Access Blocked Internet

How To : Slip a Backdoor into PHP Websites with Weevely

Backdoors are convenient to leave behind once you've already found a way into a server, and they can come in handy for a variety of reasons. They're good for developers who want a quick way into machines they're working on, or for systems administrators who want similar access ...more

How To : Beginners x86 Linux Assembly

Hello everyone! This is my first attempt at a tutorial here. There are a couple great assembly tutorials here, and I wanted to toss my coin in the fountain. I figured, the more tuts the better, as I had trouble learning assembly in the beginning and had to read alot of tutori ...more

TypoGuy Explaining Anonymity : Secure Browsing Habits

to stay secure, you dont just need Tor, and a VPN. You need good browsing habits. What are Browsing Habits You Ask? Let me tell explain. Its basically how you behave on the internet, what websites you click, your language pattern (how you speak), what websites you are regist ...more

How To : Some Terms a Hacker Must Know...

Welcome back Hackers\Newbies! Hey guys first of all I would like to explain my absence here in NullByte. I got a little "occupied" with "other things". When I got back, I saw all these HowTo's, articles, Help Questions, I decided, I need to share more of what I have, to you g ...more

How To : 15 Uses for Household Bleach

Commonly associated with cleaning and disinfecting items around the home, bleach can also be used as a water sterilization method in an emergency situation when you do not have access to clean, running water. Simply add 6 drops of bleach to a gallon of water and wait for 30 mi ...more

How to Hack Wi-Fi : DoSing a Wireless AP Continuously

Welcome back, my nascent hackers! In previous tutorials for my Wi-Fi Hacking series, I have shown you how to crack WEP and WPA2 passwords, break a WPS PIN, and create Evil Twin and Rogue access points. In this continuation of the series, let's look at slightly different appro ...more

IFA 2014 : Samsung's Galaxy Note 4 & Galaxy Note Edge

Today was a big day for Samsung at IFA 2014, with announcements of two new devices as successors to the Galaxy Note 3: the Galaxy Note 4 and Note Edge. Video: . Both variants of the Note are armed with QHD displays, new S Pens, larger batteries, premium metal builds, and 0-50% ...more

How To : 7 Easy Mnemonic Tricks for Remembering Numbers

Whether it's your credit card, your parents' new zip code, or a new work phone number, number sequences are everywhere. Sometimes it's important to actually remember them instead of always relying on a smartphone or the internet to remind you. For long number sequences, your ...more

News : Awesome Modified Subaru is King of Snow and Ice

I want to drive one of these monsters around this winter.  DC Shoes Co-Founder and Rally Team Driver Ken Block collaborates with Subaru to create the worlds fastest cat track operation automobile for backcountry access for snowboarding. Via Gaijtz: "Cat tracks and beefed-up ...more

How To : The First 10 Things to Do After Rooting Your Phone

Okay, so you rooted your Android phone .... now what? There are a few ducks you need to get into a row, like backing up your stock boot image, getting SafetyNet sorted, and improving security with biometrics. But there are also awesome root mods waiting for you — just don't ge ...more

How To : The Best Video Recording Apps for Your iPhone

If you have a modern iPhone, you have an excellent video recorder at your disposal. Every iPhone since the 6S has the ability to shoot in 4K resolution, and each new iteration has brought new capabilities to the table. But even the best mobile shooter can use a little extra he ...more

How To : Phish Social Media Sites with SocialFish

Phishing is the easiest way to get your password stolen, as it only takes one mistake to log in to the wrong website. A convincing phishing site is key to a successful attempt, and tools to create them have become intuitive and more sophisticated. SocialFish allows a hacker to ...more

How To : Stop Ads from Spying on Your iPhone Activity

Stumbling upon a specifically tailored advertisement on your iPhone can be a bit disconcerting. But that's what happens when you let advertisers track your data. Some of you may appreciate more relevant ads in apps, but the rest of you might consider it a straight-up privacy i ...more

How To : Create Service Files with Systemd

Firstly let me start by giving credit to Lucid for their guide on Evilzone which inspired this idea, as well as the recent talk of anonymity on here. As the Archwiki states: Systemd is a system and service manager for Linux, compatible with SysV and LSB init scripts. systemd ...more

Hands-On : Hands-On with CNN's Magic Leap News Video App

Magic Leap has done a great job of aggressively releasing new apps, software updates, and major franchise tie-ins. But aside from all the creative and entertainment apps, what's it like to use one of the apps the company hopes you'll use every day? One of those apps is the CN ...more

How To : Exploit Routers on an Unrooted Android Phone

RouterSploit is a powerful exploit framework similar to Metasploit, working to quickly identify and exploit common vulnerabilities in routers. And guess what. It can be run on most Android devices. I initially covered RouterSploit on Kali Linux and macOS (OS X), but this tuto ...more

News : PTC Offers Free Trial of ThingWorx Platform

For companies wary of the temperature, PTC just made it easier for them to dip their toes in the waters of augmented reality. After concluding a pilot program of their ThingWorx Studio software earlier this year, PTC announced today that they would offer a free trial of the a ...more

News : Google's Family Link Just Got a Lot More Useful

Last month, Google introduced the Family Link app. This app, much needed in a world where the average age of kids first getting a smartphone is just over 10 years old, allows parents to set some limits on their children's phone usage. However, the app premiered with one caveat ...more

News : Chrome for iOS Updated to Add a 'Read Later' Feature

Google just pushed out an update to Chrome for iOS, with the main change being a new feature called "Read Later". Read Later is a nifty little feature that allows you to download and save web pages that you can read even if you're offline. Being a subway rider in NYC, I know v ...more

News : Opera's Android Browser Just Got Native Ad-Blocking

Opera's web browser for Android, Opera Mini, now comes with integrated ad-blocking technology for a less cluttered browsing experience. More importantly, it decreases the amount of data being loaded, which Opera claims increases webpage loading times by 40 percent. This is in ...more

How To : Block Ads in Microsoft Edge

Although they're often times the primary source of income for websites, on-site advertisements can annoy even the most tolerable reader. That's why ad blockers have been some of the most popular downloads on Firefox and Chrome for some time now, demonstrating that when it come ...more

How To : Use Your Chromecast Without WiFi

It's no secret that we love the Chromecast. From watching movies to playing games to giving presentations, this little $35 dongle definitely packs a punch. But unless you have a strong, solid Wi-Fi connection in the 2.4 GHz range, this little device has been out of reach to yo ...more

  • Hot
  • Latest