About Alex Long
Hi, I'm Alex. I'm a young computer and tech enthusiast, focused on bringing the best of tech news and hacking to the table. I'll teach anyone who's willing to learn all that I know .about tech.
- Location: USA
- Website: twitter.com
Alex Long's Latest Posts
Goodnight Byte: HackThisSite Walkthrough, Part 3 - Legal Hacker Training
News: 12 Easy Exploits to Raise Thief Skills in Skyrim
News: 9 Easy Exploits to Raise Combat Skills in Skyrim
How To: Set Up Auto-Scheduled Backups to Avoid Data Loss on Any OS
How To: Fix Defective Pixels & Improve Image Quality on LCD & LED Monitors
News : Stop Internet Censorship
Forum Thread : Tutorial Requests
If you do not know, you are free to ask/request for tutorials that you think would be great to see posted on Null Byte. I'm always looking to write stuff that people want to read, so help me, help you! Leave any tutorial requests/ideas in comments on this thread. -Alex
News: Get YouTube's New Layout Today with a Simple JavaScript Hack
News: 18 Easy Exploits to Raise Spellcasting Skills in Skyrim
Community Byte: HackThisSite Walkthrough, Part 3 - Legal Hacker Training
Goodnight Byte: HackThisSite Walkthrough, Part 2 - Legal Hacker Training
News: Lightweight Programs You Should Use for a Faster Linux
News: Performance Hacks & Tweaks for Linux
How To: Run an FTP Server from Home with Linux
How To: Enable Code Syntax Highlighting for Python in the Nano Text Editor
How To: Use Wireshark to Steal Your Own Local Passwords
How To: Recover a Windows Password with Ophcrack
Rainbow Tables: How to Create & Use Them to Crack Passwords
How To: Remove a Windows Password with a Linux Live CD
Community Byte: HackThisSite Walkthrough, Part 2 - Legal Hacker Training
Goodnight Byte: HackThisSite Walkthrough, Part 1 - Legal Hacker Training
How To: Install "Incompatible" Firefox Add-Ons After Upgrading to the New Firefox
How To: Run a Virtual Computer Within Your Host OS with VirtualBox
How To: Chain VPNs for Complete Anonymity
How To: Quickly Encrypt Your Web Browsing Traffic When Connected to Public WiFi
How To: Securely & Anonymously Spend Money Online
How To: Burn an XDG3 Formatted Xbox 360 Game ISO with Windows
How To: Burn an XDG3 Formatted Xbox 360 Game ISO with Linux
How To: Hack Your Firefox User Agent to Spoof Your OS and Browser
News : WebChat for Null Byte IRC!
Community Byte: HackThisSite Walkthrough, Part 1 - Legal Hacker Training
Goodnight Byte: Coding a Web-Based Password Cracker in Python
Nullforce : Web-Based Login Cracker
#!/usr/bin/env python2 #Name : Nullforce - Nullforce.py #Version : v0.1 #Writer(s) : #nullbytez irc.darchoods.net import re, urllib, urllib2 #Global vars host = ""##Login form action URL usr = "" ##Username/email to hax wl = "" ##File path to wordlist badLog ...more
How To: Reveal Saved Browser Passwords with JavaScript Injections
Secure Your Computer, Part 3: Encrypt Your HDD/SSD to Prevent Data Theft
Secure Your Computer, Part 2: Password-Protect the GRUB Bootloader on Dual-Booted PCs
Secure Your Computer, Part 1: Password-Protect your BIOS Boot Screen
How To: Use Tortunnel to Quickly Encrypt Internet Traffic
- Hot
- Latest
-
Farewell Byte: Goodbye Alex, Welcome Allen
-
Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations
-
Advanced Social Engineering: The Mind Hacks Behind Brainwashing
-
News: Fend Off Attackers Using This Scary Hot DIY Pepper Spray
-
Weekend Homework: How to Become a Null Byte Contributor (2/17/2012)
-
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Final Session)
-
How To: Safely Log In to Your SSH Account Without a Password
-
Know Your Rights: How to Escape Unlawful Stops and Police Searches with Social Engineering
-
Xbox LIVE Achievement: How to Earn Free Microsoft Points with Social Engineering
-
Community Byte: HackThisSite, Realistic 5 - Real Hacking Simulations
-
Goodnight Byte: HackThisSite, Realistic 4 - Real Hacking Simulations
-
Weekend Homework: How to Become a Null Byte Contributor (2/10/2012)
-
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Week 2)
-
News: Catch Creeps and Thieves in Action: Set Up a Motion-Activated Webcam DVR in Linux
-
How To: Dropped Your Phone in Water? The Quick Response Guide to Saving Wet Electronics
-
How To: Sneak Past Web Filters and Proxy Blockers with Google Translate
-
Community Contest: Code the Best Hacking Tool, Win Bragging Rights
-
How To: Score Free Game Product Keys with Social Engineering
-
News: Awesome Trick with Prepaid "GoPhones" Nabs You Free Text Messaging for Life
-
Community Byte: HackThisSite, Realistic 4 - Real Hacking Simulations
-
How To: Hack Wireless Router Passwords & Networks Using Hydra
-
How To: Hack WPA WiFi Passwords by Cracking the WPS PIN
-
How To: How Hackers Use Your IP Address to Hack Your Computer & How to Stop It
-
How To: Make Your Own USB Keylogger Hardware
-
How To: Hack Coin-Operated Laudromat Machines for Free Wash & Dry Cycles
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
Rainbow Tables: How to Create & Use Them to Crack Passwords
-
How to Hack Your Game Saves: A Basic Guide to Hex Editing
-
How to Pick Locks: Unlocking Pin and Tumbler Deadbolts
-
How To: Spy on the Web Traffic for Any Computers on Your Network: An Intro to ARP Poisoning
-
News: Hack Your Computer's BIOS to Unlock Hidden Settings, Overclocking & More
-
How To: Create a Custom Arch Linux Distro
-
How To: Reveal Saved Browser Passwords with JavaScript Injections
-
How Null Byte Injections Work: A History of Our Namesake
-
UDP Flooding: How to Kick a Local User Off the Network
-
How To: Permanently Delete Files to Protect Privacy and Passwords
-
How To: Create a Reverse Shell to Remotely Execute Root Commands Over Any Open Port Using NetCat or BASH
-
How To: A Guide to Steganography, Part 1: How to Hide Secret Messages in Images
-
How To: Get Your AMD Graphics, Sound & Other Drivers to Work in Linux on Your Laptop
-
Advanced Social Engineering: The Mind Hacks Behind Brainwashing
-
How To: Conceal a USB Flash Drive in Everyday Items
-
How To: Enable Code Syntax Highlighting for Python in the Nano Text Editor
-
How To: Copy & Convert your Skyrim Game Save from the Xbox 360 to your PC
-
News: 9 Easy Exploits to Raise Combat Skills in Skyrim
-
How To: Run an FTP Server from Home with Linux
-
How To: Chain VPNs for Complete Anonymity
-
How To: A Guide to Steganography, Part 2: How to Hide Files and Archives in Text or Image Files
-
How To: Use JavaScript Injections to Locally Manipulate the Websites You Visit
-
How To: Make a DIY Battery-Powered USB Charger
-
How To: Add Your Own Custom Screensaver Images to Your Kindle Lock Screen
-
Goodnight Byte: HackThisSite, Realistic 2 - Real Hacking Simulations
-
How To: Run a Free Web Server From Home on Windows or Linux with Apache
-
Goodnight Byte: HackThisSite Walkthrough, Part 6 - Legal Hacker Training
-
How To: Mask Your IP Address and Remain Anonymous with OpenVPN for Linux
-
How To: Chain Proxies to Mask Your IP Address and Remain Anonymous on the Web
-
How To: The Hacks Behind Cracking, Part 2: How to Generate Software Keys
-
How To: GPU Accelerate Cracking Passwords with Hashcat
-
How To: Nab Free eBooks Using Google
-
How To: Create a Bump Key to Open Any Door
-
How To: Make the World's Hottest Burning Man-Made Substance: Thermite