Null Byte is looking for forum moderators! Last Friday's mission was to accomplish solving HackThisSite, basic mission 9. This mission delves a little further into Unix commands and remote directory traversal (which is just a fancy term for going through folders blindly). Th ...more
This is episode 3 of the series. You will learn how to hack a basic combination lock. Using some basic household items such as a can of soda, scissors and the lock. He demonstrates and takes you through 7 steps, such as cutting the top of the can off, cutting a rectangle size ...more
Jared of the TechCentric crew gives you the lowdown on the basics of keeping your VoIP conversations secure and, on the other side of things, how to use the Cain VoIP sniffing application. For detailed instructions on keeping your VoIP conversations private, watch this hacking ...more
We're officially seeking Null Byters interested in teaching others! Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowle ...more
The sword is a very oft-depicted item in video games and CGI-heavy movies, so making them in 3D is an important skill to have if you want to become a 3D artist. This video tutorial walks you through the process of modeling a basic sword using the 3D graphics suite Metasequoia. ...more
Today, learn the basics of lock bumping. Lock bumping is a lock picking technique for opening a pin tumbler lock using a specially-crafted bump key. One bump key will work for all locks of the same type. This video tutorial will show you how to hack into locks with lock bumpi ...more
SQL injection is a common web application attack that focuses on the database backend. WebGoat is a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons. I plan to use WebGoat for a few future videos. This first WebG ...more
Your BIOS, or Basic Input Output System, is the firmware on your motherboard responsible for initializing your computer's hardware when it is first powered on. It probes for video adapters, RAM, the whole works. The BIOS provides a small library of basic input/output functions ...more
Cheers to another completed Community Byte project! Things went well regarding timeliness and being friendly to the other coders and students. If you've got ideas for our next mission, or an idea for a tutorial, submit them to me. Friday, our mission was to take out HackThisSi ...more
Welcome to another Community Byte announcement from Null Byte! The goal of the Community Bytes is to teach people in a co-operative, hands-on manner. Learning from experience and immersing yourself in a subject is the best way to learn something foreign to you, so that is exac ...more
I am looking to learn how to hack. I have basic knowledge to computers so any help will be appreciated. Thx
Trying to focus on studying for your Stats final in the library but getting a serious ADD spell? Then make use of your time - while having a little fun with whoever else is in the library - by hacking into your computer's command prompt. The command prompt is the most basic o ...more
In this gamer's guide, you'll learn the controller patterns that will enable you to get started performing basic tricks in Shaun White Skateboarding for the Sony PS3. For all of the details, and to get started racking up points with these tricks yourself, watch this video walk ...more
Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is available on Unix, Unix-like, and Windows NT-based operating systems. This video tutorial pre ...more
This video will teach you the basics of payphone phreaking. Pay phone phraking involves doing various pranks and hacks to pay phones.
See a basic netbios hack, showing what happenes to ppl who leave files and folders shared over the Internet. Hack computers with open shares. Click through to watch this video on tricklife.com
If there ever was a time for Null Byte to need people to contribute, it's now. Let's make Null Byte a place where anyone, from novice to master computer user, come and learn. It has been sometime since the last "Call to Arms" for Null Byte, and even longer since the last "Week ...more
Friday's Community Byte was weird. The intent was to do a HackThisSite mission, but upon time to begin, everyone in there was programming without my assistance, with the help of Sol Gates. This is great! It's really awesome that everyone enjoys programming that much and will m ...more
If you didn't think you could make a high speed photography trigger or hack together some creepy googly eyeballs for Halloween, then you've got another think coming, because learning how to use Arduino just got easier thanks to Jody Culkin and her wonderful comic book introduc ...more
Arranging fences can be a hassle if FarmVille. Once you understand the basics, however, you will be creating elaborate fence layouts in no time! This video tutorial shows how to arrange fences in FarmVille. Fences can add a wonderful flair to your farm. Master the art of fenc ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to edit Supe ...more
Welcome to the closing of the second HackThisSite and programming Community Byte. First and foremost, I would like to ask that people start showing up on time to the Community Bytes. If you need help converting your time zone to PST, go to Time Zone Converter. When users do no ...more
Beginning this week, Null Byte will be hosting a new feature called Community Byte, a weekly coding and hacking session held in the Null Byte IRC. This is a chance for our community to do something fun, and make something awesome together! The weekly community projects are ge ...more
The art of persuasion (or subtle emotional manipulation, depending on how you're looking at it) does not necessarily have to be an evil thing. When you want to make an important sales pitch to a tough customer, propose a risky business plan at work, or gently convince your si ...more
Unfortunately, many of us will be celebrating New Year's morning with a post-New Year's Eve party hangover. Avoid this common misfortune by taking some basic hangover-prevention precautions: eat a full meal before drinking, stay hydrated, and limit yourself to 1 to 2 drinks fo ...more
Learn everything you could possibly want to know about the internet, multiplayer game Evony. Watch this video tutorial to learn how to make the most out of the Evony marketplace. These are basics ways to make more gold and get more resources when buying and selling in Evony. ...more
This is a video walkthrough of the ultra violent and gory game MadWorld, exclusively for the Nintendo Wii. Mahalo has produced this full walkthrough for MadWorld, complete with high-quality videos. The guide explains everything from the point system and basic combat techniques ...more
This is a video walkthrough of the ultra violent and gory game MadWorld, exclusively for the Nintendo Wii. Mahalo has produced this full walkthrough for MadWorld, complete with high-quality videos. The guide explains everything from the point system and basic combat techniques ...more
These are video walkthroughs of the ultra violent and gory game MadWorld, exclusively for the Nintendo Wii. Mahalo has produced this full walkthrough for MadWorld, complete with high-quality videos. The guide explains everything from the point system and basic combat technique ...more
Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a featur ...more
Bokeh (which translates to "blur" in Japanese) is a photography technique referring to the blurred areas of a photograph. Basic bokeh photographs often have one point of focus, while the background falls away into a dreamy, blurred haze. The technique can be taken even furthe ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week has been an exciting one. The com ...more
JavaScript is one of the main programming languages that the Web is built on. It talks directly to your browser and exchanges information with it in ways that HTML simply cannot. With JavaScript, you are able to access browser cookies, website preferences, real-time actions, s ...more
You've seen the felt mouse, which made computer clicking comfortable and chic, now brace yourself for something a little more interactive—DataBot. DataBot hails from the clever minds of Jan Barth and Roman Grasy, two Interaction Design students based in Germany who wanted to ...more
As advanced gaming systems continue to evolve, older classics like the Nintendo Entertainment System (NES) are one step closer to extinction. They're rotting in the basements of gamers. They're gathering dust at the local pawn shop. Or worse... being thrown out in the trash li ...more
Iowa firefighter Pete Lilja has modded the software of a Canon powershot to record images of Earth, from as high as 85,000 feet! Lilja's hack requires the following: 1 basic point-and-shoot consumer camera attach camera to a GPS transmitter (+ a phone number just in case the ...more
Bejeweled Blitz is a Facebook game. Learn how to hack Bejeweled Blitz with tricks, cheats, hacks. Watch this video tutorial to learn how to cheat on facebook's Bejeweled Blitz (07/27/09). Get the HxD freeware hex editor and disk editor. Make sure you apply this cheat before y ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to hide secr ...more
Final Fantasy 14 the MMO is now live. The special edition priced at $75 enables people to play eight days earlier than people getting the regular edition, which comes out on September 30th. Mine arrived yesterday and here are some pictures of what's inside the special edition ...more
Leaving your wireless router at its default settings is a bad idea. The sad thing is, most people still do it. Once they've penetrated your network, hackers will change your router settings so they'll have an easy way back in. This allows them to change your network into a she ...more
It's been a long time coming, but Microsoft has finally released a software development kit (SDK) for the Kinect on Windows 7 PCs. The word "hacking" is no longer needed, thanks to the free beta download available at Microsoft Research that allows anyone with a Windows compute ...more
James Williamson for Lynda demonstrates designing for multiple browsers. The most frustrating aspects of web design is constantly dealing with the settle and some times not so settle differences in browser rendering. While they moved to a standard spaced, CSS control presentat ...more
Impress dinner companions with your flawless manners—it’s as simple as observing a few key rules. You Will Need * A crash course in dining etiquette Step 1. Know the basics As soon as you take your seat at the table, place your napkin in your lap and obey the basic rules: ...more
In my first installment in this series on professional hacking tools, we downloaded and installed Metasploit, the exploitation framework. Now, we will begin to explore the Metasploit Framework and initiate a tried and true hack. Before we start hacking, let's familiarize ours ...more
I hate waiting to play, and I hate bugging my Facebook friends even more. But that's what Candy Crush Saga makes you do if you want to get new lives and levels faster. Luckily, you don't have follow King's rules—you can use a simple time hack to get new lives and play locked ...more
Home chemistry is great, but what happens when you forget to label your chemicals? How do you know if you turned a clear glass of ammonia into a clear glass of unobtainium? Chemists have a tool for just that. Litmus paper are small bits of filter paper saturated with a reacti ...more
There is a vast amount of knowledge out there on computers! In fact, it is so vast that no single person could ever possibly ever learn everything there is to learn about hacking or computers in general. People usually specialize in a certain field: cryptography, computer secu ...more
Grab your thinking caps and get your hack on. Null Byte is officially seeking contributors on a weekly basis who are willing to take the time to educate the Null Byte community on anything, from hardware hacks to life hacks. Contributors that write tutorials will be featured o ...more
The community tore up the first realistic mission last week. You've applied the techniques learned in the basic missions to a real scenario, so I'm pretty content. The realistic missions are where the learning gets intense and where we can apply real knowledge to extremely rea ...more
We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job ...more
Welcome to the 10th Community Byte session for coding in Python and completing the challenges presented to us by HackThisSite. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, from novice programmers ...more
Null Byte is looking for forum moderators! Welcome to the ninth Community Byte for coding in Python and completing the challenges presented to us by HackThisSite. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone ...more
Today's post is a small go-to guide for beginner programmers in Null Byte. With many of our community members picking up programming from our Community Bytes, it only makes sense to lay out a one-stop guide for your reference. Hopefully this guide will help you make an educate ...more
Another Community Byte announcement from Null Byte! The Community Byte projects serve to teach people in a co-operative, hands-on manner. Learning from experience and immersing yourself in a subject is the best way to learn something foreign to you. In our sessions, we have st ...more
Last week's Community Byte we got off to a great start! We had a few people build our IRC bot, and all went well. We had some great contributers, ideas, and people willing to learn. So, needless to say, we will be having another. Let's try to get a few more people involved thi ...more
You'll see a lot of Linux action going down here at Null Byte. We use Linux for hacking-related stuff because it provides a more relaxed programming environment, making it easy to write exploits and tools. Linux has many features Windows is lacking, such as full control over t ...more
Making bread from scratch is extremely difficult. Painstakingly following instructions does not necessarily guarantee successful results. Baking delicious homemade bread takes practice, skill, and frankly, a level of real culinary artistry. Enter the no-knead method. First po ...more
Halloween just isn't Halloween without Jack O'Lanterns. Below, anything and everything you need to know on the art of pumpkin carving. 1. Prepare a Pumpkin for Carving Serious Eats' video demonstration is for true novices: "This video is for you unlucky souls who never got t ...more
Hey, hackers! Now that you've hacked/owned your first "box" in my last article, let's look a little closer at another great feature of Metasploit, the Meterpreter, and then let’s move on to hacking a Linux system and using the Meterpreter to control and own it. Why Meterprete ...more
This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing p ...more