Basics to Hacking

How To : Hack a combination lock with scissors & a soda can

This is episode 3 of the series. You will learn how to hack a basic combination lock. Using some basic household items such as a can of soda, scissors and the lock. He demonstrates and takes you through 7 steps, such as cutting the top of the can off, cutting a rectangle size ...more

How To : Hack VOIP sessions with Cain

Jared of the TechCentric crew gives you the lowdown on the basics of keeping your VoIP conversations secure and, on the other side of things, how to use the Cain VoIP sniffing application. For detailed instructions on keeping your VoIP conversations private, watch this hacking ...more

News : Null Byte Is Calling for Contributors!

We're officially seeking Null Byters interested in teaching others! Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowle ...more

How To : Model a basic sword in 3D using Metasequoia

The sword is a very oft-depicted item in video games and CGI-heavy movies, so making them in 3D is an important skill to have if you want to become a 3D artist. This video tutorial walks you through the process of modeling a basic sword using the 3D graphics suite Metasequoia. ...more

How To : Hack into locks with lock bumping techniques

Today, learn the basics of lock bumping. Lock bumping is a lock picking technique for opening a pin tumbler lock using a specially-crafted bump key. One bump key will work for all locks of the same type. This video tutorial will show you how to hack into locks with lock bumpi ...more

How To : Hack websites with SQL injection and WebGoat

SQL injection is a common web application attack that focuses on the database backend. WebGoat is a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons. I plan to use WebGoat for a few future videos. This first WebG ...more

News : Hacking

I am looking to learn how to hack. I have basic knowledge to computers so any help will be appreciated. Thx

How To : Detect hackers with netstat

Netstat (network statistics) is a command-line tool that displays network connections (both incoming and outgoing), routing tables, and a number of network interface statistics. It is available on Unix, Unix-like, and Windows NT-based operating systems. This video tutorial pre ...more

How To : Phreak a payphone

This video will teach you the basics of payphone phreaking. Pay phone phraking involves doing various pranks and hacks to pay phones.

How To : Hack computers with open shares

See a basic netbios hack, showing what happenes to ppl who leave files and folders shared over the Internet. Hack computers with open shares. Click through to watch this video on tricklife.com

Null Byte : Never Let Us Die

If there ever was a time for Null Byte to need people to contribute, it's now. Let's make Null Byte a place where anyone, from novice to master computer user, come and learn. It has been sometime since the last "Call to Arms" for Null Byte, and even longer since the last "Week ...more

News : Comic Book Instructions Make Arduino Hacking Easy

If you didn't think you could make a high speed photography trigger or hack together some creepy googly eyeballs for Halloween, then you've got another think coming, because learning how to use Arduino just got easier thanks to Jody Culkin and her wonderful comic book introduc ...more

How To : Arrange fences in FarmVille

Arranging fences can be a hassle if FarmVille. Once you understand the basics, however, you will be creating elaborate fence layouts in no time! This video tutorial shows how to arrange fences in FarmVille. Fences can add a wonderful flair to your farm. Master the art of fenc ...more

How To : Edit Super Mario World levels with Lunar Magic

Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to edit Supe ...more

How To : 9 Ways to Get People to Do What You Want

The art of persuasion (or subtle emotional manipulation, depending on how you're looking at it) does not necessarily have to be an evil thing. When you want to make an important sales pitch to a tough customer, propose a risky business plan at work, or gently convince your si ...more

How To : Make the most out of the Evony marketplace

Learn everything you could possibly want to know about the internet, multiplayer game Evony. Watch this video tutorial to learn how to make the most out of the Evony marketplace. These are basics ways to make more gold and get more resources when buying and selling in Evony. ...more

How To : Walkthrough MadWorld "Train Station" area

This is a video walkthrough of the ultra violent and gory game MadWorld, exclusively for the Nintendo Wii. Mahalo has produced this full walkthrough for MadWorld, complete with high-quality videos. The guide explains everything from the point system and basic combat techniques ...more

How To : Walkthrough MadWorld "Rin Rin" boss fight

This is a video walkthrough of the ultra violent and gory game MadWorld, exclusively for the Nintendo Wii. Mahalo has produced this full walkthrough for MadWorld, complete with high-quality videos. The guide explains everything from the point system and basic combat techniques ...more

How To : Walkthrough MadWorld Boss Fight: "Elise"

These are video walkthroughs of the ultra violent and gory game MadWorld, exclusively for the Nintendo Wii. Mahalo has produced this full walkthrough for MadWorld, complete with high-quality videos. The guide explains everything from the point system and basic combat technique ...more

How To : Hack with GNU Netcat

Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a featur ...more

How To : An Extensive Guide to Creating Bokeh Photography

Bokeh (which translates to "blur" in Japanese) is a photography technique referring to the blurred areas of a photograph. Basic bokeh photographs often have one point of focus, while the background falls away into a dreamy, blurred haze. The technique can be taken even furthe ...more

How To : Things to Do on WonderHowTo (01/11 - 01/17)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week has been an exciting one. The com ...more

How To : Cheat on Facebook's Bejeweled Blitz (07/27/09)

Bejeweled Blitz is a Facebook game. Learn how to hack Bejeweled Blitz with tricks, cheats, hacks. Watch this video tutorial to learn how to cheat on facebook's Bejeweled Blitz (07/27/09). Get the HxD freeware hex editor and disk editor. Make sure you apply this cheat before y ...more

News : Final Fantasy 14 Special Edition Unboxing

Final Fantasy 14 the MMO is now live. The special edition priced at $75 enables people to play eight days earlier than people getting the regular edition, which comes out on September 30th. Mine arrived yesterday and here are some pictures of what's inside the special edition ...more

How To : Design for multiple browsers

James Williamson for Lynda demonstrates designing for multiple browsers. The most frustrating aspects of web design is constantly dealing with the settle and some times not so settle differences in browser rendering. While they moved to a standard spaced, CSS control presentat ...more

How To : Have top-notch table manners

Impress dinner companions with your flawless manners—it’s as simple as observing a few key rules. You Will Need * A crash course in dining etiquette Step 1. Know the basics As soon as you take your seat at the table, place your napkin in your lap and obey the basic rules: ...more

Weekend Homework : How to Become a Null Byte Contributor

We're officially seeking Null Byters on a weekly basis who would enjoy taking their time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job ...more

Community Byte : Hack Our IRC Bot to Issue Commands

Last week's Community Byte we got off to a great start! We had a few people build our IRC bot, and all went well. We had some great contributers, ideas, and people willing to learn. So, needless to say, we will be having another. Let's try to get a few more people involved thi ...more

How To : Use Cygwin to Run Linux Apps on Windows

You'll see a lot of Linux action going down here at Null Byte. We use Linux for hacking-related stuff because it provides a more relaxed programming environment, making it easy to write exploits and tools. Linux has many features Windows is lacking, such as full control over t ...more

Link Roundup : 15 Guides To Pumpkin Carving

Halloween just isn't Halloween without Jack O'Lanterns. Below, anything and everything you need to know on the art of pumpkin carving. 1. Prepare a Pumpkin for Carving Serious Eats' video demonstration is for true novices: "This video is for you unlucky souls who never got t ...more

How to Hack Like a Pro : Getting Started with Metasploit

This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing p ...more

  • Hot
  • Latest