New Year's Eve. It will be one hell of a chaotic night. Trust me. The overcrowded streets. Long lines for the urinal. Maxing out your credit card on that shot of Cuervo. You'll be lucky to make it out alive. If you do manage to stave off alcohol poisoning and survive the asc ...more
This is a complex process, but the guys at Graffiti Research Lab have armed you with detailed written instructions and this video on how to create a night writer. This is a more complicated version of their LED throwies that allows you to catch a tag in lights. You'll never ne ...more
This article will show you how to make an auto clicker program in Visual Basic Express Edition 2008. An auto clicker is a very useful program that makes your mouse click many times automatically, wherever it's pointed. It's a very good AFK (away from keyboard) program. Just po ...more
If you're a good shot, this is the achievement for you. In Call of Duty: Modern Warfare 3 on the "Back to the Grid" level, you gain access to a mortar to hold off a few waves of enemies. But the trick to getting the achievement and 20G, or bronze trophy if you're on PlayStatio ...more
It's almost time for the new Xbox 360 dashboard to invade gamers everywhere. Microsoft expects to update the Xbox Live user interface sometime next month, which is said to be the most significant update to the dashboard since the NXE update three years ago. This new Metro-base ...more
Sometimes going ghetto is the best route, especially when you can save about $1200 big ones. Just ask the guys over at 1 Block Off the Grid. When they needed a fancy Mac to run Adobe After Effects, they decided to Hackintosh it. Meaning they built a Mac in a box -literally (a ...more
Introduction to the Basics of Off-Camera Flash There are a lot of resources on the web for using your flash. For Nikon shooters, the Strobist and Joe McNally are the best resources. For Canon shooters, maybe Syl Arena is the best. It doesn’t matter because if you are a Canon ...more
Over the past couple of weeks, there have been a series of high-profile hacks and leaks. From the rooting of CombinedSystems, to a secret FBI conference call leak, all the way to the distributed denial-of-service (DDoS) attacks on U.S. government sites—with a lot in-between. A ...more
Here on nullbyte we always hear mention of hacking being used to shut down power grids or attacking SCADA and other such cyber warlord activities, but ive never seen a TDos post come up. Telephony Denial of Service involves saturating call centers or carriers, especially emer ...more
As a picky "liker" on Instagram, I make sure to only double-tap on the photos that I truly enjoy looking at: delicious cheeseburger shots, Siberian Husky snaps, music festivals photos, and obligatory baby pictures that my mom posts from my youth. All of these pictures are one ...more
Those of you who have been a part of the Null Byte community for even a short while know that I sincerely and firmly believe that hacking is the most important skill set of the future. To further emphasize how important our skill set is, knowledgeable estimates put the potent ...more
I currently am and have always been what one might call a PC/Android guy. Many that know me well would likely even go so far as to say I am anti-Apple. About an hour after seeing the ARKit demo during the day-one keynote at WWDC, I became the owner of a brand new Mac. Pair th ...more
While obvious, it's a lot more difficult to hack into a locked computer than an unlocked computer. As a white-hat hacker, pentester, cybersecurity specialist, or someone working in digital forensics, there's an easy solution — make it so that the computer won't fall asleep and ...more
Over the past several weeks, I’ve had the pleasure of test driving Samsung’s next big thing, the Galaxy S4. After putting the GS4 through its paces, I have a clear picture of what this device is capable of. I’ve covered the features of the device before, and now I’ll tell you ...more