About Alex Long
Hi, I'm Alex. I'm a young computer and tech enthusiast, focused on bringing the best of tech news and hacking to the table. I'll teach anyone who's willing to learn all that I know .about tech.
- Location: USA
- Website: twitter.com
Alex Long's Latest Posts
How To: Recover Deleted Files in Windows
Community Byte: Coding a Web-Based Password Cracker in Python
How To: Permanently Delete Files to Protect Privacy and Passwords
Goodnight Byte: Hack Our IRC Bot to Issue Commands
News: Complete Arch Linux Installation, Part 2: Graphical User Interface & Packages
Forum Thread : Python IRC Bot, source v2
#!/usr/bin/env python2.7 import sys #List of pre-made libararies to import import socket import string import re from time import sleep safe = ['AlexLong'] #Users that can control the bots actions #Global Variables host="irc.freenode.org" #This is the IRC server variable. p ...more
News: Complete Arch Linux Installation, Part 1: Install & Configure Arch
How To: Create a Custom Arch Linux Distro
How To: Fix Your Overheating, RRoD, or E74 Xbox 360 with Mere Pennies
How To: Mask Your IP Address and Remain Anonymous with OpenVPN for Linux
How To: Give Your GRand Unified Bootloader a Custom Theme
How To: Recover WinRAR and Zip Passwords
Community Byte: Hack Our IRC Bot to Issue Commands
Goodnight Byte: Coding an IRC Bot in Python (For Beginners)
How To: A Guide to Steganography, Part 3: How to Hide Text and Images in Pictures
Community Byte 1 : nullbot.py (IRC robot | source)
Here is the source code to the nullbot.py IRC bot that was made on 10/21/2011 in #nullbytez. #!/usr/bin/env python2.7 import sys #List of pre-made libararies to import import socket import string from time import sleep #Global Variables host="irc.freenode.net" #This is the ...more
How To: A Guide to Steganography, Part 2: How to Hide Files and Archives in Text or Image Files
How To: A Guide to Steganography, Part 1: How to Hide Secret Messages in Images
How To: Make an Unbreakable Linux Password Using a SHA-2 Hash Algorithm
How To: Nab Free eBooks Using Google
How To: How Hackers Steal Your Cash on Trusted Sites & How to Prevent Against It
How To: Hack Wireless Router Passwords & Networks Using Hydra
How To: How Hackers Use Your IP Address to Hack Your Computer & How to Stop It
Community Byte: Coding an IRC Bot in Python (For Beginners)
How To: How Hackers Take Your Encrypted Passwords & Crack Them
How To: How Cross-Site Scripting (XSS) Attacks Sneak into Unprotected Websites (Plus: How to Block Them)
How To: Use JavaScript Injections to Locally Manipulate the Websites You Visit
How To: Protect Your Mac & Linux Computers from Hacks by Creating an iptables Firewall
How To: Chain Proxies to Mask Your IP Address and Remain Anonymous on the Web
How To: Create a Bump Key to Open Any Door
How To: Stream Media to a PS3 or Xbox 360 from Mac & Linux Computers
How To: Share Your Laptop's Wireless Internet with Ethernet Devices
How To: Customize Your Linux Desktop
How To: Get Free Wi-Fi from Hotels & More
How To: Carve Saved Passwords Using Cain
How To: Become Anonymous on the Internet Using Tor
How To: Run Windows from Inside Linux
How To: Mine Bitcoin and Make Money
How To: Defeat SSL in Practice with SSL Strip
- Hot
- Latest
-
Farewell Byte: Goodbye Alex, Welcome Allen
-
Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations
-
Advanced Social Engineering: The Mind Hacks Behind Brainwashing
-
News: Fend Off Attackers Using This Scary Hot DIY Pepper Spray
-
Weekend Homework: How to Become a Null Byte Contributor (2/17/2012)
-
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Final Session)
-
How To: Safely Log In to Your SSH Account Without a Password
-
Know Your Rights: How to Escape Unlawful Stops and Police Searches with Social Engineering
-
Xbox LIVE Achievement: How to Earn Free Microsoft Points with Social Engineering
-
Community Byte: HackThisSite, Realistic 5 - Real Hacking Simulations
-
Goodnight Byte: HackThisSite, Realistic 4 - Real Hacking Simulations
-
Weekend Homework: How to Become a Null Byte Contributor (2/10/2012)
-
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Week 2)
-
News: Catch Creeps and Thieves in Action: Set Up a Motion-Activated Webcam DVR in Linux
-
How To: Dropped Your Phone in Water? The Quick Response Guide to Saving Wet Electronics
-
How To: Sneak Past Web Filters and Proxy Blockers with Google Translate
-
Community Contest: Code the Best Hacking Tool, Win Bragging Rights
-
How To: Score Free Game Product Keys with Social Engineering
-
News: Awesome Trick with Prepaid "GoPhones" Nabs You Free Text Messaging for Life
-
Community Byte: HackThisSite, Realistic 4 - Real Hacking Simulations
-
Rainbow Tables: How to Create & Use Them to Crack Passwords
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How To: Hack Coin-Operated Laudromat Machines for Free Wash & Dry Cycles
-
How to Hack Your Game Saves: A Basic Guide to Hex Editing
-
How To: Create a Bump Key to Open Any Door
-
How To: Fix Your Overheating, RRoD, or E74 Xbox 360 with Mere Pennies
-
How To: How Hackers Use Your IP Address to Hack Your Computer & How to Stop It
-
How To: The Hacks Behind Cracking, Part 2: How to Generate Software Keys
-
How To: Hack WPA WiFi Passwords by Cracking the WPS PIN
-
How To: Spy on the Web Traffic for Any Computers on Your Network: An Intro to ARP Poisoning
-
How To: GPU Accelerate Cracking Passwords with Hashcat
-
How Null Byte Injections Work: A History of Our Namesake
-
How To: Install an Off-the-Shelf Hard Drive in an Xbox 360 (Get 10x the GB for Your Money)
-
Mastering Security, Part 1: How to Manage and Create Strong Passwords
-
How To: Create a Reverse Shell to Remotely Execute Root Commands Over Any Open Port Using NetCat or BASH
-
News: Hack Your Computer's BIOS to Unlock Hidden Settings, Overclocking & More
-
Remove Your Online Identity: The Ultimate Guide to Anonymity and Security on the Internet
-
How To: Enable Code Syntax Highlighting for Python in the Nano Text Editor
-
How To: Nab Free eBooks Using Google
-
How To: Add Your Own Custom Screensaver Images to Your Kindle Lock Screen
-
How To: How Credit Card Algorithms Work: The Anatomy of Credit Card Numbers
-
Social Engineering, Part 2: Hacking a Friend's Facebook Password
-
How To: Make the World's Hottest Burning Man-Made Substance: Thermite
-
How To: Become Anonymous on the Internet Using Tor
-
How To: Unban Your Xbox LIVE Account That is Banned Until 12/31/9999 by Tricking Microsoft's Banning System
-
How To: Hack a Radio to Pick Up Different Frequencies - Including Law Enforcement & More
-
How To: Use Tortunnel to Quickly Encrypt Internet Traffic
-
How To: Mask Your IP Address and Remain Anonymous with OpenVPN for Linux
-
Advanced Social Engineering: The Mind Hacks Behind Brainwashing
-
How To: Safely Log In to Your SSH Account Without a Password
-
How To: The Penny Pinchers Guide to Eating Cost Effectively Without Relying on Ramen
-
How To: Social Engineer Your Debt Collectors Into Giving You More Time to Pay Bills
-
How To: Shorten URLs from the Command Line with Python
-
How To: A Guide to Steganography, Part 1: How to Hide Secret Messages in Images
-
How To: Hack Wireless Router Passwords & Networks Using Hydra
-
How To: Use JavaScript Injections to Locally Manipulate the Websites You Visit
-
How To: A Guide to Steganography, Part 3: How to Hide Text and Images in Pictures
-
How To: Mine Bitcoin and Make Money
-
How To: Make Your Own USB Keylogger Hardware
-
How To: Get Your AMD Graphics, Sound & Other Drivers to Work in Linux on Your Laptop