The tutorial shows how to use trigger grouping in QuicKeys, which essentially means instead of assigning a single trigger to activate shortcuts, you can use a group of keys as a trigger. In this example, you'll see how to set up a macro to launch Calculator by simply typing th ...more
In this three-part video tutorial, learn how to manage loans with an amortization table in Excel. The three parts of this video go over the following: Part 1: Create a mortgage (loan) payment calculator with an amortization table (payment schedule) for detailed payment inform ...more
Watch this video tutorial to learn how to calculate your carbon footprint. A carbon footprint is an equation that estimates just how much you, personally, are contributing to global warming—and all you have to do is plug some info into an online calculator. Figuring out how to ...more
This video is showing you how to gain your own pupils and exp for free. You can also pupil me and I will pupil back just msg me. Gelerino.mybrute.com http://www.checker.freeproxy.ru/checker/index.php http://www.proxylists.net/ Hack mybrute with this mybrute cheat. MyBrute ha ...more
Technology: The Less You Know the Better? I'm sure everyone is now aware of GPS technologies and tracking techniques these days, with the release of numerous documents (even lawsuits) on big name companies like Apple, Microsoft, and Google. Yes, 2011 was a good year for eye-o ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more
Math Craft admin Cory Poole posted instructions on How to Make a Cube, Octahedron & Icosahedron from Sonobe Units, plus some great complex models in his article, How to Make a Truncated Icosahedron, Pentakis Dodecahedron & More. These models use the standard sonobe unit and a ...more
Kick Ass Game Review Part 1: Background & Voice Talent There are three parties involved in bringing you The Kick Ass Game: - Wha Entertainment (Publisher) - Marv Entertainment (Role unknown) - Frozen Codebase (Indie Developer) Wha Entertainment is owned by Howard Horowitz. H ...more
If there ever was a time for Null Byte to need people to contribute, it's now. Let's make Null Byte a place where anyone, from novice to master computer user, come and learn. It has been sometime since the last "Call to Arms" for Null Byte, and even longer since the last "Week ...more
Another week has passed on the online battlefield as the CISPA legislation continues to grind away at our freedom. Here at Null Byte, we try to keep our community informed and knowledgeable at the same time—and that means creating content for them to learn from. After last we ...more
To create an elegant WordPress blog or website from scratch without being noticed that you're a complete beginner, you need that drive and pairs of eyes and ears. It may seem difficult at first but it can truly be fun and exciting. In order for you to have a long lasting blog ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Since today (11/11/11) is the last 6 digit binary date this century, I thought we should look at some kinetic binary calculators. Matthias Wandel built a beautiful 6 digit binary computer out of wood. If you want to build one, he even gives you some more information and instr ...more
All the files you need are in a free download on DevelopPHP. PHP has to be on a server. It will not run on a local machine. Type your name. There are two variables which show up in the dialog boxes (which are stacked.) You can change the user name. It sets up a URL request and ...more
Make light saber glow effects in lsmakerThe author found freeware that helps create light sabers. The freeware is not as good as adobe after effects, but it will serve the purpose. Download the software from the website http://www.lsmaker.uw.hulpage.php?main=lsmaker.html. Extr ...more
Need an electric outlet and don't have one? No batteries on hand, either? Well, then you should use the next best thing - potatoes! In this tutorial, learn how to make that old science fair staple - the potato powered calculator! Check it out, it really works! You Will Need: * ...more
Follow this video for some tips on how to cheat in exams and tests. You can have a calculator that stores information and notes in it. Such calculators such as the TI83 and 84 plus calculators have a feature where you set up a new program. Type in your notes in this program yo ...more
In this tutorial the author shows how to find out a Cool XP Easter Egg hidden in the XP which comes by downloading the latest update of widows update. The author now opens Internet Explorer and visits the windows site. Now he quits the explorer and holds down both the Control ...more
Looking to find the standard deviation of your set of values? Standard deviation quantifies how diverse the values of your data set are, and is useful in determining how different your numbers are from each other. You Will Need: • Data • A calculator Step 1: Collect your d ...more
This is a working cheat where you will receive a bear 100% guaranteed, as of 04/17/09. Cheatengine: http://www.cheatengine.org/downloads.php It only works on this character because I configured the cheat engine to it. This gives your brute a bear. So go fight other brutes an ...more
Last Friday's mission was to accomplish solving HackThisSite, basic mission 8. This meant that we had to learn some more basic Unix commands. These missions are for everyone here, and you can join at any time. Your experience level doesn't matter. HackThisSite is a free, lega ...more
Free Tree Gift Request Links With the new orchards and tree mastery system everyone is looking for more trees! As wishlist requests often end up with errors, I've created this list that will provide links you can put your ID into allowing people to send you the item without g ...more
In this article, I'll be covering Triggers and Coils, part two of the series (see part one here). Generally, a simple EMP generator consists of four components; a capacitor, a transformer, a trigger and a coil of copper wire. The transformer component can be varied, but the co ...more
If you've ever heard software piracy terminology being discussed, I'm sure the term KeyGens came up. KeyGens is short for key generator, which is a program that exploits algorithmic faults in software by generating software license keys that appear to be genuine. Normally used ...more
Welcome to the eighth Community Byte for coding in Python and completing the challenges presented to us by HackThisSite. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, from novice programmers to asp ...more
Welcome to the seventh Community Byte for coding in Python and completing the challenges presented to us by HackThisSite. These sessions are created to bring our community together, to learn from each other, and grow together. Everyone is welcome, from novice programmers to as ...more
XSS stands for cross-site scripting, which is a form of web-based exploitation that uses client-side vulnerabilities in a web page to execute malicious JavaScript codes. JavaScript is referred to as "cross-site" because it usually involves an external website containing the ma ...more
A few weeks ago I wrote about Atomic Web as the best web browser for iOS devices, and while I believe it is a superior option, Atomic Web is not the only alternative web browser you can use on your iOS device. There are three more—Dual Browser, iCabMobile, and iSwifter—that ar ...more
Pull up outside any construction site and you'll see tools scattered about—hammers, jigsaws, nail guns, hydraulic pipe benders—these are the tools of the trade. You would be hard-pressed to build a home or office building with just your hands! On that same page, security profe ...more
In this series, I'll be exploring electromagnetic weapons, how to build them, their function and application to the future, and the amazing possibilities electromagnetism has to offer. First, the electromagnetic pulse generator, or EMP. You've probably heard of these before, a ...more
Here is a list of links you can use to ask for or give special gifts. First you need to find your Facebook ID number and copy it down somewhere, or memorize it if you can, then paste it into the links replacing the ###### symbols. You can find your ID number in the address b ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
No doubt you've seen some of the hack logs being released. One part that stands out over and over again is the heavy database usage. It used to be early on that virus and hackers would destroy data, usually just for lulz. However, with the explosive commercial growth of the In ...more
Detect metal with a metal detector! In this video tutorial, you will see how to create a metal detector out of just two household items, for under twenty dollars. So, if you're on a treasure hunt, and have no money yet, then make your own metal detector. What You Will Need: ...more
“Zero-zero is a big score.” Ron Atkinson "Part 0? Are we in computer science class or what? We aren't talking about arrays here, are we?" No, nothing to do with arrays. This article is simply for if you are thinking of creating a new WordPress blog and want to do that on a M ...more
It's easier than you might think to hack into Wi-Fi routers using just one unrooted Android phone. This method doesn't require brute-forcing the password, a Windows OS for converting PowerShell scripts into EXE format, a reliable VPS for intercepting hacked Wi-Fi passwords, or ...more
With an ordinary birthday card, we can introduce a physical device which contains malicious files into someone's home and deceive them into inserting the device into a computer. In my last series, we used a Post-it note to trick a neighbor into visiting a website that we cont ...more
JavaScript is one of the most common languages used on the web. It can automate and animate website components, manage website content, and carry out many other useful functions from within a webpage. The scripting language also has many functions which can be used for malicio ...more
Have you ever used an open wifi, which after you connect displays a website to enter your credentials to get internet? That website is called captive portal and widely used in airports, hotels, universities etc. Have you ever wondered what would happen if someone would set up ...more
INTRODUCTION Hello dear null_byters here we go again with our third part of this serie. in this third part of our series I'd like to do a demonstration or continuation on fuzzing, but I think I should leave for later because the next tutorials about fuzzing will require from ...more
Backdoors are convenient to leave behind once you've already found a way into a server, and they can come in handy for a variety of reasons. They're good for developers who want a quick way into machines they're working on, or for systems administrators who want similar access ...more
Windows 10 passwords stored as NTLM hashes can be dumped and exfiltrated to an attacker's system in seconds. The hashes can be very easily brute-forced and cracked to reveal the passwords in plaintext using a combination of tools, including Mimikatz, ProcDump, John the Ripper, ...more
Though you can use the Social Engineering Toolkit to clone websites, this way is much more customisable. For example, you could send the credentials your victim enters to a script that mails you notifying you of new data someone's just entered, or automatically store them in ...more
KeePassX, 1Password, and LastPass are effective against keyloggers, phishing, and database breaches, but passwords managers rely on the operating system's clipboard to securely move credentials from the password vault to the web browser. It's within these few seconds that an a ...more
The ability to execute system commands via a vulnerable web application makes command injection a fruitful attack vector for any hacker. But while this type of vulnerability is highly prized, it can often take quite a bit of time to probe through an entire application to find ...more
Today I will show you how to make a metasploit exploit really quickly. This tutorial is mainly applied to stack based buffer overflows and seh buffer overflows exploits .There is a simple way for rop exploits too but I will dedicate a special tutorial on this subject. I will ...more
Christmas is just a few weeks away and the decorating has already begun. The centerpiece for most home during the holiday is, of course, the Christmas tree. But let's face it—that tree can be a big pain in the ass to decorate. You'll run out of tinsel, your lights will be too ...more
Hello friends! This tutorial will teach you how to build a local pentesting lab on your Linux machine which will enable you to easily install common web applications so you can practice locating and exploiting their known vulnerabilities (or discover new ones!). In particular, ...more
Today, I want to share a tutorial on one of the most useful but old methods which you could use to hack websites, that is using the Dot net nuke (DNN) vulnerability . I know some of you already know about this method. Note: This method only works if the website has the vulner ...more
More and more devices are using iOS 8 over iOS 7, and that means more and more developers are adding iOS 8-friendly features to their apps, especially widgets. However, not every widget available for your Notification Center right now is awesome. Take for example the Dropbox w ...more
Welcome back, my aspiring hackers! In this series on Linux for aspiring hackers, I'm trying to provide you with the basic skills needed to be capable in Linux as a hacker. One area that's critical that we haven't covered yet is building and managing an Apache web server. Apac ...more
Auditing websites and discovering vulnerabilities can be a challenge. With RapidScan and UserLAnd combined, anyone with an unrooted Android phone can start hacking websites with a few simple commands. RapidScan does an excellent job of automating the deployment of vulnerabili ...more
Since it was released last fall, Super Mario Maker has offered us a glimpse into the minds of some of the most evil people on the planet. The game, for Nintendo Wii U, lets players create their own Super Mario levels using a deep list of objects, enemies, and green pipes, whic ...more
This is a followup from my recent series on XSS exploitation, giving a few extra attacks/tricks to try. Google's Prank Google developed a JavaScript code (available here) that you can customize. Basically, it makes all the elements on the page swirl around, fade out to white ...more
With Google's latest version of their mobile OS, Android L, the most notable aesthetic difference is the newly introduced Material Design concept that will soon be ever-present through the interface. The objective of this bold design is to create "hierarchy, meaning, and focus ...more
When it comes to multitasking, the Samsung Galaxy Note 2 is the master of all smartphones, thanks to its huge screen size and many features. The phablet's display compliments its multi-window mode, which lets you run two apps simultaneously side by side Another cool feature is ...more
A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website d ...more
There are nearly 100,000 unique onion service addresses online with over two million people using Tor every single day. Join me as I explore a small fraction of what the Tor network has to offer. It's puzzling to imagine about 100,000 .onion websites in existence. Readers who ...more
So, your grandmother finally wants to ditch her flip phone for a shiny new smartphone? Congratulations. But helping her get used to her new device, even when it's an iPhone, is no small task. Grandma mastered checking her email in late-2012 and just recently learned there's a ...more