A renowned pop-culture icon, Michael Jackson revolutionized the arts of pop music and dance with his large body of work. Learn one of the most famous dance moves, his 'Smooth Criminal' move, in this step-by-step tutorial.
Well this law was passed... Our privacy is slowly being pulled away from us. But I'm certainly not going to let it stop me. We'll just have to take more secure measures. If You Use Tor Browser, The FBI Just Labeled You a Criminal. Supreme Court approves rule change that allow ...more
In this seven part tutorial, learn how to perform the exact dance from Michael Jackson's "Smooth Criminal". Keep the legacy of the King of Pop alive and well with these cool moves. Part 1 of 8 - How to Do the dance from Michael Jackson's "Smooth Criminal". Part 2 of 8 - How t ...more
In this tutorial, learn the starting dance move from Michael Jackson's music video for "Smooth Criminal". This spicy song is one of MJ's greatest hits and in this clip, learn how to do the wave move he does in the beginning. Once you master this step, you will look amazing on ...more
It seems like the EU is currently in the works of making "the production or sale of devices such as computer programs designed for cyber-attacks" illegal. So, if you're a network admin that uses WireShark or Metasploit, you better watch out! If you want to help combat this pr ...more
I want to write this article because in my childhood, I had experienced internet stalking which ultimately ended in physical stalking which then lead to several attempted abductions. I have now learned how to use the internet safely, who to communicate with and I've learned ho ...more
Virtual autopsies are the wave of the future in forensic medicine, using three-dimensional x-ray techniques instead of hacking through a mess of blood and guts. The Virtual Autopsy Table allows the cause of death to be determined quickly to aid in criminal investigations. Amaz ...more
This video is a useful ex-offender resource that will help people with felony convictions get employment by teaching them to properly put together a resume. A poorly written resume can hinder your employment.
No matter how freaky and alien-like Michael Jackson got towards the end of his life, he made an unforgettable contribution to the music world. Leaving us pitch perfect songs like "Billie Jean," Thriller," and "Smooth Criminal," the dude knew how to rock in style. If you're st ...more
Criminal “Expungement” is the process of going to court to ask a Judge to seal a criminal record. When a record is sealed, it does not show up in a criminal background check. It is important to remember that a sealed record is not destroyed. The police, immigration authorities ...more
Want to master "Smooth Criminal" by Michael Jackson? See how it's done with this free video guitar lesson, which presents a complete breakdown of the song and its constituent riffs. While this tutorial is geared toward those who already have some knowledge of the guitar, playe ...more
This was one of the most difficult achievements for me to get in The Elder Scrolls V: Skyrim. Mostly because I was never able to do something horrible enough to warrant a 1000 gold bounty. However, pms00 has a great video tutorial showing the easiest way to get the 'Master Cri ...more
I am the crime watch co-chairman for our neighborhood crime watch committee of our home owner's association. Instead of making a boring "do this, do that" video, I decided to make a funny video from the eyes of a criminal that specializes in stealing from homes, just like mine ...more
Uber's year is going from bad to worse, and they may be subject to a potential criminal probe in the ongoing Waymo legal battle. Judge William Alsup referred the case to the U.S. Attorney which means Travis Kalanick's company could be investigated for criminal wrongdoing, not ...more
Grandmaster Alexandra Kosteniuk teaches you how to play a real game of chess in this video tutorial. From the game Onischuk vs Carlsen in Biel (2007). Black plays and wins, by first taking white's rook and checking the king. The white king then takes the black queen, and so on ...more
Tsa whistleblower calls alex jones and reveals the tsa are hiring harden criminals on purpose! Video: .
“The UK government is rounding on protesters ahead of this summer’s Olympics, issuing the first court order to ban an Occupy activist from the event. The unprecedented security measures for the Games have been branded as over-the-top,” reports RT. One such banning order was h ...more
The very first text message was sent on December 3rd, 1992 by Neil Papworth, an engineer for Vodafone, and it simply said "Merry Christmas." He may have jumped the gun on the whole Christmas thing, but you trying coming up with the first text message in history! Today, there ...more
Welcome back, my greenhorn hackers! As all you know by now, I'm loving this new show, Mr. Robot. Among the many things going for this innovative and captivating program is the realism of the hacking. I am using this series titled "The Hacks of Mr. Robot" to demonstrate the ha ...more
With tools such as Reaver becoming less viable options for pen-testers as ISPs replace vulnerable routers, there become fewer certainties about which tools will work against a particular target. If you don't have time to crack the WPA password or it's unusually strong, it can ...more
Malevolent hackers can divert your incoming calls and texts to any number they want, and they don't need to be a criminal mastermind to do it. Even friends and family members can reroute your incoming calls and messages so that they know exactly who's trying to reach you, and ...more
Spoofed phone calls originate from one source that's disguising its phone number as a different one, and you probably get these calls all the time. Maybe they're numbers from your local area code or for prominent businesses, but the callers are just hijacking those digits to f ...more
Apple Watch owners know the struggle — it's the end of the day, and those rings aren't met. Whether you forgot your watch before hitting the gym, let the battery run out, or just didn't move enough, you could feel the sting of fitness failure. But it doesn't have to be this wa ...more
Your iPhone's built-in Voice Memos app is a great way to record the audio around you, whether it be conversations, lectures, meetings, interviews, discussions, chitchat, gossip, or other kinds of talks. But if your goal is to record audio on the down-low without being noticed, ...more
A router is the core of anyone's internet experience, but most people don't spend much time setting up this critical piece of hardware. Old firmware, default passwords, and other configuration issues continue to haunt many organizations. Exploiting the poor, neglected computer ...more
Mechanical locks have been around since ancient Egypt, with the oldest known artifact found in the ruins of Nineveh, an ancient city in Assyria, Mesopotamia, which is just across the Tigris River from what is now Mosul, Iraq. It was a forerunner to our modern-day pin tumbler ...more
As much as you try to safeguard your personal information, you may have made a small mistake by giving your phone number to the wrong entity, and now you're being bombarded with dozens of spam calls every day. To help parse your call log and reject the proper numbers without a ...more
One of the best things about Christopher Nolan's Batman trilogy is how realistic he makes the caped crusader feel. Unlike the Joel Schumacher or even the Tim Burton versions, Nolan's world seems grounded in some level of scientific fact. But just how close is science to actual ...more
There are nearly 100,000 unique onion service addresses online with over two million people using Tor every single day. Join me as I explore a small fraction of what the Tor network has to offer. It's puzzling to imagine about 100,000 .onion websites in existence. Readers who ...more
A mention of the deep web can bring to mind images of drugs, hackers, and other criminal activity. Despite the presence of these elements, the Tor network is a valuable tool for preserving privacy and anonymity. And browsing the deep web and any hidden services can be as simpl ...more
This video tutorial is for educational purposes only. See how to pick a normal lock with a tension allen wrench and a small screwdriver. "Lock picking is the act of unlocking a lock by analyzing and manipulating the components of the lock device, without the original key. Alt ...more
While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and they can be cracked in a matter of minutes. We'll show y ...more
Google Voice has a hidden feature that lets you record any phone call you're participating in, and unlike other apps, it doesn't cost a dime. When it comes to recording phone conversations, you may think the worst and associate it with something shady like obsessive exes and ...more
With the release of the Mirai source code, botnets are back in a big way. In the early days of botnets, zombies (infected hosts) would report to IRC (Internet Relay Chat) channels for CNC (command and control) instructions. Modern botnets have evolved, but they continue to use ...more
By now, many of you may have heard about iPhone tracking and recording your location data, but is there anything else being extracted from cell phones without our knowledge? If you're a Michigan state resident, the answer is an alarming "maybe". Michigan's police department h ...more
Apple's iOS 15.4 update for iPhone is out after 46 days of beta testing, and it has some exciting features you won't want to miss. Here's everything you need to know about the new software. The iOS 15.4 software has been available to developers since Jan. 27, 2022, and public ...more
Your social security number, credit card information, and medical history can fall into the wrong hands if you're not careful about how and where you share your data online. If you really care about your data, there are tools and techniques you can utilize to protect yourself ...more
Canary tokens are customizable tracking links useful for learning about who is clicking on a link and where it's being shared. Thanks to the way many apps fetch a URL preview for links shared in private chats, canary tokens can even phone home when someone checks a private cha ...more
The dark web is an intimidating place for a newbie hacker, but it's a powerful tool once you've learned to navigate it safely. To help you out with that, this guide will cover some need-to-know information for traversing the dark corners of the internet while keeping your iden ...more
Welcome back, my rookie hackers! "How can I travel and communicate over the Internet without being tracked or spied on by anyone?" It's a question many Null Byteans have asked me, so I have decided to write a comprehensive article addressing this issue. There are a multitude ...more
Telemarketers can be as terrifying as a villain from a horror film. Your phone rings with an unknown 800 number, and you immediately fill with a sense of dread. There's no way to get them to stop calling; you imagine the number appearing on your phone at all hours of the day a ...more
The final chapter of Christopher Nolan's Batman trilogy is here, The Dark Knight Rises, and if you're anything like me, it made you want to immediately don a cowl of your own and run around punching criminals. Don't forget though, one of the most awesome aspects of Batman is h ...more
Every time you make a call or send a text, you're giving the recipient your phone number. This can be quite the security vulnerability, opening yourself up to scammers, spammers, and the feds. In this how-to, we'll look at what a burner phone is, why you might want one, and ho ...more
If you're ever faced with a situation of handing over your iPhone to law enforcement (or getting it taken forcibly), whether by the police, feds, or court system, there are things you can do to prevent them from getting access to all that potentially self-incriminating data. A ...more
One day, you may find yourself in an emergency situation where you need to undo the chain lock of your home's front door, or somebody else's front door. Maybe someone forgot the unlock it when exiting the back door. Maybe you're grandfather is having a heart attack. Maybe your ...more
With the recent news that New York County's District Attorney's office is trying to get into over 400 locked iPhones for use in criminal investigations, you can see why it's important to keep other people away from your personal data. The fact that it can and will be used agai ...more
White criminal Conrad Zdzierak has committed the ultimate crime of racial stereotyping, plus multiple counts of aggravated robbery after robbing four banks and a CVS pharmacy. The robberies took place on April 9th of this year, but Zdzierak wasn't caught until now, thanks to a ...more
Watch this video conning tutorial and learn how to pick a door lock. Maybe you locked yourself out of the house, or you're just a criminal trying to get in somewhere you don't belong. You will need a lock pick and a tension wrench. To make the lock pick in this video take a ha ...more
Welcome back, my budding hackers! People often ask me, "Why are you training hackers? Isn't that illegal?" Although I usually give them a short version of this post, there are MANY reasons why YOU should be studying hacking. Before I begin, I want to re-emphasize to all of y ...more
For most street artists, it takes a considerable amount of time to paint large art installments on the walls of urban structures. The more time it takes, the better chance there is of getting caught, since nearly all of the rogue artwork is slapped on the sides of city and pri ...more
Cinderella, Little Red Riding Hood and Sleeping Beauty are some of the most horrific fairy tales ever written, but over the course of nearly 200 years they've become watered down and sugar coated for innocent children everywhere. The original tales by the Brothers Grimm are vi ...more
The last few months of WikiLeaks controversy has surely peaked your interest, but when viewing the WikiLeaks site, finding what you want is quite a hard task. Despite rumors of easy access via the Kindle and iTunes App Store, there currently is no way to view the leaked docum ...more
Oleg Mavromati's latest project, Ally/Foe, allows online voters the chance to electrocute the Russian artist at a mere fifty cents a pop. From November 7th to November 13th, viewers of Mavromati's livestream can pay to vote “innocent” or “guilty.” 100 guilty votes result in th ...more
If you're a frequenter of Null Byte, I bet you have at least some interest in information security. Furthermore, you have a hobby that if applied in certain ways, will get you arrested. I've received quite a few messages from the community here about federal cybercrime law and ...more
The big night is less than a week away, so how do you not have a costume yet?! In my world, Halloween is the night of all nights. It's the only day of the year when it's socially acceptable to dress and walk around like an insane person, eat too much sugar, and scare the hell ...more
Welcome back, my fledgling hackers! In this series, I am trying to develop your knowledge of digital forensics, which is valuable whether you're choosing a career in it or just want to know how your hacker activity can be traced. Few professional digital forensic investigator ...more
FAST is an expedited travel program for commercial truck drivers that travel between the US and Canada. FAST cards are available to citizens or permanent residents of Canada or the US. The FAST program is viewed as a privilege by both Canada and the US. You can be denied for t ...more
People like Ralphige and The Jerky Boys have elevated prank phone calls to an art. Here’s how you can get in on the fun. You Will Need: * A phone * A plan * Caller I.D. block Step 1: Have a plan Outline your basic scam. Are you going to call businesses or individuals? What ...more
Michael Jackson appears to be more popular know than he ever was, which always seems to be the case with fallen pop icons. Not just his music either… we're talking about art. Since MJ's death, more and more artists are looking for ways to create their version of musical master ...more
You know that feeling when your cell phone gets stolen and you figure it is pretty much lost forever. You could've used one of the millions of device managers and trackers, but ya didn't. And the Good Samaritan is not coming to your rescue. Of course you could call the police ...more