Console Command

How To : Use the console commands when playing Fallout 3

By enabling the dev console in Fallout 3, you can give yourself exactly the same kind of superuser game access that the developers have when they are working on the game. Here's an extensive list of console commands you can use to get all sorts of great stuff. Part 1 of 3 - Ho ...more

How To : Use console commands when playing Call of Duty 4

When you enable the dev console for CoD 4, you can get into the developer's menu and give yourself all sorts of cool tricks, extra equipment and more! This video shows you a few commands you can enter when the console has been enabled.

How To : Play Better in Counter Strike Source

So You're New to Counter Strike Source? So you're new to Counter Strike Source and you want to improve your gameplay? Great. You've come to the right place. The first step to improving your game is to admit that you are a NEWB or NEWBIE. Do not confuse this with NOOB. A "new ...more

How To : Fix or Retrieve Data From A Bad Hard Drive

This is an intermediate guide on how to easily fix or retrieve data from a bad hard drive. What we're trying to do: 1. Fix a hard drive with a corruption problem (i.e., blue screen) or that is full of viruses to the point of being inoperable. 2. Retrieve data from a hard dr ...more

How To : Fix the "hal.dll is missing or corrupt" error

If you've received the "hal.dll is missing or corrupt" error message from your Windows machine, then you're in luck! This video will show you how to correct that problem with the Recovery Console tool that comes with the Windows 2000 and XP CDs. Using the Windows Recovery Cons ...more

How To : Retrieve a lost Windows password

It was bound to happen with all those numbers floating around in your brain – you've forgotten your Windows password. Here's how to recover it. Step 1 At the Windows login screen, click on the question mark. If you entered a hint when creating your password, a pop-up bubble w ...more

How To : Access your wireless router from a Windows PC

In order to access your wireless router settings in a Windows PC you need to use a command called ipconfig. The purpose of this command is to find out what your IP is. Go into the command console and use ipconfig to find out what it is but instead of noting down the IP address ...more

News : First Steps of Compiling a Program in Linux

This article describes the very basics of compiling a program on Linux. It is targeted at the absolute beginner. Sometimes beginners search for programs on the web for their Linux systems, and is faced with the reality that they have to compile the program themselves, either b ...more

How To : Activate MMS on iPhone 3G or 3Gs Firmware 3.1 o

This video tutorial demonstrates an easy way to activate MMS on iPhone 3G or 3Gs Firmware 3.1 o. First download the File here. Now Make Sure itunes is closed and not running. On Mac: 1. Close iTunes if it is open 2. Start Terminal (Applications - Utilities) 3. Run the foll ...more

How To : Customize Your Linux Desktop

Linux can have the most beautiful interface in the world, because it is simply what you make of it. You can change every little detail with relative ease because that's what Linux is all about: Freedom and OpenSource. I posted pictures of my desktop on the corkboard a few wee ...more

News : Null Byte Is Calling for Contributors!

We're officially seeking Null Byters interested in teaching others! Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowle ...more

How To : Remove a Windows Password with a Linux Live CD

Back when I was a Windows user, I know I'm not the only one who has experienced password loss—that moment where you just can't remember your password. Sometimes it happens to the best of us. So, how can we get into the system without paying a local geek or geeksquad to do it? ...more

How To : Lose the freshman 15

It’s easy to gain a little extra weight in college but there are ways to defy this weight gain trend. It won’t work without will power but you can limit your unhealthy food intake and sneak in some unconventional exercise routines. Every college student dreads those three lit ...more

How To : Look Cool with Notepad with Viruses!

Hello Hackers/Viewers, It is a new day, and you might be thinking, It is so boring, why not try to be cool with computers in front of my friends? That is why, I have made this tutorial to make fake viruses using notepad to look cool! Step 1: Requirements for the Prank First ...more

How To : Use Social Engineering to Hack Computers

Today I am going to teach the various ways that you can use social engineering to hack a system. For those of you that have followed my past tutorials, you know that social engineering can unlock a world of possibilities. This is because no matter how many firewalls, no matter ...more

How To : Use the SysRq Key to Fix Any Linux Freeze

Linux is generally a pretty stable OS, but occasionally things happen. However, as long as your keyboard has a SysRq key, you'll never need to worry about freezes again. The SysRq key functions allow you to perform various low level commands, even when your system is unrespon ...more

How To : Write Batch!

Right, So i've been asking alot of questions here on Null-Byte and everyone has been really helpful to me. So i thought i'd try and give back with one of the first Programing Lang i started with. I know many people of Null-Byte are most likely past the points i am going to ta ...more

How To : Do a Simple NMAP Scan on Armatige

How to do an NMAP scan on Armitage to find IPs within a certain range. Armitage is a gui interface of Metasploit, and advanced hacking/exploiting program. It can be downloaded from http://metasploit.com/ and http://fastandeasyhacking.com/ and you will need NMAP. http://www.nm ...more

How To : Place a Virus in a Word Document for Mac OS X

This tutorial follows the same idea as my original tutorial for windows, but I've redone it to work with Mac OS X. Here's how to get a meterpreter session from your victim opening a malicious word document: Step 1: Creating the Payload For this tutorial, I'll be using a pyth ...more

Hack Like a Pro : Hacking the Heartbleed Vulnerability

Welcome back, my greenhorn hackers! In recent weeks, the Heartbleed vulnerability of OpenSSL has been dominating the information security headlines. This vulnerability enables an attacker to extract data from the server's memory that may contain authentication credentials, co ...more

Prev Page
  • Hot
  • Latest