About Alex Long
Hi, I'm Alex. I'm a young computer and tech enthusiast, focused on bringing the best of tech news and hacking to the table. I'll teach anyone who's willing to learn all that I know .about tech.
- Location: USA
- Website: twitter.com
Alex Long's Latest Posts
Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations
Advanced Social Engineering: The Mind Hacks Behind Brainwashing
News: Fend Off Attackers Using This Scary Hot DIY Pepper Spray
Weekend Homework: How to Become a Null Byte Contributor (2/17/2012)
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Final Session)
How To: Safely Log In to Your SSH Account Without a Password
Know Your Rights: How to Escape Unlawful Stops and Police Searches with Social Engineering
Xbox LIVE Achievement: How to Earn Free Microsoft Points with Social Engineering
Community Byte: HackThisSite, Realistic 5 - Real Hacking Simulations
Goodnight Byte: HackThisSite, Realistic 4 - Real Hacking Simulations
Weekend Homework: How to Become a Null Byte Contributor (2/10/2012)
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Week 2)
News: Catch Creeps and Thieves in Action: Set Up a Motion-Activated Webcam DVR in Linux
How To: Dropped Your Phone in Water? The Quick Response Guide to Saving Wet Electronics
How To: Sneak Past Web Filters and Proxy Blockers with Google Translate
Community Contest: Code the Best Hacking Tool, Win Bragging Rights
How To: Score Free Game Product Keys with Social Engineering
News: Awesome Trick with Prepaid "GoPhones" Nabs You Free Text Messaging for Life
Community Byte: HackThisSite, Realistic 4 - Real Hacking Simulations
Goodnight Byte: HackThisSite, Realistic 3 - Real Hacking Simulations
How to Pick Locks: Unlocking Pin and Tumbler Deadbolts
How To: Unlock Padlocks Without a Key Using Cheap DIY Shims
Weekend Homework: How to Become a Null Byte Contributor (2/3/2012)
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers
News : Hardvard.edu Remote SQL 0day
Root Exploit: Memodipper Gets You Root Access to Systems Running Linux Kernel 2.6.39+
How To: Conceal a USB Flash Drive in Everyday Items
Community Byte: HackThisSite, Realistic 3 - Real Hacking Simulations
Goodnight Byte: HackThisSite, Realistic 2 - Real Hacking Simulations
Weekend Homework: How to Become a Null Byte Contributor (1/29/2012)
How To: Play Emulated Games on Linux with Your Xbox 360 Controller
Forbes Exploited: XSS Vulnerabilities Allow Phishers to Hijack Sessions & Steal Logins
How To: Make the World's Hottest Burning Man-Made Substance: Thermite
How To: Filter Unwanted Calls & SMS for Free with Google Voice
News: Block Cell Phone Signals on the Carrier of Your Choice by Hacking a Radio Frequency Jammer
How To: Make a DIY Battery-Powered USB Charger
News : Flaw in the Latest Linux Graphical Server Allows Passwordless Logins
Community Byte: HackThisSite, Realistic 2 - Real Hacking Simulations
Goodnight Byte: HackThisSite, Realistic 1 - Real Hacking Simulations
Next Page
Prev Page
- Hot
- Latest
-
Farewell Byte: Goodbye Alex, Welcome Allen
-
Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations
-
Advanced Social Engineering: The Mind Hacks Behind Brainwashing
-
News: Fend Off Attackers Using This Scary Hot DIY Pepper Spray
-
Weekend Homework: How to Become a Null Byte Contributor (2/17/2012)
-
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Final Session)
-
How To: Safely Log In to Your SSH Account Without a Password
-
Know Your Rights: How to Escape Unlawful Stops and Police Searches with Social Engineering
-
Xbox LIVE Achievement: How to Earn Free Microsoft Points with Social Engineering
-
Community Byte: HackThisSite, Realistic 5 - Real Hacking Simulations
-
Goodnight Byte: HackThisSite, Realistic 4 - Real Hacking Simulations
-
Weekend Homework: How to Become a Null Byte Contributor (2/10/2012)
-
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Week 2)
-
News: Catch Creeps and Thieves in Action: Set Up a Motion-Activated Webcam DVR in Linux
-
How To: Dropped Your Phone in Water? The Quick Response Guide to Saving Wet Electronics
-
How To: Sneak Past Web Filters and Proxy Blockers with Google Translate
-
Community Contest: Code the Best Hacking Tool, Win Bragging Rights
-
How To: Score Free Game Product Keys with Social Engineering
-
News: Awesome Trick with Prepaid "GoPhones" Nabs You Free Text Messaging for Life
-
Community Byte: HackThisSite, Realistic 4 - Real Hacking Simulations
-
News: Hack Your Computer's BIOS to Unlock Hidden Settings, Overclocking & More
-
How To: Hack WPA WiFi Passwords by Cracking the WPS PIN
-
How to Hack Your Game Saves: A Basic Guide to Hex Editing
-
How To: Chain VPNs for Complete Anonymity
-
How To: Chain Proxies to Mask Your IP Address and Remain Anonymous on the Web
-
How To: Hack Coin-Operated Laudromat Machines for Free Wash & Dry Cycles
-
How To: The Hacks Behind Cracking, Part 2: How to Generate Software Keys
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How To: Create a Reverse Shell to Remotely Execute Root Commands Over Any Open Port Using NetCat or BASH
-
Rainbow Tables: How to Create & Use Them to Crack Passwords
-
How To: Nab Free eBooks Using Google
-
How To: Enable Code Syntax Highlighting for Python in the Nano Text Editor
-
UDP Flooding: How to Kick a Local User Off the Network
-
How To: How Hackers Use Your IP Address to Hack Your Computer & How to Stop It
-
How To: Fix Your Overheating, RRoD, or E74 Xbox 360 with Mere Pennies
-
How To: Create a Bump Key to Open Any Door
-
Goodnight Byte: HackThisSite, Realistic 2 - Real Hacking Simulations
-
Advanced Social Engineering: The Mind Hacks Behind Brainwashing
-
How To: Customize Your Linux Desktop
-
Social Engineering, Part 2: Hacking a Friend's Facebook Password
-
How To: GPU Accelerate Cracking Passwords with Hashcat
-
How To: Run an FTP Server from Home with Linux
-
How To: Spy on the Web Traffic for Any Computers on Your Network: An Intro to ARP Poisoning
-
How To: A Guide to Steganography, Part 1: How to Hide Secret Messages in Images
-
How To: Create a Custom Arch Linux Distro
-
How To: Mask Your IP Address and Remain Anonymous with OpenVPN for Linux
-
How To: A Guide to Steganography, Part 2: How to Hide Files and Archives in Text or Image Files
-
How To: Become Anonymous on the Internet Using Tor
-
How To: The Penny Pinchers Guide to Eating Cost Effectively Without Relying on Ramen
-
How To: How Anyone Can Retire Early & Wealthy, Part 1: CDs
-
How To: Remotely Control Computers Over VNC Securely with SSH
-
How To: Downgrade and Jailbreak Your iOS Devices Stock Firmware for the Holidays
-
How To: Windows 7 Won't Boot? Here's How To Fix Your Master Boot Record
-
How To: Use Wireshark to Steal Your Own Local Passwords
-
How To: Use Tortunnel to Quickly Encrypt Internet Traffic
-
How To: Use JavaScript Injections to Locally Manipulate the Websites You Visit
-
How To: A Guide to Steganography, Part 3: How to Hide Text and Images in Pictures
-
How To: Hack Wireless Router Passwords & Networks Using Hydra
-
How To: Hack a Radio to Pick Up Different Frequencies - Including Law Enforcement & More
-
How To: Make the World's Hottest Burning Man-Made Substance: Thermite