About Alex Long
Hi, I'm Alex. I'm a young computer and tech enthusiast, focused on bringing the best of tech news and hacking to the table. I'll teach anyone who's willing to learn all that I know .about tech.
- Location: USA
- Website: twitter.com
Alex Long's Popular Posts
How To: Spider Web Pages with Nmap for SQLi Vulnerabilities
How To: Add Your Own Custom Screensaver Images to Your Kindle Lock Screen
How To: How Credit Card Algorithms Work: The Anatomy of Credit Card Numbers
How To: Create a Free SSH Account on Shellmix to Use as a Webhost & More
How To: Backup All of Your Xbox 360 Data to Your Computer
How To: Recover a Windows Password with Ophcrack
Social Engineering, Part 2: Hacking a Friend's Facebook Password
How To: How Hackers Steal Your Internet & How to Defend Against It
Root Exploit: Memodipper Gets You Root Access to Systems Running Linux Kernel 2.6.39+
How To: Conceal a USB Flash Drive in Everyday Items
Community Byte: HackThisSite, Realistic 3 - Real Hacking Simulations
Forbes Exploited: XSS Vulnerabilities Allow Phishers to Hijack Sessions & Steal Logins
Goodnight Byte: HackThisSite, Realistic 1 - Real Hacking Simulations
How To: How Anyone Can Retire Early & Wealthy, Part 1: CDs
How To: Turn Your House Lights On & Off Using the Internet
How To: Hack a Radio to Pick Up Different Frequencies - Including Law Enforcement & More
News: Flaw in Wal-Mart Returns System Allows Major Thefts to Go Unnoticed
How To: Install an Off-the-Shelf Hard Drive in an Xbox 360 (Get 10x the GB for Your Money)
How To: Defend from Keyloggers in Firefox with Keystroke Encryption
How To: The Social Engineer's Guide to Buying an Expensive Laptop
How To: Remove a Windows Password with a Linux Live CD
How To: Quickly Encrypt Your Web Browsing Traffic When Connected to Public WiFi
How To: Hack Your Firefox User Agent to Spoof Your OS and Browser
Secure Your Computer, Part 2: Password-Protect the GRUB Bootloader on Dual-Booted PCs
How To: Recover WinRAR and Zip Passwords
How To: How Hackers Take Your Encrypted Passwords & Crack Them
How To: Protect Your Mac & Linux Computers from Hacks by Creating an iptables Firewall
How To: Chain Proxies to Mask Your IP Address and Remain Anonymous on the Web
How To: Use Cygwin to Run Linux Apps on Windows
Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations
Xbox LIVE Achievement: How to Earn Free Microsoft Points with Social Engineering
How To: Sneak Past Web Filters and Proxy Blockers with Google Translate
How to Pick Locks: Unlocking Pin and Tumbler Deadbolts
How To: Unlock Padlocks Without a Key Using Cheap DIY Shims
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers
Goodnight Byte: HackThisSite, Realistic 2 - Real Hacking Simulations
News: Block Cell Phone Signals on the Carrier of Your Choice by Hacking a Radio Frequency Jammer
Community Byte: HackThisSite, Realistic 2 - Real Hacking Simulations
News: Advanced Cracking Techniques, Part 2: Intelligent Bruteforcing
- Hot
- Latest
-
Farewell Byte: Goodbye Alex, Welcome Allen
-
Goodnight Byte: HackThisSite, Realistic 5 - Real Hacking Simulations
-
Advanced Social Engineering: The Mind Hacks Behind Brainwashing
-
News: Fend Off Attackers Using This Scary Hot DIY Pepper Spray
-
Weekend Homework: How to Become a Null Byte Contributor (2/17/2012)
-
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Final Session)
-
How To: Safely Log In to Your SSH Account Without a Password
-
Know Your Rights: How to Escape Unlawful Stops and Police Searches with Social Engineering
-
Xbox LIVE Achievement: How to Earn Free Microsoft Points with Social Engineering
-
Community Byte: HackThisSite, Realistic 5 - Real Hacking Simulations
-
Goodnight Byte: HackThisSite, Realistic 4 - Real Hacking Simulations
-
Weekend Homework: How to Become a Null Byte Contributor (2/10/2012)
-
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Week 2)
-
News: Catch Creeps and Thieves in Action: Set Up a Motion-Activated Webcam DVR in Linux
-
How To: Dropped Your Phone in Water? The Quick Response Guide to Saving Wet Electronics
-
How To: Sneak Past Web Filters and Proxy Blockers with Google Translate
-
Community Contest: Code the Best Hacking Tool, Win Bragging Rights
-
How To: Score Free Game Product Keys with Social Engineering
-
News: Awesome Trick with Prepaid "GoPhones" Nabs You Free Text Messaging for Life
-
Community Byte: HackThisSite, Realistic 4 - Real Hacking Simulations
-
How To: The Hacks Behind Cracking, Part 1: How to Bypass Software Registration
-
How To: Hack Coin-Operated Laudromat Machines for Free Wash & Dry Cycles
-
How To: Get Your AMD Graphics, Sound & Other Drivers to Work in Linux on Your Laptop
-
Rainbow Tables: How to Create & Use Them to Crack Passwords
-
How to Hack Your Game Saves: A Basic Guide to Hex Editing
-
How To: Hack WPA WiFi Passwords by Cracking the WPS PIN
-
How To: The Hacks Behind Cracking, Part 2: How to Generate Software Keys
-
News: Hack Your Computer's BIOS to Unlock Hidden Settings, Overclocking & More
-
How To: Hack Wireless Router Passwords & Networks Using Hydra
-
How To: Use Wireshark to Steal Your Own Local Passwords
-
How To: Create a Reverse Shell to Remotely Execute Root Commands Over Any Open Port Using NetCat or BASH
-
How To: Use JavaScript Injections to Locally Manipulate the Websites You Visit
-
How To: Mine Bitcoin and Make Money
-
How To: A Guide to Steganography, Part 1: How to Hide Secret Messages in Images
-
How To: How Hackers Use Your IP Address to Hack Your Computer & How to Stop It
-
How To: Reveal Saved Browser Passwords with JavaScript Injections
-
How To: Fix Defective Pixels & Improve Image Quality on LCD & LED Monitors
-
Listen In: Live Social Engineering Phone Calls with Professional Social Engineers (Week 2)
-
How To: A Guide to Steganography, Part 2: How to Hide Files and Archives in Text or Image Files
-
How To: Customize Your Linux Desktop
-
Social Engineering, Part 1: Scoring a Free Cell Phone
-
How To: Automatically Organize Your Torrents with Batch Scripting
-
How To: Spy on the Web Traffic for Any Computers on Your Network: An Intro to ARP Poisoning
-
How To: Create a Bump Key to Open Any Door
-
How To: GPU Accelerate Cracking Passwords with Hashcat
-
How To: Create a Custom Arch Linux Distro
-
UDP Flooding: How to Kick a Local User Off the Network
-
How To: A Guide to Steganography, Part 3: How to Hide Text and Images in Pictures
-
How To: Enable Code Syntax Highlighting for Python in the Nano Text Editor
-
How To: Nab Free eBooks Using Google
-
Remove Your Online Identity: The Ultimate Guide to Anonymity and Security on the Internet
-
How Null Byte Injections Work: A History of Our Namesake
-
How To: Make Your Own USB Keylogger Hardware
-
News: 18 Easy Exploits to Raise Spellcasting Skills in Skyrim
-
How To: Fix a Bricked iPhone or iPod Touch After a Failed Jailbreak
-
News: 9 Easy Exploits to Raise Combat Skills in Skyrim
-
How To: Fix Your Overheating, RRoD, or E74 Xbox 360 with Mere Pennies
-
How To: Become Anonymous on the Internet Using Tor
-
How To: Hack Mac OS X Lion Passwords
-
How To: Make the World's Hottest Burning Man-Made Substance: Thermite