This video shows you how to work with the Text tool, and how to style text using the Property Inspector in Flash CS3 Professional. You learn about the difference between dynamic, input, and static text fields. This tutorial also covers device fonts, and explains the benefits o ...more
Add interactivity to your Flash files with this basic tutorial on start/stopDrag functions in ActionScript 2.0. This function allows the user to manually move objects with their mouse clicks. Whether you're new to Adobe's popular Flash-development platform or a seasoned web de ...more
Create your own loader component to incorporate into your Flash-based website or other Flash application. This component will increase the ability for users to interact dynamically with your website and create more user-friendly content. This tutorial shows you how you can wor ...more
All the files you need are in a free download on DevelopPHP. PHP has to be on a server. It will not run on a local machine. Type your name. There are two variables which show up in the dialog boxes (which are stacked.) You can change the user name. It sets up a URL request and ...more
The Java windows can pop up and alert your user to important aspects of your website - such as receiving a forum message. This tutorial shows you how to make your own Java-style popup alert window using Action Script 3 and add it to your Flash-based website.
Set up a series of shifting panels or a slideshow in Adobe Flash CS3. This technique can be added to a website, where a user can click on an array of thumbnail images to cause your panels to transition. This technique shows you how to create this animation without using motion ...more
Android devices are becoming more and more popular with each passing day, so why is it that Google has yet to design a software program that allows users to manage their music and video libraries on their computers? Apple's iTunes offers iPhone users an easy way to control the ...more
This is an Electronics video tutorial where you will learn how to manually adjust the zoom position on the Nikon SB-900 with the diffuse dome attached. This is called the dome trick. It is not documented in the SB-900 user’s manual. The manual states when the diffuse dome is a ...more
Interested in creating your own dynamic, web-based applications using Microsoft Visual Basic 2005 Express Edition? In this installment from the Absolute Beginner's Series of VB/ASP.NET form control video tutorials, you'll learn how to use the Rich Text Box control which allows ...more
Video: . Recycle your hard drive into a hidden flash memory device that only you know how to turn on and use in secret. This DIY hack project allows you to recycle your broken hard drives back to life and turn them into something useful. So far, this project has several funct ...more
There could be multiple reasons why you would want to input a name in the Windows taskbar on your PC, like when dealing with a network of computers, to help identify workstations, or simply for a customized personal feel. With this tutorial, you'll see how easy it is to put yo ...more
In this Null Byte, I'm going to teach you about Null Byte Injections. Null Bytes are an older exploit. It works by injecting a "Null Character" into a URL to alter string termination and get information or undesirable output (which is desirable for the malicious user). All l ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
Gary Rosenzweig of MacMost is describing how we can use sound input and output controls on one's Mac computer. He mentions of the availability of multiple input and output devices like built-in mic; line-in etc and speakers , USB headset and provides a detailed information of ...more
Create a content-containing (such as clickable graphics, buttons or hyperlinks) window which can be dragged across the screen by your user without losing any of the content! This tutorial shows you how to make this window look exactly like a Mac OS content window as well, usin ...more
Learn the basics of the Swift 3D 6 interface and see how to manipulate the program's toolbars to maximize your workspace. Whether you're new to Electric Rain's popular Flash-oriented 3D modeler or just looking to better acquaint yourself with the program, you're sure to find m ...more
The Toyota 4Runner has a DVD based navigation system which features a touch screen display and is quite user-friendly. The system can provide voice guidance in English, French and Spanish. One can find an input destination quickly and easily using either voice commands or manu ...more
It seems the French have carefully observed the hacking achievements of one super clever Carnegie Mellon grad, turning his hack into a modern iPad application-to-be. A couple years back, we told you about the fantastic Johnnie Chung Lee who used headtracking to create a three ...more
Marketers from Facebook who design ads for advertisers can ask them to switch over to higher end product in which Facebook would be designing or hosting themes based on their products. This product theme will have a separate scroll area where advertisers (after buying rights f ...more
Sometimes it's impossible to concentrate — let alone direct your personal assistant Siri — when someone is blasting music on their phone or talking to thin air. I mean I'm loud, but not that loud. So, it's a relief to hear that this could be changing for the better. According ...more
While our time with the Protostar VM from Exploit Exercises was lovely, we must move on to bigger things and harder challenges. Exploit Exercises' Fusion VM offers some more challenging binary exploitation levels for us to tackle. The biggest change is that these levels are al ...more
Welcome back, my greenhorn hackers! Recently, I asked the Null Byte community what subject they would most like me to cover in future tutorials. Many of you cited scripting, and I decided it's best to cover this subject soon, so here goes. Any self-respecting hacker must be ...more
While Meta Company has agreed to a settlement in its lawsuit against a former employee and his company, they find the tables have now turned on them in the form of patent infringement allegations from another entity. Recent court filings show that Meta Company has reached a s ...more
Database technology has vastly improved the way we handle vast amounts of data, and almost every modern application utilizes it in one way or another. But the widespread use of databases naturally invites a slew of vulnerabilities and attacks to occur. SQL injection has been a ...more
Welcome back, everyone. In the previous part of this rapid-fire miniseries, we built the victim portion of the shell. Today, we'll be building the attacker portion. This script will initialize interaction with the victim portion of the shell, send commands, and receive the out ...more
After a long hiatus, we shall once again emerge from the shadowy depths of the internet to build an exploit. This time, we'll be looking at how to defeat a non-executable stack by using the ret2libc technique — a lean, mean, and brilliant way of exploiting a stack overflow vul ...more
Hello null_byters, after some time out here we are again with another tutorial, continuing our beautiful series, today we will write our first real world bash script. BEFORE WE START Before we start today's lesson Let's recap what we learned in the previous lesson, right now ...more
Welcome finally, to a tutorial on buffer overflows! At last we have reached an exciting part of this series where I will dedicate the entire article on explaining and exploiting the notorious vulnerability. Grab some popcorn, sit back and enjoy the show. What Is a Buffer Over ...more
Every step in the evolution of computing brings an in-kind leap forward in user input technology. The personal computer had the mouse, touchscreens made smartphones mainstream consumer devices, and AR headsets like the HoloLens and the Magic Leap One have leveraged gesture rec ...more
The one thing that separates a script kiddy from a legitimate hacker or security professional is the ability to program. Script kiddies use other people's tools, while hackers and security pros write their own tools. To that end, we're going to see how a stack overflow vulnera ...more
Last time in how to train you python, we covered the basics of variables and output. While we were covering variables, we talked briefly about strings. "String" is just a fancier way of saying "Word". A string is simply a set of characters encased in quotations, this lets pyth ...more
During its presentation at Unite Berlin, Magic Leap gave attendees a crash course in developing experiences for Magic Leap One (ML1), we found out quite a bit more about how the device works and what we can expect to experience with the device. Alessia Laidacker, interaction ...more
It may sound like deja vu, but neural interface startup CTRL-labs has closed a $28 million funding round led by GV, Google's funding arm, for technology that reads user's nerve signals to interpret hand gestures. That's because GV, along with Lux Capital, led a $28 million fu ...more
Welcome back, my novice hackers! In this series, we have been exploring how a forensic investigator can find evidence of illegal or illicit activity. Among other things, we have examined the registry and prefetch files for artifacts and have done some rudimentary forensic ana ...more
Although early attempts at consumer smartglasses have employed trackpads and handheld or wearable controllers for user input, its the gesture control interfaces of the HoloLens 2 and the Magic Leap One that represent the future of smartglasses input. A new machine learning mo ...more
Hello my fellow hackers, Welcome to my republished revision of the ruby programming language, Part 1. Today, we will try to build an ftp cracker in ruby: This is going to be a quick one since OTW has already made one in python and we are gonna look upon that to create a simil ...more
It is often said that the best hackers remain unknown, and the greatest attacks are left undiscovered, but it's hard for an up-and-coming penetration tester or white hat to learn anything unless one of those factors is actually known or discovered. But the end goal here in our ...more
An attacker with shell access to a Linux server can manipulate, or perhaps even ruin, anything they have access to. While many more subtle attacks could provide significant value to a hacker, most attacks also leave traces. These traces, of course, can also be manipulated and ...more
Hello partners, first of all I would like to thank all those who have sent me positive feedback about my posts, to say that I'm always willing to learn and teach. I'm also open to answer the appropriate questions. Second i want to say sorry for the series i left in stand by m ...more
In light of our recent post, Art Borne From the Barrel of a Gun, here's a thorough guide to building your own bullet capture system via robotics site Glacial Wanderer. Says Hack a Day: "A pair of IR sensors spaced two inches apart can capture and calculate the speed of a pro ...more
This is my first ever how-to so I apologize in advance for any grammar mistakes or spelling errors. Introduction This is what I'm planning on being a series of c++ coding articles. This one in particular are gonna be a series of programs for various password cracking methods ...more
The last time we heard from Meta, the makers of the Meta 2 augmented reality headset, things looked pretty bleak. Now, as several new facts have come to light, we have confirmation regarding the beleaguered company's fate: Meta is done. As we reported back in September, the c ...more
Back for the second part, Just to recap in part one, we installed and configured the dhcp server. This will allow us to pass our clients requests out to the internet. This is a very important step in the evil twin attack because if your targets (clients) can't make it out to ...more
A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website d ...more
Firstly let me start by giving credit to Lucid for their guide on Evilzone which inspired this idea, as well as the recent talk of anonymity on here. As the Archwiki states: Systemd is a system and service manager for Linux, compatible with SysV and LSB init scripts. systemd ...more
As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance. The issue with port ...more
During our last adventure into the realm of format string exploitation, we learned how we can manipulate format specifiers to rewrite a program's memory with an arbitrary value. While that's all well and good, arbitrary values are boring. We want to gain full control over the ...more
Welcome back everyone. This article isn't going to contain anything related to scripting, but rather some updates about the series. We'll be quickly discussing what we've covered so far and what is to come. When we started this series about 5 months ago, we were teaching the ...more
This is finding some of your vulnerability using Lynis. This tool Lynis is used on Unix and Linux type operating systems (sorry windows). So lets get started What Is Lynis and How to Install Lynis is a security checking tool which can help you harden your security defenses. ...more
Welcome back, my hacker apprentices! To enter the upper echelons of hackerdom, you MUST develop scripting skills. It's all great and well to use other hacker's tools, but to get and maintain the upper hand, you must develop your own unique tools, and you can only do that by d ...more
In this tutorial I will be explaining the purpose of unique encryption/decryption scripts ( I will be referring to these at "UEDS" for this tutorial). Then, I will show you how to make one. Finally I will talk about the downsides to the method I use. I will also provide links ...more
Welcome back! In the last iteration of how to train your python, we covered loops, today we'll be covering something that I wish I had learned about much earlier in my scripting career, errors. We all run into them, and they can be frustrating, but there is also a silver linin ...more
Based on newly surfaced information, transparent smartphones like those teased in Iron Man 2 and those hand-tracking monitors made famous in Minority Report may eventually end up being "designed by Apple in California." Among a treasure trove of more than 60 patents awarded t ...more
Last year at CES, RealMax blew away the AR headset competition with a prototype AR headset surpassing 100 degrees field of view. This year, after announcing the launch of the new RealMax Qian headset in December, the company has returned to Las Vegas with a product that is re ...more
When most people first become aware of Kodi (formerly known as XBMC), they hear about its ability to stream illegal content. But the real Kodi community knows that it's much more than just a haven for pirated material — it's an all-in-one media player that addresses the majori ...more
Welcome back! Sorry for being so quiet, I've been rather busy with this project lately! Anyways, in the last iteration of how to train your python, we covered lists. Today we'll be introducing iteration and the two loops python has to offer, for and while. Also, we'll be cover ...more
New York-based startup CTRL-Labs has closed a $28 million Series A round of funding from Google parent Alphabet's GV and Amazon's Alexa Fund, among others, for its next-generation neural interface technology for AR/VR and robotics. CTRL-labs offers a twist on the brain contro ...more
A company whose sole product line is smartphones might be worried about early proclamations that the smartphone is dead with the advent of augmented reality wearables. So it isn't too surprising that smartphone maker Vivo has produced its own take on consumer-grade smartglass ...more
The Federal Communications Commission (FCC) has cleared a path for Google to move forward with hand-tracking technology that could pose a major threat to Leap Motion. In an order issued on Monday, the FCC granted Google permission to run its Project Soli, a sensor that can de ...more
On Thursday, at the Augmented World Expo, Stockholm, Sweden-based eye tracking company Tobii announced that the augmented reality display company Lumus will integrate its eye tracking technology into the Lumus DK50 AR development kit. While Lumus produces optical engines for ...more