Possess Search Results

How To: Change These Settings Now to Protect Your Data in Case Your Phone Is Stolen

As smartphone users, we live in dangerous times. The value of phones continues to rise, making them prime targets for thieves. In 2015, the FCC estimated that one million phones are stolen each year, and with several devices starting to hit the $1,000 mark now, these numbers are sure to rise. But what do you do if you fall victim to phone theft?

How To: Select a Field-Tested Kali Linux Compatible Wireless Adapter

When hacking Wi-Fi networks, having the right wireless adapter is essential. But hunting online for one can be a frustrating experience. To see how the handful of Kali-compatible adapters on the market measure up, I ran a series of tests to benchmark and compare their range, signal strength, and ability to enter monitor mode and perform packet injection. This should help you determine which adapter is right for your own hacking needs.

Social Engineering: How to Use Persuasion to Compromise a Human Target

Social engineering makes headlines because human behavior is often the weakest link of even well-defended targets. Automated social engineering tools can help reclusive hackers touch these techniques, but the study of how to hack human interactions in person is often ignored. Today, we will examine how to use subtle, hard to detect persuasion techniques to compromise a human target.

News: Radical Theory Linking Alzheimer's to Infections Could Revolutionize Treatment

There are all kinds of theories—many supported by science—about what causes Alzheimer's disease. Tangles of protein called ß-amyloid (pronounced beta amyloid) plaques are prominently on the list of possible causes or, at least, contributors. An emerging theory of the disease suggests that those plaques aren't the problem, but are actually our brains' defenders. They show up to help fight an infection, and decades later, they become the problem.

Guide: Wi-Fi Cards and Chipsets

Greetings aspiring hackers. I have observed an increasing number of questions, both here on Null-Byte and on other forums, regarding the decision of which USB wireless network adapter to pick from when performing Wi-Fi hacks. So in today's guide I will be tackling this dilemma. First I will explain the ideal requirements, then I will cover chipsets, and lastly I will talk about examples of wireless cards and my personal recommendations. Without further ado, let's cut to the chase.

How To: A Smartphone User's Guide to Surviving Thanksgiving

The holidays are stressful. Between traveling, family, and dinner, Thanksgiving weekend can feel like weeks. Many families have traditions that make the days long, but some of us would rather curl up somewhere and watch our favorite shows. But all is not lost — our phones do so much for us now that they can help make the long stressful weekend much more bearable.

How To: Here's How You Can Make a Real Difference in the Aftermath of the Michael Brown & Eric Garner Grand Jury Decisions

In the aftermath of the unindicted police killings of Michael Brown and Eric Garner, we've been told that the system worked as intended. When our legal system's outcome is at conflict with what a majority of Americans believe is just, it's clear that some changes are needed. But what specifically needs to change? And what can an average citizen with a moral and just cause do to prevent these kinds of tragedies from repeating themselves again and again?

How To: Fuzz Parameters, Directories & More with Ffuf

The art of fuzzing is a vital skill for any penetration tester or hacker to possess. The faster you fuzz, and the more efficiently you are at doing it, the closer you come to achieving your goal, whether that means finding a valid bug or discovering an initial attack vector. A tool called ffuf comes in handy to help speed things along and fuzz for parameters, directors, and more.

How To: Make a buttercream orchid cake

Cake decorating is just another way for an artist to represent the kind of talent and vision they possess. A cake is not just a beautiful, sweet little snack, but a canvas in which an artist can be as creative as they can with using edible tools. This video tutorial shows you how to make a buttercream orchid cake that is sure to wow everybody. Enjoy!

How To: Carve a figure out of wood

Carved wood figures always present an aura of mystery. From the fearsome tribal masks of Africa to the towering totems of British Columbia, indigenous peoples have long created wooden guardians to channel their spirits and protect their peoples. Puppets can even move like us, mock us, or in the case of Pinocchio, come alive. Be careful wood carvers, for in your hands you possess the power of the gods, the power to create, the power to give life, and hopefully the power to make a cool sculptur...

How To: Build & Hide a Campfire from Your Enemies — The Dakota Fire Pit

Fire.  It’s everywhere— always has been.  From the Ordovician Period where the first fossil record of fire appears to the present day everyday uses of the Holocene.  Today, we abundantly create flames (intentionally or unintentionally) in power plants, extractive metallurgy, incendiary bombs, combustion engines, controlled burns, wildfires, fireplaces, campfires, grills, candles, gas stoves and ovens, matches, cigarettes, and the list goes on... Yet with our societies' prodigal use of fire, t...

How To: Use Your Shutter, ISO and Aperture

Learn the Basics of Shooting in "Manual" Mode on your DSLR In this first installment of Photography Basics, we will be exploring and explaining the basics of shooting with a DSLR in various shooting modes. This first webisode is intended to familiarize the user with the basic understanding and functions of ISO, Aperture and Shutter in order to produce more professional looking images.

HowTo: Capture Monster Waves on Camera

Waves are like clouds. Perpetually calming, they possess a serene beauty that never grows old. It's no wonder humans capture the planet's daily natural wonders over and over again. Armed with a camera, they just can't resist the classic postcard shot: Sunrise. Sunset. Clouds. Mountains. Beaches. Waves.

News: 8-Bit Your Desk

Well, you might need to take a few lessons in animation first. Another cool 8-Bit animation (previously, Evil Pixels Demolish New York City). This one is short and sweet. And especially beautiful.

How To: Make a coin disappear by snapping your fingers

This magic trick requires a coin, your ability to snap your fingers, and long sleeves. If you possess all of these then you too can become a world class magician. Learn to make a coin disappear out of the palm of your hand with just the snap of a finger. Although the video is super short, it's straight to the point — no illusion here! Make a coin disappear by snapping your fingers.

How To: zoom into a human eye

Amazing. Truly. This is a WonderHowTo weekend digression. When we get excited, we just gots to share. Ok. Ok. Almost all of our tutorials possess a DIY sensibility and bias. Education is a complex relative of DIY and causes us taxonomical gas. But we love the category, nonetheless.

News: Mobile Game Developer Fined $50,000 by FTC for Soliciting Emails from Minors

Children under the age of 13 possess insight that can blow the minds of their elders, but not the wherewithal to make important life choices for themselves. This is exactly why there are strict rules against marketing cigarettes to them. In 2000, a law went into effect called the Children's Online Privacy Protection Act that institutes similar consumer protections for our youth's online identities, prohibiting companies from soliciting personal information from children under 13 years of age ...

News: Grand Theft Auto 4 Looks Like Gran Turismo 5 with iCEnchancer

Grand Theft Auto 4 was a landmark game. It gave yet another reboot to the already rebooted Grand Theft Auto series, arguably the most prestigious video game in the West. It has a 98 on Metacritic, making it by that measure the best game of modern times. Whatever your stance on the gameplay may be—which has received its fair share of flak in the three years since its release—the graphical steps that the team at Rockstar North took to create their fantasy replica of New York were a major step f...

How To: Measure Radiation in Japan, Plus Other Sources of Common, Everyday Intake

In the wake of the recent tragedy in Japan, Southern Californians have been hyper alert to any news regarding dangerous levels of nuclear radiation drifting over from Fukushima. At this time, official statements from the California Department of Public Health and the EPA are assuaging the population that there is nothing to fear. While there has been some detection of radiation in the air, the current levels recorded are "thousands of times below any conservative level of concern". But despit...