|
- EX – Exam Centre - Engineering Science 2T9 Orientation
Located at 255 McCaul Street, the Exam Centre is where you will be taking many of your midterms and final exams The Exam Centre has rooms for both larger and smaller classes, so you may find yourself taking exams with your entire section at the same time or with 30-40 students
- How to Hack Your Game Saves: A Basic Guide to Hex Editing
Requirements A game save extracted from your save-device You can learn how to do that on your Xbox 360 from the information contained in this Null Byte HxD A hex editing program that will be used to modify the data contained within our game saves Windows OS If you already have your game saves extracted, there are a ton of hex editors for other platforms
- How to OSX VM Image Install Guide :: Null Byte
I was on our new #nullbyte IRC channel when someone told me how tedious it is to install an OSX Virtual Machine on Virtual Box (I think it was wawa) We all
- How to Build a Portable Pen-Testing Pi Box :: Null Byte
I bought almost all parts from Amazon Raspberry Pi Makerfire 7" LCD screen Rii mini wireless keyboard and mouse PNY battery pack MicroSD card 12V 2A DC power adapter (the power supply for the screen came from a old Netgear Router box I had never used) HDMI cable (excluded from this picture, as that is essentially a household item these days) To make this project even cheaper, you could swap
- How to Use Kismet to Watch Wi-Fi User Activity Through Walls
It should be noted that can also be used as a kind of neighborhood watch to detect suspicious wireless activity in neighborhoods This can help spot signs of cybercrime, which can be reported to someone who knows how to investigate it since normal cops typically don't Whatever your intended use, you don't need much to get started diving into peering straight through the walls around you
- How to Identify Web Application Firewalls with Wafw00f Nmap
Web application firewalls are one of the strongest defenses a web app has, but they can be vulnerable if the firewall version used is known to an attacker
- How to Run Your Favorite Graphical X Applications Over SSH
Trusted vs Untrusted Graphical X Forwarding If you want to run something more complicated than a command-line program, SSH has us covered by offering x11 forwarding This means that, provided that there is a graphical X window running on the remote computer, we can forward the data from the application running on the remote machine to make it look like it's running on the local device instead
- How-To Guides from Null Byte - Page 19 :: Null Byte
Null Byte is a white hat hacker world for anyone interested in hacking, science, networking, social engineering, security, pen-testing, getting root, zero days, etc
|
|
|