Bucky from The New Boston serves up this Python video tutorial on how to import modules into IDLE in Python. This is the program you use to write all of your Python code down. Fun with importing modules! Python is a dynamic, object-oriented, high-level, programming language t ...more
Bucky from The New Boston serves up this Python video tutorial on how to reload modules in Python. This is the program you use to write all of your Python code down. Learn how to reload modules once your source file has been edited! Python is a dynamic, object-oriented, high- ...more
Bucky from The New Boston serves up this Python video tutorial on how to get module information in Python. This is the program you use to write all of your Python code down. Learn how to get extra info from outside modules! Python is a dynamic, object-oriented, high-level, pr ...more
Bucky from The New Boston serves up this Python video tutorial on how to work with files in Python. This is the program you use to write all of your Python code down. Fun with files! Python is a dynamic, object-oriented, high-level, programming language that can be used for m ...more
Bucky from The New Boston serves up this Python video tutorial on how to read and write lines in files in Python. This is the program you use to write all of your Python code down. Fun with reading and writing lines into a file! Python is a dynamic, object-oriented, high-leve ...more
Bucky from The New Boston serves up this Python video tutorial on how to program and write lines in files in Python. This is the program you use to write all of your Python code down. Fun with writing lines into a file! Python is a dynamic, object-oriented, high-level, progra ...more
Bucky from The New Boston serves up this Python video tutorial on how to program slice lists in Python. This is the program you use to write all of your Python code down. Slice Python! Python is a dynamic, object-oriented, high-level, programming language that can be used for ...more
Bucky from The New Boston serves up this Python video tutorial on how to program lists functions in Python. This is the program you use to write all of your Python code down. Fun with list functions! Python is a dynamic, object-oriented, high-level, programming language that ...more
Bucky from The New Boston serves up this Python video tutorial on how to program slices in Python. This is the program you use to write all of your Python code down. Slice Python! Python is a dynamic, object-oriented, high-level, programming language that can be used for many ...more
Bucky from The New Boston serves up this Python video tutorial on how to program raw input in Python. This is the program you use to write all of your Python code down. Fun with input versus raw input! Python is a dynamic, object-oriented, high-level, programming language tha ...more
Bucky from The New Boston serves up this Python video tutorial on how to save and execute your programs in Python. This is the program you use to write all of your Python code down. Fun with saving programs! Python is a dynamic, object-oriented, high-level, programming langua ...more
Bucky from The New Boston serves up this Python video tutorial on how to program variables in Python. This is the program you use to write all of your Python code down. Fun with variables! Python is a dynamic, object-oriented, high-level, programming language that can be used ...more
Bucky from The New Boston serves up this Python video tutorial on how to use simple numbers and math calculations in Python. This is the program you use to write all of your Python code down. Fun with numbers! Python is a dynamic, object-oriented, high-level, programming lang ...more
Bucky from The New Boston serves up this Python video tutorial on how to download and install Python. This is the program you use to write all of your Python code down. Python is a dynamic, object-oriented, high-level, programming language that can be used for many types of s ...more
This video tutorial instructs you on what a key logger is and how to make a key logger which records your computers key strokes for later review. There are software or hardware based key loggers that intercept the connection between the keyboard and computer. Hardware key logg ...more
In this video tutorial / demonstration you will learn how to convert an existing Visual Basic project to Jabaco Java. You will need both Microsoft Visual Basic and Jabaco, a simple programming language with a Visual Basic like syntax. Jabaco enables you to create powerful soft ...more
If you're a Visual [blank] programmer heretofore intimidated by the thought of programming for the Linux operating system, take heart: this video tutorial will teach you how to visually code GUI applications with Ruby and Glade.
wxPython is fast becomming one of the most popular cross-platform GUI programming solutions. Here Kyran Dale takes you through the simple steps required to have wxPython up and running on your Windows machine.
The already robust and ingenious Nmap tool has received a whole slew of new scanning scripts that can be used to do all sorts of naughty endeavors. Notably, the SQLi module, since it is a necessary evil that we must cover here at Null Byte. This major update is going to fuel t ...more
Today isn't actually Pi Day, but I was unable to get this article out in time. Pi Day was actually yesterday, March 14th (3.14), so let's call this a post-Pi Day treat! I've usually stuck to computers and security in the past, so I thought I'd toss things up a bit and give yo ...more
In this video from iPT2gGeec we learn how to control an iPhone from your computer. You need a jailbroken iPhone to do this and use a program called Veency. Open Cydia. Search for Veency. Install it. That is all you need to do with your iPhone. Now to get it to work on your co ...more
In this Computers & Programming video tutorial you will learn how to make Google go crazy. This is a cool cheat that makes all the pictures in Google to fly around the page. First do a Google search for 'Google go crazy' and open the first link. Then in another tab search for ...more
VNC stands for Virtual Network Computing. It is remote control software which allows you to view and fully interact with one computer desktop (the "VNC server") using a simple program (the "VNC viewer") on another computer desktop anywhere on the Internet. The two computers do ...more
You want to put out a live web server, but you don't want to be owned in the process. An expert eye for security is not needed if you take a few basic steps in locking down the hatches. Most successful attacks today are not the complex, time-consuming tasks you might think, bu ...more
Another week has passed on the online battlefield as the CISPA legislation continues to grind away at our freedom. Here at Null Byte, we try to keep our community informed and knowledgeable at the same time—and that means creating content for them to learn from. After last we ...more
Wireless networks. Nowadays, everyone uses 'em, but most don't secure 'em. On average, I can drive up and down any block in my city and find at least one or two open or semi-open networks on any given day. With some changed MAC addresses for good measure, an attacker can use y ...more
Thanks to Yifan Lu, it's been discovered that the operating system running on the Kindle Touch is written mostly in HTML5 and JavaScript, unlike the previous models which used Java. This is exciting, because when a device is hacked or rooted, that means homebrew programs can b ...more
Whatever your reasons for doing it, if you are trying to hack passwords, it helps to have the right software for getting the job done. With the Cain and Abel program, you will be well on your way to hacking even the toughest personal passwords. Visit us at bleedingedgesecurit ...more
What is a Data Structure? When we think of a "structure" we often think of architecture, but data also often has structure. There are many different types of data structures: arrays, graphs, queues, stacks, and so on. We use these structures in order to be able to effectively ...more
Introduction I am currently starting to learn the Python programming language, programming languages make up all the programs that we use, that is enough for it to fascinate me if it isn't for you then maybe start reading this and you will quickly see how powerful it is. This ...more
In Google definitions a macro is defined as "a single computer instruction that results in a series of instructions in machine language". Basically a macro is a programming script that tells the computer what to do. You can tell a computer (via a macro) to move a mouse, click, ...more
When you first become interested in learning how to program, it can be difficult to find a place to start. A lot of questions come up, especially if you're new to the idea of programming entirely. After you pick which language you want to learn, you have to worry about how you ...more
Some people are what is labeled a power user. I am one of these people. No matter how fast I get my system, or how quick of programs I have, it is never good enough. There is always at least one program that I could swap out for a more advanced, text-based counterpart that inc ...more
People sometimes ask me about the IT industry here in the states. These folks are usually either trying to get into a certain field, or looking to switch or move into another one. Right now, you may currently be a Computer Science major that will be graduating shortly and are ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Your IP (Internet Protocol) address is your unique ID on the internet. It's synonymous with your home address. Anyone in the world can contact your computer through its IP address, and send a retrieve information with it. I'm sure at one time or another you've heard that hack ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more
Injection is an attack vector that involves breaking out of a data context and switching into a programming context through the use of special characters. These characters are significant to the interpreter being used, but not needed for the general user input being asked for. ...more
WELCOME & THANKzZz For Your Contribution, Support And Time...! ...Hello, zZz~AKA~StanDP Here...; There are many ways to tweak, change, enhance your internet experience to suite your needs, I will discuss a few things I did to enhance my online experience along with Fire-Fox ...more
How To Start To start developing website is a hard way to tell people depending on what they are best at. I'd like to describe a few of 'em. I will call them a few names depending on what effect comes out of 'em. And I will describe what developing languages there are out the ...more
Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more
If you're an aspiring or even well-established web or app developer, the good news is that there's a virtually limitless number of lucrative opportunities waiting for you, regardless of whether you're looking to work for a company or as a freelancer. The bad news is that comp ...more
Hello and welcome to my article. I have made this article for anyone who wants to become a hacker, and wants to know how to get started. OVERVIEW: As you'll get further into the hacking community, and learn more about how it's all put together, you'll also realize very quick ...more
It's Black Friday time, and in 2020, that means a lot of online deals to make up for more stores closing on Thanksgiving, as well as everyone avoiding in-person shopping because of the coronavirus. But while you may wish to grab a better 65-inch 4K TV, the new PlayStation 5, o ...more
If you're a frequent Null Byte reader, chances are you're already up to speed with at least one or two programming languages or development platforms. But in a world that's becoming increasingly reliant on high-powered apps and responsive websites, knowing the fundamentals of ...more
I'm back! We're learning Java WhileLoops today. What Are "while" loops Just like For Loops, While loops are another type of loops in Java, except they rely on only a true/false statement to determine whether they run or not. Parts of a While Loop A while loop has 3 parts: ...more
Probably SSH is not as clean and fast as other useful tools like netcat, but it has some features which are very useful, and when you'll need them, here's how to behave with that huge amount of computers all over your house. Probably, you already know what SSH means, but for ...more
Minesweeper is one of those games that everyone plays, but hardly anyone actually knows how to play. Most people just click random squares and see how far they can get. If you don't want to take the time to learn how it works, but still hate losing, computer science student B ...more
Firefox's hidden advanced menu gives you several ways to tweak the way it works under the hood. Here are a set of settings to change to get it to browse faster than ever. Step 1: Go to About:Config Go to the URL bar (A.K.A awesome bar) and enter about:config. If you want to ...more
One of the coolest features that Samsung built into the Galaxy S4 is the infrared (IR) blaster and WatchON software to control your television. I've been using my GS4 for the past few weeks to control my DirecTV setup and it works great. Smartphones are truly becoming all-in-o ...more
We've shared a capture-the-flag game for grabbing handshakes and cracking passwords for Wi-Fi, and there are some upcoming CTF games we plan on sharing for other Wi-Fi hacks and even a dead-drop game. While security-minded activities and war games are excellent ways to improve ...more
Welcome back, my greenhorn hackers! Many new hackers come from a Windows background, but seldom, if ever, use its built-in command-line tools. As a hacker, you will often be forced to control the target system using just Windows commands and no GUI. Although we would love to ...more
Hi I am a new member of null byte(although I am reading this website from the beginning) and this is going to be my first post. Let me introduce myself first ! I am from Greece, I am working as a network engineer and I am into system and network administration but definitely ...more
Welcome to my tutorial where Voidx and I will be expanding on my previous article to provide more clarity into the logic of the code. My code can be found here -> http://pastebin.com/2nYicFPM ***************************** Index: $->Keyword !->Start of code ^->End of code *** ...more
Developing GUI apps in python is really cool. I ask those who understand the language to help convert some of the command-line or console programs or apps ( I mean programs that are useful to a hacker ) to GUI. I know GUI makes us lazy and not wanna learn but we should all kno ...more
Welcome back, my aspiring hackers! In this series, we continue to examine digital forensics, both to develop your skills as a forensic investigator and to avoid the pitfalls of being tracked by a forensic investigator. In earlier posts in this series, we examined registry fi ...more
Welcome back, my budding hackers! As you know, I firmly believe that to be a true professional hacker, you need to be proficient in Linux. This is for a number of good reasons. Most hacker tools are developed in Linux (well over 90 percent). Linux offers us greater granulari ...more
No matter which way you cut it, coding remains one of the most lucrative tech skills you can learn in 2020, and, thanks to Learnable, mastering the essentials is even easier. This training platform is your ticket to learning many of today's top coding languages, as well as und ...more
You never want to stop learning. Whether you're facing a career pivot or want to better understand the vocation you've chosen, there's always room for growth. The most successful workers are those who make education a lifelong pursuit. Since 2000, Whizlabs has helped over thr ...more
For anyone wanting to keep information private, plain text is a format of the past. Instead, cheap, powerful encryption is widely available, but often not easy enough to use to attract widespread adoption. An exception to this rule is EncryptPad, an easy to use application tha ...more