About Alex Long
Hi, I'm Alex. I'm a young computer and tech enthusiast, focused on bringing the best of tech news and hacking to the table. I'll teach anyone who's willing to learn all that I know .about tech.
- Location: USA
- Website: twitter.com
Alex Long's Latest Posts
How To: How Credit Card Algorithms Work: The Anatomy of Credit Card Numbers
How To: Downgrade and Jailbreak Your iOS Devices Stock Firmware for the Holidays
How To: Install an Off-the-Shelf Hard Drive in an Xbox 360 (Get 10x the GB for Your Money)
How To: Get Unlimited Money in Skyrim by Hacking Your Game Saves
News: The Top 10 Must-Have Skyrim Mods
How To: Defend from Keyloggers in Firefox with Keystroke Encryption
Community Byte: HackThisSite Walkthrough, Part 7 - Legal Hacker Training
Forum Thread : How to Become a Mod & What Your Duties Are
Hello all, Null Byte is always looking for contributors. Why not be part of something great and give back to the community! If you consistently comment posts and contribute an article, you can be a mod. In order to become a mod and stay a mod, you have to meet just a few requ ...more
Goodnight Byte: HackThisSite Walkthrough, Part 6 - Legal Hacker Training
How To: Hack Your Xbox Gamerscore
How To: Copy & Convert your Skyrim Game Save from the Xbox 360 to your PC
News: A Last Resort Method to Fix the Xbox 360 E74 Error (The Red Ring of Death)
How To: Windows 7 Won't Boot? Here's How To Fix Your Master Boot Record
How To: The Novice Guide to Teaching Yourself How to Program (Learning Resources Included)
How To: Fix the Channel -1 Glitch in Airodump on the Latest Kernel
How To: Fix the Unreadable USB Glitch in VirtualBox
How To: Install Linux to a Thumb Drive
How to Hack Your Game Saves: A Basic Guide to Hex Editing
How To: Make Skyrim (& Other Games) Utilize AMD Crossfire Before the Patch is Released
How To: GPU Accelerate Cracking Passwords with Hashcat
How To: Fix a Bricked iPhone or iPod Touch After a Failed Jailbreak
Community Byte: HackThisSite Walkthrough, Part 6 - Legal Hacker Training
Goodnight Byte: HackThisSite Walkthrough, Part 5 - Legal Hacker Training
How To: Safely Overclock Your GPU, CPU & RAM for Better Speed & Performance
News: Weaknesses in GameStop's Rewards System Produces Free Game Rentals… Even Cash
How To: Proof of Social Engineering Success!
How To: Shorten URLs from the Command Line with Python
Community Byte: HackThisSite Walkthrough, Part 5 - Legal Hacker Training
Goodnight Byte: HackThisSite Walkthrough, Part 4 - Legal Hacker Training
How To: Social Engineer Your Way Into an Amusement Park for Free
How To: Create a Free SSH Account on Shellmix to Use as a Webhost & More
How To: Backup All of Your Xbox 360 Data to Your Computer
How To: Code Your Own Twitter Client in Python Using OAuth
How To: Encrypt your Skype Messages to Thwart Snooping Eyes Using Pidgin
Remove Your Online Identity: The Ultimate Guide to Anonymity and Security on the Internet
How To: Spy on the Web Traffic for Any Computers on Your Network: An Intro to ARP Poisoning
Coding Basics: A Guide to Choosing Your Optimal Text Editor or IDE
Community Byte: HackThisSite Walkthrough, Part 4 - Legal Hacker Training
- Hot
- Latest
-
Farewell Byte: Goodbye Alex, Welcome Allen
-
Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations
-
Advanced Social Engineering: The Mind Hacks Behind Brainwashing
-
News: Fend Off Attackers Using This Scary Hot DIY Pepper Spray
-
Weekend Homework: How to Become a Null Byte Contributor (2/17/2012)
-
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Final Session)
-
How To: Safely Log In to Your SSH Account Without a Password
-
Know Your Rights: How to Escape Unlawful Stops and Police Searches with Social Engineering
-
Xbox LIVE Achievement: How to Earn Free Microsoft Points with Social Engineering
-
Community Byte: HackThisSite, Realistic 5 - Real Hacking Simulations
-
Goodnight Byte: HackThisSite, Realistic 4 - Real Hacking Simulations
-
Weekend Homework: How to Become a Null Byte Contributor (2/10/2012)
-
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Week 2)
-
News: Catch Creeps and Thieves in Action: Set Up a Motion-Activated Webcam DVR in Linux
-
How To: Dropped Your Phone in Water? The Quick Response Guide to Saving Wet Electronics
-
How To: Sneak Past Web Filters and Proxy Blockers with Google Translate
-
Community Contest: Code the Best Hacking Tool, Win Bragging Rights
-
How To: Score Free Game Product Keys with Social Engineering
-
News: Awesome Trick with Prepaid "GoPhones" Nabs You Free Text Messaging for Life
-
Community Byte: HackThisSite, Realistic 4 - Real Hacking Simulations
-
Rainbow Tables: How to Create & Use Them to Crack Passwords
-
How to Hack Your Game Saves: A Basic Guide to Hex Editing
-
How To: Create a Reverse Shell to Remotely Execute Root Commands Over Any Open Port Using NetCat or BASH
-
How Null Byte Injections Work: A History of Our Namesake
-
How To: Hack Coin-Operated Laudromat Machines for Free Wash & Dry Cycles
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How To: Hack WPA WiFi Passwords by Cracking the WPS PIN
-
How To: The Hacks Behind Cracking, Part 2: How to Generate Software Keys
-
News: Hack Your Computer's BIOS to Unlock Hidden Settings, Overclocking & More
-
How To: Get Your AMD Graphics, Sound & Other Drivers to Work in Linux on Your Laptop
-
How To: Use Wireshark to Steal Your Own Local Passwords
-
How To: Hack Wireless Router Passwords & Networks Using Hydra
-
How To: Use JavaScript Injections to Locally Manipulate the Websites You Visit
-
How To: Mine Bitcoin and Make Money
-
How To: How Hackers Use Your IP Address to Hack Your Computer & How to Stop It
-
How To: Reveal Saved Browser Passwords with JavaScript Injections
-
How To: Fix Defective Pixels & Improve Image Quality on LCD & LED Monitors
-
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Week 2)
-
How To: A Guide to Steganography, Part 2: How to Hide Files and Archives in Text or Image Files
-
How To: Customize Your Linux Desktop
-
Social Engineering, Part 1: Scoring a Free Cell Phone
-
How To: A Guide to Steganography, Part 1: How to Hide Secret Messages in Images
-
How To: Spy on the Web Traffic for Any Computers on Your Network: An Intro to ARP Poisoning
-
How To: Create a Bump Key to Open Any Door
-
How To: GPU Accelerate Cracking Passwords with Hashcat
-
UDP Flooding: How to Kick a Local User Off the Network
-
How To: Create a Custom Arch Linux Distro
-
How To: A Guide to Steganography, Part 3: How to Hide Text and Images in Pictures
-
How To: Enable Code Syntax Highlighting for Python in the Nano Text Editor
-
How To: Nab Free eBooks Using Google
-
Remove Your Online Identity: The Ultimate Guide to Anonymity and Security on the Internet
-
How To: Make Your Own USB Keylogger Hardware
-
News: 18 Easy Exploits to Raise Spellcasting Skills in Skyrim
-
How To: Fix a Bricked iPhone or iPod Touch After a Failed Jailbreak
-
News: 9 Easy Exploits to Raise Combat Skills in Skyrim
-
How To: Fix Your Overheating, RRoD, or E74 Xbox 360 with Mere Pennies
-
How To: Become Anonymous on the Internet Using Tor
-
How To: Hack Mac OS X Lion Passwords
-
How To: Unban Your Xbox LIVE Account That is Banned Until 12/31/9999 by Tricking Microsoft's Banning System
-
How To: Spider Web Pages with Nmap for SQLi Vulnerabilities