With the globally rampant use of such social networking platforms as Facebook, Twitter, and Foursquare, the issue of privacy has become a prevalent concern for many. And for good reason—there's the violation of Facebook employing user names in ads, the Etsy slip-up, and of cou ...more
The biggest corporation we know today is called Google, I bet you've heard of it yeah? How Google Tracks You: Google are stacked with money for decades, and even with that at their disposal, that wasn't enough. They thought hey, even though we have products being sold world ...more
At the moment, the iPad is officially locked to the AT&T network in the USA. If you would like to use your iPad but do not intend on leaving your current mobile carrier, check out this video. This tutorial will show you how to alter your Sim card and create an entirely new on ...more
After nearly two months of beta testing, Apple is finally pushing the iOS 15.6 software update to all iPhone users. While it's not as feature-rich as the iOS 15.5 or iOS 15.4 that came before it, there are still a few things you'll want to know about it. The iOS 15.6 update w ...more
Whether you're binging "Friends," "Game of Thrones," or Harry Potter movies, if you want to watch HBO Max downloads in the highest quality possible, you can't just use the default settings. Without doing the legwork, the TV shows and films you download onto your iPhone or Andr ...more
Although the Health app mostly focuses on fitness, Apple has slowly added features to help with other aspects of well-being, including hearing. In iOS 13, there's now a headphones volume tracker in Health that monitors audio levels and lets you know when your music, podcast, m ...more
We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no ne ...more
While it's rare, there could be a day when your iPhone 12, 12 mini, 12 Pro, or 12 Pro Max isn't responding, where taps and swipes on the screen do nothing, and the Side button won't let you force a restart. The culprit could be any number of problems, from corrupted files to b ...more
When you think of companies that represent pillars like "privacy" or "security," Facebook is pretty far from the top of that list. However, the social media empire is making strides — small strides — to win trust with how it handles your user data. One of those efforts involve ...more
A shady practice in place by AT&T and Verizon Wireless—and possibly more wireless carriers—was recently uncovered. Outgoing data requests sent from devices on these service providers are being injected with a Unique Identifier Header (UIDH) that allows websites, the carriers, ...more
The Android lock screen interface is an integral part of our everyday use. For those of us who use lock screen security, it functions as a barrier between the sensitive data contained within our smartphones and potential outside access. Even if you don't use a pattern or PIN t ...more
When Stardew Valley launched back in 2016 on Steam for PC, it was instantly deemed a success for steering the RPG farming simulator genre back on the right track. Before its release, we hadn't seen too much in this particular field of games that caught the eye of the general p ...more
From personal photos and videos to online banking passwords saved in your web browser, your phone has all kinds of sensitive data that needs to be protected. One of the best things you can do for your Samsung Galaxy S4's data is have a lock screen with a hard-to-guess PIN or p ...more
Check out this informative video tutorial from Apple on how to add a transition between slides in Keynote '09. iWork '09, the office productivity suite from Apple, is the easiest way to create documents, spreadsheets, and presentations. Writing and page layouts are easy in Pa ...more
On the latest iOS software, your iPhone comes with significant privacy and security enhancements to protect your data even more than Apple did before. From safeguarding your iPhone to passcode-protecting files to making it easier to browse the web safely, there's a lot you nee ...more
Now that smartphones have ensured that we're connected to the internet 24/7, online privacy has become more important than ever. With data-mining apps hoping to sell your information for targeted ads, and government agencies only one subpoena away from knowing every detail of ...more
Social media apps like Instagram, Snapchat, and TikTok have plenty of editing tools that go beyond the basics, but there are still a lot of things they can't do. So if you want to apply interesting, unique effects to your photos and videos for social media, you'll need to add ...more
The latest sponsored augmented reality experience on Snapchat from a movie studio might be its scariest — and perhaps most popular — yet. The Sponsored Lens, purchased by Warner Bros. to promote the new The Nun horror movie, uses background segmentation to provide a mostly da ...more
Lady Gaga and Polaroid's upcoming Grey Label Camera Glasses can record video and snap pictures, but who really wants to show the world what they're up too on those mini LCD screens? It's nothing more than a fancy gimmick between a pop star and a failing company. Isn't the inte ...more
Welcome back, my hacker novitiates! If you have been following this new Snort series, you know that Snort is the world's most widely used intrusion detection/protection system. Now a part of the world's largest network equipment company, Cisco, it is likely to be found everyw ...more
Mobile phones are not only essential for work and communication, they're quickly becoming an integral asset to our health. Your iPhone can store valuable data about fitness, nutrition, heart health, and so much more. And since iOS 11.3, your iPhone can even import a list of al ...more
This video is about formatting the charts in Excel especially the x and y axes. The video begins by selecting a chart and right clicking the dates at the bottom of the data points. The format axis window pops up and by making changes to the style, color and the weight of lines ...more
Hi guys, I'm gonna keep this short because I got assignments and a lot of notes to study and also other how-tos and forums to reads. lol...Since I'm keeping this short...no story time just scenario. And I want to thank n3stor for giving me the idea to post this. Scenario Let ...more
Earlier this year, we got our first taste of Android Pie in the form of Developer Preview 1. As with all past Android previews, DP1 was limited to Google devices — but at Google I/O 2018, Google announced that Developer Preview 2 would be accessible to other devices, including ...more
By now, nearly everyone with any type of media access is aware that Sony Pictures Entertainment was hacked on November 24th. Although there can be many interpretations and lessons drawn from this audacious act, there is one indisputable conclusion: it and its ripples across th ...more
Welcome back, my rookie hackers! For some time now, I have been contemplating this issue, can we hack back the hackers? As someone who plays on both sides of the cyber security ping pong match, I've wondered whether I can use my hacking skills in self-defense of my clients. A ...more
If you are a user of FileMaker Pro then this video teaches you how to use calculation and summary fields in it while making new files. In Filemaker you can create a various kind of fields that you want your file to contain. In Filemaker a calculation is a data that gets comput ...more
Check out this informative video tutorial from Apple on how to create formulas with Quick Formula in Numbers '09. iWork '09, the office productivity suite from Apple, is the easiest way to create documents, spreadsheets, and presentations. Writing and page layouts are easy in ...more
Well Welcome Back My Fellow Hackers. What is Slowhttptest? You may be asking. Slowhttptest is a Application Layer Denial of Service attack aka an attack on HTTP. You can read more about it here and also download it if you don't have Kali Linux. slowhttptest - Application Laye ...more
If you just installed the iOS 11 beta on your iPhone, you're automatically sending your location data to Apple — even if you don't want to. Luckily, there's an easy way to prevent Apple from seeing this data if you don't want them to. Now, this is nothing new. Apple always as ...more
This morning, in an early morning session at GDC 2017, Brandon Bray, a senior program manager lead at Microsoft, revealed a mixed reality headset made in collaboration with Acer—a different headset than the one we saw from Acer at CES 2017 earlier this year. Also at the event, ...more
So, you rooted your Pixel 2 or 2 XL and everything seems to be working quite well. However, a month passes, and you get a notification to install the monthly security update. Like clockwork, Google has been pushing out OTA security patches every single month for a while, but t ...more
I use Google Chrome every day for my browsing needs, and I had no idea they were hiding something from me. So, I was pretty surprised to see that Chrome has an entire hidden experimental add-ons section. There are add-ons that work for Mac, Windows, Linux, and Chrome OS, so th ...more
There's no doubt iOS 13 has dominated the talk around the Apple community this month. Since the announcement and release of the first developer beta, we iPhone users have had a treasure trove of new features and changes to explore and discuss. Now the fun continues with iOS 13 ...more
My first ever post on here was 'Keeping your hacking identity secret' and it did very well, and its not something I see here on null byte. So read along. Disclaimer: I didnt introduce you this subject in my last post, but I while do that now. First, I want to clarify that t ...more
Even though iOS 6 has only been out for a day, the folks over at iPhone Dev-Team have already released a Redsn0w jailbreak that works on the iPhone 4, iPhone 3GS, and iPod touch (fourth generation). As of right now, there's only a tethered jailbreak available, which means that ...more
As you're surely aware, your phone can be used against you. Thanks to our cameras and microphones, a clever hacker can obtain access to your device and invade your privacy. But spying isn't limited to just these two sensors — gyroscopes, proximity sensors, QR codes, and even a ...more
Apple's latest update, iOS 14.2, is finally here. As the name implies, it's the second major update to hit iPhones since Apple released iOS 14 in the fall. The update brings at least 13 new features and changes to all compatible iPhones, including over 100 new emoji and eight ...more
Welcome back, everybody. In the previous article, we covered the ideas and concepts of well-known ports and trust exploitation in order to evade a firewall. Today, we'll be building the shell, the part that receives commands, executes them, and sends the output back to the att ...more
Remember the Power Pwn, the clever little hacking tool disguised as a power strip? It's great in theory, but with a $1,295 price tag, it definitely doesn't fit into most people's budgets. But what if you could make your own for a fraction of the cost? That's exactly what the ...more
Despite the availability of a vaccine against it, almost 50% of men aged 18-59 in the US are infected with the human papillomavirus (HPV). Why? A new study published in JAMA Oncology by at a team of researchers at the Womack Army Medical Center (WAMC) in Fort Bragg discusses ...more
It's been about five months since Google first unveiled their prototype future computers running Chrome OS, and the time is nearly here for the Chromebooks to be unleashed on the public. But there are a lot of qualms over the release of Chromebooks, with most criticism coming ...more
Norwegian designers Timo Armall, Jørn Knutsen, and Einar Sneve Martinussen visually capture invisible WiFi signals by light painting signal strength in long-exposure photographs. The trio set up a four-meter long WiFi-detecting rod with 80 LED bulbs to depict cross-sections th ...more
On the same day that Google launched their new social network, Google +, a team of Google engineers calling themselves the Data Liberation Front announced their first service on Tuesday—Google Takeout, a product that allows users to easily move their data in and out of Google ...more
If your phone won't boot or you need to dig deeper into the Android operating system on your Motorola Droid Bionic, this tutorial on booting the Bionic into recovery mode should help you out. Just be careful, because a factory reset on the Verizon Wireless smartphone will caus ...more
While a lot of internet threats are rather over-hyped, there are some serious things to be cautious of when going online. Probably the biggest risk to the average internet user is malicious software. Commonly knows as "malware," this term refers to any program that exists sole ...more
Anybody who spends most of their day on the internet should know all about lulz. Lulz are most often jokes made at the expense of web users, as popularized on 4Chan. Today, a consortium of hackers called LulzSec is attempting (and in some cases succeeding) in efforts to shut d ...more
This video demonstrates how to stain a white sheet of paper and make it look antique. You'll need two tea bags (an extra one if the other tears open. Place the paper to be stain on a tissue or newspaper to avoid a mess. Take half a tumbler of hot water and dip a tea bag until ...more
In this clip, you'll learn how to take advantage of the Microsoft Access QBE interface. Whether you're new to Microsoft's popular data management application or a seasoned MS Office professional just looking to better acquaint yourself with the Access 2007 workflow, you're sur ...more
The Android world exploded when it was discovered that Facebook was logging the call and text histories of many of its users, although the company claims those users had explicitly given Facebook permission to log that data. The case remains that many users were unaware of thi ...more
Microsoft announced yet another exciting partnership for HoloLens today — thyssenkrupp, an industrial engineering company best known for their elevators — continuing to prove how useful augmented reality is in the workplace. The announcement video shows off the HoloLens workf ...more
Chrysaor, a zero-day spyware believed to have been created by the Israeli "cyber war" group NSO, is an even greater threat to Android phones than it ever was to iOS. Related to the Pegasus hack that recently affected iPhones, Chrysaor is malware that baits the user into insta ...more
In spite of the degree of difficulty it is to install, CyanogenMod has steadily climbed the ladder to become one of the most popular third-party firmwares for Android devices. To increase its fan base, they even put an easy-to-download installer on Google Play to help people ...more
Move over whole wheat — white bread may be back in style after a new study shows that it may be your gut microbes that decide what kind of bread is best for you. As a health food, whole wheat bread undeniably rules, right? With its whole grain goodness, whole wheat has long b ...more
Use the Excel Vlookup function in Microsoft Excel 2007 to look up data in a table. This tutorial looks up the level and value of a product from a stock list using the Vlookup function in Excel. To use the Vlookup function in Excel 2007: 1. Click on the Formulas tab on the ri ...more
With the FBI getting access to iPhones, and apps like Waze being used to track people's locations, you've got to wonder just how safe and secure your smartphone is... or isn't. When you consider everything you do on your phone, from taking and sharing pictures to mobile bankin ...more
With Snapchat making the leap into the smartglasses realm, Facebook had to find a way to try and steal its competitor's augmented reality thunder. On Tuesday, the social media giant took the opportunity to fulfill its promise from this year's F8 developers conference, as Spar ...more
New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun, the 139th installment in their series of digital spreadsheet magic tricks, you'll learn how to use a d ...more
A macOS computer can reveal a lot of information about the owner, including which Wi-Fi network they have permission to access. With an Arduino-based attack, we'll use a five-dollar setup to inject a rogue Wi-Fi network and steal the list of trusted Wi-Fi networks, allowing us ...more
One major component of Level 4 and Level 5 driverless cars is in very short supply. Venture capitalists and engineers from around the world are racing to fill the LiDAR production, price, and performance void. Production of LiDAR sensors is seeing months-long production bottl ...more