One challenge in shooting miniDV video is capturing good color. 3-chip cameras are way better than 1-chip cameras but they are also more expensive. No matter what type you have, remember lighting is still important. In this video Israel Hyman shows you how to capture better co ...more
Here's a Halo 2 trick for playing multiplayer Capture the Flag. Learn how to get the flag quickly and get blasted out of the base so you get a greater chance of getting it back to your base.
Do you like chess? How about Japanese chess? Aren't there different chess variants in Japan though? Maybe, but this specific chess variant is called Shogi. The chess-like game Shogi is won by capturing the king, just like chess, but defeat is conceded at mate, or when mate bec ...more
Get out your army pants and prepare to conquer your backyard. Learn how to play Capture the Flag with this video Step 1: Choose teams Divide the players into two teams of equal size. Step 2: Find playing field Find a large outdoor playing field that includes both open and ...more
Aerial photography company perspectiveAerials has captured incredible 360° footage of the Gulf of Mexico oil spill. The team launched their custom built Canon 5D Mark II aerial drone (see video two in the gallery below for a demonstration) from their boat in the middle of the ...more
Wondering how all of these videos of people's screens get made? Here's a video of someone's screen with the answer. Learn how to download and install CamStudio to capture video of your screen without using a camera, and then start making videos!
Is something interesting happening on your Mac computer that you need a picture of? This guide will walk you through the process of taking a picture or capture of your Mac screen and saving it as a screenshot. Remember that hotkey and it will help you out in the future!
Creating your own video tutorials - part 2. In this second part of our tutorial series on how to create your own video tutorial for free we will go into editing your video using Windows Movie Maker, which is provided free with all new versions of Windows. Read the first artic ...more
Interested in making your own tutorials? You'll need some good screen capture software if you want to do a screencast, and one of the best programs for that is Microsoft Expression. This video goes over the basics of the program so you can get the most out of it.
On this YouTube video the user Vvistacomphelp shows you how to print screen and crop pictures. The first thing that the user shows is where the Print Screen button is located at on most keyboards so that you can press it on yours. The second thing is go to the start menu in Wi ...more
Want to show off your fragging ability? Taksi (http://taksi.sourceforge.net) is a freely available capture program that will capture gameplay. It's relatively easy to use and it works.
HOW TO CAPTURE STREAMING MEDIA many websites stream songs and videos people believe they cannot be downloaded, quite why i dont know. they kinda think there is no file present to dwnld once the file is located it can then be retrieved by nettransport nettransport is able to ...more
Don Schechter demonstrates how to capture your footage from your camera to your computer and log it for easy access later on for Final Cut Pro. Logging clips allows you to organize your footage without having to waste hard drive space.
A new demo has given a hint about what's going to be possible in the world of mixed reality, thanks to Apple's ARKit. The demo comes from Normal VR, a virtual reality developer that is currently working with leading VR platforms such as Oculus Rift, HTC Vive, and PlayStation ...more
Thanks to modern "smart phones" and the internet, media by the people, for the people is finally a reality. Here's how to use your phone to be a mobile journalist. You Will Need * A cell phone that can record video * A memory card * A steady arm * A cell phone tripod WARNING: ...more
Apple remains shrouded in mystery while continuing to sweep up small companies ahead of a rumored augmented reality headset launch. On Friday, Apple confirmed the acquisition of a UK-based firm called iKinema, which specializes in 3D motion captures of human figures. Don't M ...more
Fireworks are beautiful, but they can be extremely difficult to capture on digital cameras. This tutorial for digital photographers shows you how to optimize your DSLR camera's settings and use just the right techniques so you can get the most out of your next fireworks shoot. ...more
Take control of your raw footage- learn how to capture video in Windows Movie Maker, and take the first step to editing the video into a completed project.
Need to capture an image from your desktop? Learn how to use the snipping tool in Windows Vista, and you can grab an image from anywhere on your computer screen.
Learn how to log and capture movie footage in Apple iMovie so you can begin to transform your raw footage into a completed movie.
Want to take the perfect photograph and apply it to your next scrapbooking project? Learn four simple rules of thumb in taking your next photo; Crop out the abstract images, get up close and personal with your object, change the angle and follow the rule of thirds. Don't just ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to extract W ...more
In this video, we learn how to capture your holiday in eight digital photos. This is a challenge for most people, but it can help you remember your vacation without taking hundreds of photos. First, make sure you have different lenses to capture shorter and longer distances. F ...more
Need to capture an image from windows media player, but you just get a blank screen? In this video, you will be shown how to capture screenshots in windows media player just by adjusting the performance tab. Capture screenshots in Windows Media Player. Click through to watch t ...more
Yes! soon I will be able to log in more as I untie the shackles this map has placed on me in the time leading up to its eventual release and log in once in a while! RELEASE DATE Early August!! STILL TO DO -Complete timer (simple, just have to do it) -Hook up bases to score t ...more
Creating your own video tutorials. Over the last few years we have created a whole database of short video tutorials at helpvids.com - showing you how to use different programs. In this article I will explain some of the ways You can create your own video tutorials that you ...more
captured from my Sony Ericsson k800 phone added that graphic using microsft paint software nthing changed to picture.. i donot have the original picture without that art.. this one is i captured during my sister playing with our cat.. and added that to facebook
Learn how to edit the materials you've captured in Camtasia to so you can present exactly the segments of your videos that are the most relevant.
Bulletin boards and other asynchronous research methods give introverts more time to respond, and are therefore less biased towards extraverts. This is a good thing, and a benefit of using online research methods.
Despite the security concerns that have plagued Facebook for years, most people are sticking around and new members keep on joining. This has led Facebook to break records numbers with over 1.94 billion monthly active users, as of March 2017 — and around 1.28 billion daily act ...more
An internet connection has become a basic necessity in our modern lives. Wireless hotspots (commonly known as Wi-Fi) can be found everywhere! If you have a PC with a wireless network card, then you must have seen many networks around you. Sadly, most of these networks are sec ...more
Want to take advantage of your neighbor's super fast Wi-Fi connection? If they're smart, they probably have it password protected (otherwise you wouldn't be reading this, would you?). But if you have an Android phone, you can get back at them for always parking in your spot an ...more
Welcome back, my greenhorn hackers. When Wi-Fi was first developed in the late 1990s, Wired Equivalent Privacy was created to give wireless communications confidentiality. WEP, as it became known, proved terribly flawed and easily cracked. You can read more about that in my b ...more
While password cracking and WPS setup PIN attacks get a lot of attention, social engineering attacks are by far the fastest way of obtaining a Wi-Fi password. One of the most potent Wi-Fi social engineering attacks is Wifiphisher, a tool that blocks the internet until desperat ...more
Welcome back, my hacker novitiates! Like in my last article on remotely installing a keylogger onto somebody's computer, this guide will continue to display the abilities of Metasploit's powerful Meterpreter by hacking into the victim's webcam. This will allow us to control t ...more
While iOS 11 is ready to take over your iPad, iPhone, and iPod touch, let's take a step back and check out all of the new features that iOS 10 brought to the public when it was released to everyone in Sept. 2016. Some of the updates from iOS 9 to iOS 10 were huge, as you'll s ...more
Welcome back, my fledgling hackers! In the first part of my series on Wi-Fi hacking, we discussed the basic terms and technologies associated with Wi-Fi. Now that you have a firm grip on what Wi-Fi is exactly and how it works, we can start diving into more advance topics on h ...more
Kali Linux, by default, probably doesn't have everything you need to get you through day-to-day penetration testing with ease. With a few tips, tricks, and applications, we can quickly get started using Kali like a professional white hat. Most Linux distributions are highly c ...more
Cracking the password for WPA2 networks has been roughly the same for many years, but a newer attack requires less interaction and info than previous techniques and has the added advantage of being able to target access points with no one connected. The latest attack against t ...more
Welcome back, my greenhorn hackers! Now that we're familiar with the technologies, terminology, and the aircrack-ng suite, we can finally start hacking Wi-Fi. Our first task will be to creating an evil twin access point. Many new hackers are anxious to crack Wi-Fi passwords t ...more
The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, ...more
While Wi-Fi networks can be set up by smart IT people, that doesn't mean the users of the system are similarly tech-savvy. We'll demonstrate how an evil twin attack can steal Wi-Fi passwords by kicking a user off their trusted network while creating a nearly identical fake one ...more
Welcome back, my greenhorn hackers! Continuing with my series on how to crack passwords, I now want to introduce you to one of the newest and best designed password crackers out there—hashcat. The beauty of hashcat is in its design, which focuses on speed and versatility. It ...more
Welcome back, my rookie hackers! When Wi-Fi was first developed and popularized in the late '90s, security was not a major concern. Unlike wired connections, anyone could simply connect to a Wi-Fi access point (AP) and steal bandwidth, or worse—sniff the traffic. The first a ...more
Welcome back, my budding hackers. So many of you are interested in hacking Wi-Fi that I have decided to revisit my Wi-Fi Hacking series with some updated and more in-depth material. I strongly suggest that you look at some of my earlier posts, such as "Getting Started with Te ...more
When you're taking a video in the Camera app on your iPhone, there's a little white shutter button in the corner that lets you take a still image while you're filming. Apple brought that same concept over to the FaceTime app in iOS 11, iOS 12, and higher, so you can take Live ...more
Wouldn't it be nice to just sit at your buddy's house, plug into his network, and see exactly what he's doing? What if it was as easy as that? What makes packet sniffers like Wireshark such potent tools is that a majority of local area networks (LANs) are based on the shared E ...more
When joining a new network, computers use the Address Resolution Protocol to discover the MAC address of other devices on the same network. A hacker can take advantage of ARP messages to silently discover the MAC and IP address of network devices or actively scan the network w ...more
Hi there again, aspiring hackers (and veterans as well)! I'm going to explain how to perform a dictionary attack on a WPA/WPA2 protected network with Wifite. Please note that this doesn't work with WPA Enterprise For that end, you'd have to use an Evil Twin to get the "Enterpr ...more
Beginners learning brute-forcing attacks against WPA handshakes are often let down by the limitations of default wordlists like RockYou based on stolen passwords. The science of brute-forcing goes beyond using these default lists, allowing us to be more efficient by making cus ...more
So you want to know what that person who is always on their phone is up to? If you're on the same Wi-Fi network, it's as simple as opening Wireshark and configuring a few settings. We'll use the tool to decrypt WPA2 network traffic so we can spy on which applications a phone i ...more
Your iPhone's built-in Voice Memos app is a great way to record the audio around you, whether it be conversations, lectures, meetings, interviews, discussions, chitchat, gossip, or other kinds of talks. But if your goal is to record audio on the down-low without being noticed, ...more
Welcome back, my rookie hackers! So many readers come to Null Byte to learn how to hack Wi-Fi networks (this is the most popular hacking area on Null Byte) that I thought I should write a "how-to" on selecting a good Wi-Fi hacking strategy. Many beginners come here looking t ...more
Today I will show you how to create a simple keylogger in Visual C# Sharp, which will start up hidden from view, and record anything the user types on the keybord, then save it into a text file. Great if you share a PC and want to track what someone else is writing. You Will ...more
Eager to try the Firesheep Firefox extension yourself? It stands to reason that you'll need to download and install it from its official GitHub page first. You'll find all the details, including easy-to-follow, step-by-step instructions on how to find and run the Firesheep XPI ...more
Welcome back, my tenderfoot hackers! We have looked at a number of ways that we sniff traffic on the network with such tools as Wireshark, tcpdump, dnsiff, and others, but each of these tools is only capable of pulling packets off the wire. Those packets can be examined for ...more
Welcome back, my hacker apprentices! Metasploit framework is an incredible hacking and pentesting tool that every hacker worth their salt should be conversant and capable on. In a previous post, I had provided you a cheat sheet of meterpreter commands. These commands are ess ...more
Welcome back, my budding hackers! One of the keys to becoming a professional and successful hacker is to think creatively. There is always a way to get into any network or system, if you think creatively. In previous tutorials, I have demonstrated ways to crack passwords on b ...more
Your home has walls for privacy, but Wi-Fi signals passing through them and can be detected up to a mile away with a directional Wi-Fi antenna and a direct line of sight. An amazing amount of information can be learned from this data, including when residents come and go, the ...more
There are many tools out there for Wi-Fi hacking, but few are as integrated and well-rounded as Bettercap. Thanks to an impressively simple interface that works even over SSH, it's easy to access many of the most powerful Wi-Fi attacks available from anywhere. To capture hands ...more