About Alex Long
Hi, I'm Alex. I'm a young computer and tech enthusiast, focused on bringing the best of tech news and hacking to the table. I'll teach anyone who's willing to learn all that I know .about tech.
- Location: USA
- Website: twitter.com
Alex Long's Popular Posts
How to Hack Your Game Saves: A Basic Guide to Hex Editing
Rainbow Tables: How to Create & Use Them to Crack Passwords
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
How To: Hack WPA WiFi Passwords by Cracking the WPS PIN
How To: Get Your AMD Graphics, Sound & Other Drivers to Work in Linux on Your Laptop
How To: Use Wireshark to Steal Your Own Local Passwords
How To: Create a Reverse Shell to Remotely Execute Root Commands Over Any Open Port Using NetCat or BASH
How To: The Hacks Behind Cracking, Part 2: How to Generate Software Keys
How To: Use JavaScript Injections to Locally Manipulate the Websites You Visit
How To: Defend from Keyloggers in Firefox with Keystroke Encryption
News: Catch Creeps and Thieves in Action: Set Up a Motion-Activated Webcam DVR in Linux
How To: Hack Wireless Router Passwords & Networks Using Hydra
How To: How Hackers Use Your IP Address to Hack Your Computer & How to Stop It
UDP Flooding: How to Kick a Local User Off the Network
How Null Byte Injections Work: A History of Our Namesake
How To: Reveal Saved Browser Passwords with JavaScript Injections
How To: Add Your Own Custom Screensaver Images to Your Kindle Lock Screen
How To: Fix Defective Pixels & Improve Image Quality on LCD & LED Monitors
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Week 2)
How To: A Guide to Steganography, Part 2: How to Hide Files and Archives in Text or Image Files
How To: Permanently Delete Files to Protect Privacy and Passwords
How To: Customize Your Linux Desktop
How To: Get Free Wi-Fi from Hotels & More
How To: Install Linux to a Thumb Drive
How To: A Guide to Steganography, Part 1: How to Hide Secret Messages in Images
How To: Spy on the Web Traffic for Any Computers on Your Network: An Intro to ARP Poisoning
How To: Create a Bump Key to Open Any Door
How To: GPU Accelerate Cracking Passwords with Hashcat
How To: Create a Custom Arch Linux Distro
How To: A Guide to Steganography, Part 3: How to Hide Text and Images in Pictures
How To: Enable Code Syntax Highlighting for Python in the Nano Text Editor
How To: Nab Free eBooks Using Google
How To: Mine Bitcoin and Make Money
Remove Your Online Identity: The Ultimate Guide to Anonymity and Security on the Internet
How To: Make Your Own USB Keylogger Hardware
News: 18 Easy Exploits to Raise Spellcasting Skills in Skyrim
How To: Fix a Bricked iPhone or iPod Touch After a Failed Jailbreak
News: 9 Easy Exploits to Raise Combat Skills in Skyrim
Next Page
Prev Page
- Hot
- Latest
-
Farewell Byte: Goodbye Alex, Welcome Allen
-
Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations
-
Advanced Social Engineering: The Mind Hacks Behind Brainwashing
-
News: Fend Off Attackers Using This Scary Hot DIY Pepper Spray
-
Weekend Homework: How to Become a Null Byte Contributor (2/17/2012)
-
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Final Session)
-
How To: Safely Log In to Your SSH Account Without a Password
-
Know Your Rights: How to Escape Unlawful Stops and Police Searches with Social Engineering
-
Xbox LIVE Achievement: How to Earn Free Microsoft Points with Social Engineering
-
Community Byte: HackThisSite, Realistic 5 - Real Hacking Simulations
-
Goodnight Byte: HackThisSite, Realistic 4 - Real Hacking Simulations
-
Weekend Homework: How to Become a Null Byte Contributor (2/10/2012)
-
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Week 2)
-
News: Catch Creeps and Thieves in Action: Set Up a Motion-Activated Webcam DVR in Linux
-
How To: Dropped Your Phone in Water? The Quick Response Guide to Saving Wet Electronics
-
How To: Sneak Past Web Filters and Proxy Blockers with Google Translate
-
Community Contest: Code the Best Hacking Tool, Win Bragging Rights
-
How To: Score Free Game Product Keys with Social Engineering
-
News: Awesome Trick with Prepaid "GoPhones" Nabs You Free Text Messaging for Life
-
Community Byte: HackThisSite, Realistic 4 - Real Hacking Simulations
-
How To: Hack Coin-Operated Laudromat Machines for Free Wash & Dry Cycles
-
How to Hack Your Game Saves: A Basic Guide to Hex Editing
-
Rainbow Tables: How to Create & Use Them to Crack Passwords
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How To: Hack WPA WiFi Passwords by Cracking the WPS PIN
-
How To: Get Your AMD Graphics, Sound & Other Drivers to Work in Linux on Your Laptop
-
How To: Use Wireshark to Steal Your Own Local Passwords
-
How To: Create a Reverse Shell to Remotely Execute Root Commands Over Any Open Port Using NetCat or BASH
-
News: Hack Your Computer's BIOS to Unlock Hidden Settings, Overclocking & More
-
How To: The Hacks Behind Cracking, Part 2: How to Generate Software Keys
-
How To: Use JavaScript Injections to Locally Manipulate the Websites You Visit
-
How To: Defend from Keyloggers in Firefox with Keystroke Encryption
-
News: Catch Creeps and Thieves in Action: Set Up a Motion-Activated Webcam DVR in Linux
-
How To: Hack Wireless Router Passwords & Networks Using Hydra
-
How To: How Hackers Use Your IP Address to Hack Your Computer & How to Stop It
-
UDP Flooding: How to Kick a Local User Off the Network
-
How Null Byte Injections Work: A History of Our Namesake
-
How To: Reveal Saved Browser Passwords with JavaScript Injections
-
How To: Add Your Own Custom Screensaver Images to Your Kindle Lock Screen
-
How To: Fix Defective Pixels & Improve Image Quality on LCD & LED Monitors
-
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Week 2)
-
How To: A Guide to Steganography, Part 2: How to Hide Files and Archives in Text or Image Files
-
How To: Permanently Delete Files to Protect Privacy and Passwords
-
How To: Customize Your Linux Desktop
-
How To: Get Free Wi-Fi from Hotels & More
-
How To: Install Linux to a Thumb Drive
-
How To: A Guide to Steganography, Part 1: How to Hide Secret Messages in Images
-
How To: Spy on the Web Traffic for Any Computers on Your Network: An Intro to ARP Poisoning
-
How To: Create a Bump Key to Open Any Door
-
How To: GPU Accelerate Cracking Passwords with Hashcat
-
How To: Create a Custom Arch Linux Distro
-
How To: A Guide to Steganography, Part 3: How to Hide Text and Images in Pictures
-
How To: Enable Code Syntax Highlighting for Python in the Nano Text Editor
-
How To: Nab Free eBooks Using Google
-
How To: Mine Bitcoin and Make Money
-
Remove Your Online Identity: The Ultimate Guide to Anonymity and Security on the Internet
-
How To: Make Your Own USB Keylogger Hardware
-
News: 18 Easy Exploits to Raise Spellcasting Skills in Skyrim
-
How To: Fix a Bricked iPhone or iPod Touch After a Failed Jailbreak
-
News: 9 Easy Exploits to Raise Combat Skills in Skyrim