted material, you still ...more
One of the most common web application vulnerabilities is LFI, which allows unauthorized access to sensitive files on the server. Such a common weakness is often safeguarded against, and low-hanging fruit can be defended quite easily. But there are always creative ways to get ...more
With the number of web applications out there today, it comes as no surprise that there are just as many vulnerabilities waiting for hackers to discover. Finding those vulnerabilities can be a difficult task, but there are plenty of tools available to make the process easier. ...more
One of the best ways to improve your skills as a hacker is to learn to combine different avenues of attack to achieve success. What if it were possible to get a victim to connect to our machine and execute a chosen payload on our behalf? This is indeed possible with the almigh ...more
Apple has tools built into iOS to help parents monitor the iPhone habits of their children. However, those same tools can be used by everyday iPhone owners to both hide apps they don't care about, as well as restrict features they don't need or that infringe on privacy. Whethe ...more
Aircraft manufacturer Airbus is so impressed with the boost in productivity it has gained from Microsoft's HoloLens, the company will begin offering augmented reality software to its customers. On Monday at the Paris Air Show, Airbus announced that it will begin selling off-t ...more
Wound infections don't usually enter the blood and become systemic, spreading the infection throughout our bodies, and there's a good reason for that: Our bodies actively work to prevent it, according to research that discovered a new use for a protein first discovered decades ...more
In my last hack blog on crashing your roommates Win7 system, we started looking at client- side attacks. As promised, we will be looking at some more client-side attacks. As web server and OS’s have become hardened and living behind significant perimeter defenses, hackers hav ...more
If you're worried about the security of your Mac, there are easy measures to prevent the most dangerous attacks. Named after the tactic of accessing an unattended computer in a hotel room, we can thwart "evil maid" attacks with Do Not Disturb and LuLu, free macOS tools by Obje ...more
Websites and web applications power the internet as we know it, representing a juicy target for any hacker or red team. TIDoS is a framework of modules brought together for their usefulness in hacking web apps, organized into a common sense workflow. With an impressive array o ...more
Users are often the weakest link when probing for vulnerabilities, and it's no surprise they can be easily fooled. One way to do this is called clickjacking. This type of attack tricks the victim into clicking something they didn't mean to click, something under the attacker's ...more