Looking for a guide on how to download and run BlackBerry App World on your BlackBerry smartphone? This clip will show you how it's done. Whether you're the proud owner of a BlackBerry smartphone or are merely considering picking one up, you're sure to be well served by this v ...more
You've definitely heard about the Too Many Items mod for Minecraft, watch this video to learn how to get it on your PC. You'll want to download Win-Rar and the Too Many Items mod so that you can follow along.
Do you want to play Brink, but don't feel like paying for it? This video will show you how to download Brink and crack it, so you can play for free. You'll need to download Alcohol 120% and a torrent in order to make this work.
Update: this article is referring to the 1.9 pre-release beta version, which is now commonly referred to as 0.1.9, released in October of 2011. As some of you may know, Jeb recently made the Minecraft 1.9 pre-release available to folks via a link on his twitter. Exciting, rig ...more
The Minecraft 1.9 pre-release is out, and Jeb has recently tweeted a link to version 2 of the 1.9 pre-release. If you're interested in downloading and installing it, take a look at this guide to learn how to update your Minecraft to the 1.9 pre-release. ...more
The Minecraft 1.9 prerelease beta has begun. This guide will help walk you through the process of downloading, installing, and upgrading your version of Minecraft to the 1.9 pre-release so that you can try out the new biomes and snow golems for yourself. Download the Minecraf ...more
Interested in installing the µTorrent BitTorrent client to get started downloading torrent files? This clip will show you how it's done. It's simple! So simple, in fact, that this home-computing how-to can present a complete, step-by-step overview of the process in just over t ...more
This clip discusses the process of downloading and installing Blender, the free 3D modeling and animation application. Whether you're new to the Blender Foundation's popular open-source 3D computer graphics application or are a seasoned digital artist merely on the lookout for ...more
If you are looking to operate a web site from your Mac, MAMP- a package of free web software programs- is an elegant solution. This video will show you how to configure MAMP on your computer, so you can get on your way running your sites.
Want to personalize your Minecraft game? This tutorial shows you how you can find custom skins and texture packs on Minecraft fan sites, and then import them to your game. This method will only work for machines running either Windows Vista or 7.
Fan made mods can be a fun way to add extra content to your game, and the mod community for Dragon Age: Origins is vibrant and active. This tutorial shows you where to find mods, download them and how to add them to your game files to include for play.
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Well this is it folks, the final Pre-Release before Minecraft officially launches! These changes should be the final game changes until it releases in Vegas this Friday. Mojang has ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Minecraft Pre-Release 1.9 Version 6 is out! This update includes more bug fixes from Version 5 and Ender Dragons! We'll be reporting more changes as we find them, so stay tuned. Ho ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. We're back again for another Pre-release! This time around it's 1.9 Version 4. Notch released version 4 today saying, "...instead of trying to squeeze in another real release, we’r ...more
If you're interested in running the Minecraft 1.9 pre-release on your server and giving it a spin (or letting others with the Minecraft 1.9 pre-release client give it a spin), take a look at this guide to setting up and installing the server. This guide will also help people w ...more
How to download and install the free Visual Basic Express 2008 programming package. Download and install Visual Basic Express 2008. Click through to watch this video on tricklife.com
This how-to video is about how to download and install Windows 7 operating system in the computer. To download and install Windows 7 for free just follow these steps: Two methods are available to download and install Windows 7, Let's see the first method now, Go to Google a ...more
Hacking flash games is the new coolest thing these days... now hackers can be anywhere, ever expanding, all thanks to a little cheating program called Cheat Engine. Check out this video tutorial to learn how to download and install Cheat Engine to hack flash games. Descriptio ...more
Apple's iOS 16.6 software update for iPhone was released on July 24, with iOS 16.7 following on September 21. While Apple is currently focused on improving iOS 17, we may see iOS 16.8 pop up. When it does, you can try out all the upcoming new features as long as you're OK with ...more
Apple pushed out its iPadOS 16.6 update for iPad on July 24, with iPadOS 16.7 following on September 21. While the company is currently working on improving iPadOS 17, we may still see an iPadOS 16.8 update. If that happens, you can try out all the upcoming new features as lon ...more
The iPhoneHackers shows viewers how they can install Installous on their iPhone and Download free applications. First, you will need to have a Jailbroken iPhone or iPod Touch with Cydia. Your first step, will be to load Cydia on your iPhone. When Cydia has loaded click on 'Man ...more
In this how-to, you'll find instructions for programming with the Python programming language. More specifically, this tutorial addresses everything from locating and installing Python to running it and writing your first programs. If you're interested in learning more about t ...more
Installing FlashGot and BitComet allows you to pause and resume big downloads from the point you left off.
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Minecraft 1.2.5 has been planned for a few days now, but Jeb wanted to wait for modders to catch up to the new changes. This time around, things should run ...more
Apple's developer conference, where iPadOS 18 will be revealed, is just around the corner. But before we get there, there's still work to be done on iPadOS 17. That brings us to iPadOS 17.5 — and you can test drive it on your iPad right now before the masses. Following the fe ...more
Apple is still not finished with iOS 17. We're just a few months away from its developer conference, where iOS 18 will be revealed, but there are still things to be fine-tuned on your iPhone until then. This brings us to iOS 17.5 — now available to try on your iPhone. Since t ...more
Python can be used for games, websites and operating system GUIs; and you can work with it on PCs, Macs or Linux machines. This tutorial shows you how to install the compiler and get started teaching yourself how to program in Python.
Well, this is my first article so if it sucks tell me...lol!! Story Time Well, story time....yaaay!!! I wanted to learn buffer overflows and binary exploitation and all those asm crap...lol So I opened up a lotta sites and eventually came across a polytechnic website with p ...more
If you used Touch ID on an iPhone before, all you had to do to install apps and games from the App Store was rest your fingertip on the Home button. On the iPhone X, there's Face ID instead, and Apple has included on-screen instructions to help everyone adjust to the lack of H ...more
Bluetooth Low Energy (BLE) is the de facto wireless protocol choice by many wearables developers, and much of the emerging internet of things (IoT) market. Thanks to it's near ubiquity in modern smartphones, tablets, and computers, BLE represents a large and frequently insecur ...more
OnePlus phones are easy to root, but that also means they're easy to brick if you get trigger happy with your superuser privileges. If you find yourself in this situation, you'll quickly realize the OnePlus firmware download page doesn't provide files you can flash in Fastboot ...more
It's been a while when the major web browsers first introduced HTTP Strict Transport Security, which made it more difficult to carry Man In The Middle (MITM) attacks (except IE, as always, which will support HSTS since Windows 10, surprised?). SSLStrip and the HSTS Chronicles ...more
A friend of mine has a crazy amount of Reddit karma and gold, and yesterday he let me in on his secret. This person, who will remain unnamed for obvious reasons, created a Python script called Reddit Karma Crawler that finds rising posts before they get too popular. Every goo ...more
Analysis of photographs and social connections can be a huge component of social engineering. Understanding who a person is, as well as who they know, can establish links within a company. This information could be used by hackers to execute elaborate social engineering attack ...more
The tactic of brute-forcing a login, i.e., trying many passwords very quickly until the correct one is discovered, can be easy for services like SSH or Telnet. For something like a website login page, we must identify different elements of the page first. Thanks to a Python to ...more
Welcome back, my tenderfoot hackers! Have you ever wondered where the physical location of an IP address is? Maybe you want to know if that proxy server you are using is actually out of your local legal jurisdiction. Or, maybe you have the IP address of someone you are corres ...more
This video tutorial instructs you on what a key logger is and how to make a key logger which records your computers key strokes for later review. There are software or hardware based key loggers that intercept the connection between the keyboard and computer. Hardware key logg ...more
Net neutrality is dead and your internet service providers can collect all the data they want. While VPNs are a great way to protect some of that privacy, they're not perfect. There is another option, though, called Noisy, which was created by Itay Hury. It floods your ISP wit ...more
When Google Play Music launched a few years ago, I ditched iTunes and began using the service as my one and only source for listening to my personal music library. While All Access is great, I still prefer the radio feature on Spotify, so I still use that to discover new music ...more
Hello fellow Nullbytiens, I'm Washu, a long time commenter but first time poster. Today we'll be making an IRC bot, if you haven't seen OTW's post about the new IRC channel I would encourage you to go check it out. He does a good job at explaining what IRC is and how to get se ...more
I was on our new #nullbyte IRC channel when someone told me how tedious it is to install an OSX Virtual Machine on Virtual Box (I think it was wawa). We all know Linux rocks (gets acknowledgement from the crowd), but there are morons out there, multiplying at a never before se ...more
The USB Rubber Ducky comes with two software components, the payload script to be deployed and the firmware which controls how the Ducky behaves and what kind of device it pretends to be. This firmware can be reflashed to allow for custom Ducky behaviors, such as mounting USB ...more
While MacOS computers have been spared from some of the most famous malware attacks, there is no shortage of malicious programs written for them. To keep your computer safe from some of the most common types of malware, we'll check out two free tools. These tools can automatic ...more
To remove the DRM from a Kindle, you will need the following: Kindle for PC software program and Python scripting program. Install your Kindle for PC software, if you don't already have it. You can get it from Amazon. You will have to register it to your account. Close it. In ...more
Welcome back, my greenhorn hackers! The Holy Grail of any hacker is to develop a zero-day exploit—an exploit that has never been seen by antivirus (AV) and other software developers, as well as intrusion detection system (IDS) developers. In that way, you can exploit systems ...more
Welcome back, my greenhorn hackers! I began this series on scripting awhile back to teach all aspiring hackers how to write some basic scripts for hacking and reconnaissance. Without developing some basic scripting skills, the aspiring hacker will be condemned to the realm of ...more
WordPress did not become what is arguably the most popular blogging and CMS platform on the planet because it was difficult to use. Rather, its user-friendly and rich feature set led to it finding a home on somewhere north of 70 million websites—and that's just counting blogs ...more
Passwords and data stored in web browsers are extremely valuable to hackers. If not for financial gain, black hat hackers may still leak your passwords and personal information for amusement. Never undervalue what you're worth to a hacker. While I'm definitely no black hat, d ...more
A stager is a small piece of software that's typically used by malware to hide what's happening in the early stages of infection and to download a larger payload later. We're going to explore how it works by creating a single line that downloads and runs potentially infinite ...more
Most companies have services like employee login portals, internal-only subdomains, and test servers they would prefer to keep private. Red teams and white hat hackers can find these obscure and often vulnerable services using a tool designed to help protect users from fraudul ...more
For anyone interested in using cheap, Wi-Fi-connected microcontrollers like the ESP8266, the Arduino programming language can be a barrier to entry. Based on C++, Arduino requires knowledge of more computer science than languages like Python. Fortunately for beginners, setting ...more
This is my attempt to show people some cool things we can do with programming, and to give a small incentive for people to join the weekly Community Bytes. I wanted to make a tutorial on how to use Twitter from the command line with Python. This would have been an easy project ...more
Using Hydra, Ncrack, and other brute-forcing tools to crack passwords for the first time can be frustrating and confusing. To ease into the process, let's discuss automating and optimizing brute-force attacks for potentially vulnerable services such as SMTP, SSH, IMAP, and FTP ...more
Do you have an Alfa AWUS036NH Wi-Fi adapter that claims it can go to 2000 mWs, or some card that can supposedly transmit power over 1000 mW? If so, you may have run into problems setting your card's TXPOWER higher than 30 dBm, which is about 1000 mW. Well, I will show you how ...more
If you need to scan a large number of domains for a specific web app vulnerability, Dorkbot may be the tool for you. Dorkbot uses search engines to locate dorks and then scan potentially vulnerable apps with a scanner module. This tool is useful if you're managing a large num ...more
Koadic allows hackers to monitor and control exploited Windows systems remotely. The tool facilitates remote access to Windows devices via the Windows Script Host, working with practically every version of Windows. Koadic is capable of sitting entirely in memory to evade detec ...more
Individually addressable LEDs, also commonly called "NeoPixels" after the popular Adafruit product, are a bright and colorful way to get started with basic Python programming. With an inexpensive ESP8266 or ESP32 microcontroller, it's easy to get started programming your own h ...more
Ruby is a dynamic, general-purpose programming language created by Yukihiro "Matz" Matsumoto in Japan around the mid-90's. It has many uses but with it's flexibility, it makes a great language to write exploits in. In fact, the entire Metasploit Framework is written in Ruby! T ...more
Gathering information on an online target can be a time-consuming activity, especially if you only need specific pieces of information about a target with a lot of subdomains. We can use a web crawler designed for OSINT called Photon to do the heavy lifting, sifting through UR ...more
With the release of the Mirai source code, botnets are back in a big way. In the early days of botnets, zombies (infected hosts) would report to IRC (Internet Relay Chat) channels for CNC (command and control) instructions. Modern botnets have evolved, but they continue to use ...more