In this video tutorial, viewers learn how to cheat on the flash game Dead Frontier Outbreak. Dead Frontier Outbreak is a new promotional game released on multiple game sites by AdminPwn. It is a text-based zombie adventure game, complete with voice acting. It was created mainl ...more
Why not waste your afternoon? You don't need those spreadsheets anyway ...more
Is your laptop not holding a charge anymore? Don't buy a new one, hack the old one! Laptop batteries can cost upwards of a hundred dollars, but with new lithium batteries and some soldering tools, the new one works just as well. Watch this video computer circuitry tutorial and ...more
My least favorite aspect of the winter season is how my fingers always turn into stiff, numb digits, unfeeling and seemingly incapable of making even the slightest movement. Yes, that might sound overdramatic, but if you hate wearing gloves like I do, you probably know exactly ...more
The latest Star Wars movie, Solo: A Star Wars Story, has grossed almost $350 million worldwide during its first month in theaters. This is a good opportunity to discuss how hackers can use media hype (in this case, Hollywood movie hype) to disarm an unsuspecting Windows user i ...more
Frontier is a flash game from Armor Games. Learn how to hack Frontier with tricks and cheats. Watch this video tutorial to learn how to be rich on Frontier with Cheat Engine (09/13/09). See how to get an infinite amount of gold on Frontier. Description of the app on Armor Gam ...more
The full 30 minute short film by John Hillcoat that was shown on TV. From the description: Red Dead Redemption: The Man from Blackwater The director of The Road and The Proposition, John Hillcoat, brings you an entirely digital Western short film. It uses Rockstar's rich ope ...more
Xeni visits the offices of the Electronic Frontier Foundation and speaks with Jake Appelbaum and Bill Paul, two of the authors of a security research paper that shows how your computer's memory can be tricked into revealing data you thought was safely encrypted, and out of the ...more
It's easier than you might think to hack into Wi-Fi routers using just one unrooted Android phone. This method doesn't require brute-forcing the password, a Windows OS for converting PowerShell scripts into EXE format, a reliable VPS for intercepting hacked Wi-Fi passwords, or ...more
Welcome back, my newbie hackers! Hackers often are associated with clandestine and illegal activity, but that is not necessarily always the case. Hackers are increasingly being used and employed for law enforcement, national security, and other legitimate purposes. In this in ...more
A hacker with privileged access to a Windows 10 computer can configure it to act as a web proxy, which allows the attacker to target devices and services on the network through the compromised computer. The probes and attacks appear to originate from the Windows 10 computer, m ...more
In five short years, three generations of ultra-low-cost Raspberry Pi devices have challenged the boundaries of what a person can do with a $35 computer — especially with Kali Linux. With each Pi more powerful and cheaper than the last, the addition of the Pi Zero in 2015 too ...more
The Windows 10 desktop and microphone can be livestreamed without using Remote Desktop Protocol (RDP) software and without opening any ports on the target computer. A hacker with low user privileges can monitor and exfiltrate a target's every move and private conversation in r ...more
There was a time when building a website required coding knowledge. Eventually, software came along that made the process easier, and then services like Squarespace made it dead simple for even a technical novice to design a website. Now, with the content creation platform fr ...more
The newest version of macOS has arrived. While everyone's mind is being blown by Mojave's groundbreaking new Dark Mode, we'll be taking advantage of its insecure file permissions to establish a persistent backdoor with a self-destructing payload that leaves little evidence for ...more
Don't drink it all. When your battery is dead, add wine. Now, thanks to video creator Kipkay, we learn a very unconventional hack. The acid in the red wine reacts with the acid in the battery to give it just enough of a boost to start the car. Sounds like we should start pack ...more
What appears to be an ordinary MP4 may have been designed by an attacker to compromise your Linux Mint operating system. Opening the file will indeed play the intended video, but it will also silently create a connection to the attacker's system. Understanding the Attack Whi ...more
Windows XP will always have a special place in my heart—it's the operating system I grew up on. It guided me through the glory days of AIM, Napster, and MySpace, but now it's dead. The OS that had been supported by Microsoft for twelve years officially lost its support on Apri ...more
The latest film addition in the American-produced Millennium series, The Girl in the Spider's Web, was just released on Blu-ray a few days ago. As you could expect, the movie has many hacking scenes throughout, just like the previous English and Swedish language movies centere ...more
Pokémon GO, the global augmented reality game that's brought fans out of their homes to catch Pokémon across the planet, has brought about plenty of real-world positives. Unfortunately, when players get power hungry and start taking game hacks too far, we all get a little scre ...more
By now, nearly everyone with any type of media access is aware that Sony Pictures Entertainment was hacked on November 24th. Although there can be many interpretations and lessons drawn from this audacious act, there is one indisputable conclusion: it and its ripples across th ...more
Greetings my fellow hackers, In the previous article, I discussed briefly about ransomwares and their devastating capabilities. Devastating in a way that ransomwares are not only known to encrypt files but to also lockout some specific functions of the system and hold it up f ...more
Popups citing every little detail of your friends' online lives get pretty bothersome, but you can actually learn how to make them beneficial - and profitable - for yourself by watching this video on hacking Frontierville (06/19/10). You'll learn how to use the popups (the pub ...more
Battery life is often a big problem with new smart phones. In this tutorial, learn how to change the settings on your brand new HTC EVO 4G so that the battery lives longer on the 4G network. Don't get stuck with a dead phone- check out this clip and keep it alive!
So, how do you get your family together in FrontierVille on Facebook? One way is with the Dinner Triangle. If you family gets lost out in the forest or behind a tree or building, then all you have to do is ring the Dinner Triangle and they'll come running. See how to use it! ...more
Grab your thinking caps and get your hack on. Null Byte is officially seeking contributors on a weekly basis who are willing to take the time to educate the Null Byte community on anything, from hardware hacks to life hacks. Contributors that write tutorials will be featured o ...more
Sean Stiegemeier has captured absolutely beautiful timelapse footage documenting the eruption of the Eyjafjallajökull volcano in Iceland: "So I saw all of these mediocre pictures of that volcano in Iceland nobody can pronounce the name of, so I figured I should go and do bett ...more
Learn how to turn a t-shirt into a sexy one piece swimsuit. This swimwear project is cheap and easy. The sexy GiannyL demonstrates this DIY closet hack that's simple and cheap. All you need is a t-shirt, pins and a sewing machine. Cut along the pattern Gianny L has demonstrate ...more
Learn how to unlock the Dead Ops Arcade (DOA) mini-game in the single-player campaign mode of Call of Duty: Black Ops for the Sony PlayStation 3. Call of Duty 7 (COD: BO) is the seventh installment in Activision's popular Call of Duty series of military-themed first-person sh ...more
Earn the "The Collector" achievement in the Dead Ops Arcade mode of Call of Duty: Black Ops with this gamer's guide! In order to unlock this achievement, you will need to buy every weapon off the wall during a single Zombie level. Call of Duty 7 (COD: BO) is the seventh insta ...more
Earn the "Easy Rhino" achievement in the Dead Ops Arcade (DOA) campaign mode of Call of Duty: Black Ops with this gamer's guide! In order to unlock this achievement, you will need to use a Speed Boost to blast through 20 or more enemies at one time. Call of Duty 7 (COD: BO) i ...more
Want to unlock the "No Leaks" trophy in the fifth zombie stage of the Dead Ops single-player campaign? This clip provides a walkthrough of how to beat the Nova 6 map without any tears or holes to your hazmat suit. Call of Duty 7 (COD: BO) is the seventh installment in Activis ...more
Want to earn the "Easy Rhino" achievement in the Dead Ops Arcade zombie campaign of Call of Duty: Black Ops? Here's how you do it. Hold your fire till the zombies assemble into a big horde. Then mow 'em down at once with your RT. Call of Duty 7 (COD: BO) is the seventh instal ...more
The biggest struggle with flashing DVD drives on Xbox 360s has been the price tag of the probe to extract keys on some drives. The probe and kit is required to extract the DVD key, which is needed to perform a drive repair, flash, or backup of any kind. Who wants to pay big bu ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
This weekend, hackers broke into the servers of the popular shoe shopping site Zappos, giving them access to the personal information of 24 million Zappos customers. The user data taken included names, email addresses, billing and shipping addresses, phone numbers, the last fo ...more
Today, we're pleased to announce that WonderHowTo is getting a major site-wide update to make it easier to follow the subjects you're passionate about and to share your creations with people who will give you the kudos you deserve! We Built You a New WonderHowTo! In preparat ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
The days of trundling hoops, hopscotch and painted wooden rocking horses are long since past. The latest trend in toys? Biofeedback. Electroencephalography. A decade into the 21st century, the toy market is awash in products that incorporate functional neural sensors. One suc ...more
If you've noticed a tiny discolored spot on your computer screen that just doesn't seem to go away, chances are you have a stuck pixel. With modern LCD and OLED screens, there are millions of incredibly small dots (pixels) that make up all of the contents of your display—and w ...more
We've already shown you our favorite new action games that have come out this year, but now it's time to share our all-time top ten list. These games are available for both Android and iPhone, they don't have intrusive ads or freemium schemes, and most importantly, they're all ...more
When your iPhone can't be found, Find My iPhone is a true lifesaver. When you use the feature, you can ping your iPhone and even see its current location on a real-time map. But what happens when your iPhone runs out of battery? Find My iPhone can't locate a dead iPhone, can i ...more
For the uninitiated, it can be difficult to buy that special hacker in your life a perfect holiday gift. That's why we've taken out the guesswork and curated a list of the top 20 most popular items our readers are buying. Whether you're buying a gift for a friend or have been ...more
Whether it's terrorism or brain-hungry zombies you're neutralizing, first-person shooters are an awesome way to immerse yourself within a new world and kill some time with your iPad or iPhone. And with so many games available in this genre, we wanted to show off ten of our abs ...more
Most of us skip through documents like privacy policies and EULAs (end-user license agreements) because they're long and boring. But, as Congress just passed the SJR34 bill in early April, you're probably a little concerned about your personal data, so we summarized the privac ...more
The release of Into the Dead 2 has given fans of the zombie bashing genre a fresh game to enjoy, but it's also given us the opportunity to revisit our roundup for the best free action games for mobile. Not only did it replace its predecessor in our charts, it managed to surpas ...more
Disruptor Beam just soft launched The Walking Dead: March to War in the Philippines. It's not officially available in the US yet, but there are ways to play this take on Robert Kirkham's post-apocalyptic masterpiece regardless of where you live. The Walking Dead: March to War ...more
It seems that fans of the Android open-source operating system are a bit peeved by some of the choices Google has made regarding the new #MadeByGoogle Pixel phones. And with good reason. The new phones are expensive, the Nexus line is dead, and some Redditors are speculating o ...more
Many of us experience highly emotional "freakouts", so to speak, more often than we'd like. Weather you experience them personally, or via your loved ones, it can be very difficult to think rationally during an episode, and for some people it can take quite a while to calm dow ...more
Everyone occasionally has tipsy fingers that lead to mistaken button taps. Even if you didn't accidentally delete your note, you may have found that it is in fact still relevant and not time for that note's demise. Thankfully, there's a simple way to undelete your Google Keep ...more
So, you're on the way back from a restaurant and realize you left your iPhone there, but you're late for a meeting and can't go back yet. You may as well kiss that iPhone goodbye, right? Not yet, as long as the right person gets their hands on it first. But that potential do-g ...more
Mobile gamers are well aware of this, but zombie shooters have become pretty stagnant and unimaginative in recent years. Too many entries in this genre feature the same cookie-cutter gameplay, but thankfully, Gameloft aims to change this. The company has soft-launched Dead Riv ...more
Although the initial reception for the Galaxy S9 has been generally positive, recent reports paint a potentially bleak image — some S9 owners are complaining that their new devices have "dead zones" in their displays, which don't register their touch inputs. Luckily, there are ...more
Whether you used it to remind yourself to buy a game or to store away that app recommendation that your friend begged you to download, the "Wish List" in the iOS App Store was a useful tool to keep track of new apps you might have wanted to install on your iPhone. But how can ...more
In the past, some of Google's Nexus devices have had root methods even before the phones hit shelves. The Google Pixel and Pixel XL are basically Nexus devices from a software standpoint, so why have we gone more than a week since release without a working root method or custo ...more
If the recent "state sponsored" Yahoo hack wasn't enough motivation for users to stop using their services, the latest news about Yahoo should be. Joseph Menn, a reporter at Reuters, just revealed that Yahoo created a custom email wiretap service for the US government. Last y ...more
If you're seeing "damaged" apps on your Mac, you're not alone. A huge digital rights management blunder in Apple's Mac App Store on Wednesday, November 11th has rendered some apps unusable. When opening certain apps, the following message could be displayed: "[App Name]" is d ...more
Unlike in the physical world, on the internet you're actually able to shut people up and block spoilers of newly-released movies, your favorite TV shows, or a sports event you've yet to watch on your DVR. If you haven't seen Star Wars: The Force Awakens yet, or just want to m ...more
Pringles are just as well known for their cylindrical packaging as for their suspiciously addictive fried crisps. Yes, that's crisps—not chips. They do not meet FDA standards for "potato chip" classification since they're only made up of 42 percent potato product. "Potato ch ...more
Data can be injected into images quickly without the use of metadata tools. Attackers may use this knowledge to exfiltrate sensitive information from a MacBook by sending the pictures to ordinary file-sharing websites. Continuing on the topics of DPI evasion, payload obfuscat ...more