Apple just released the third public beta for iOS 14 today, Thursday, July 23. This update comes one day after the company released iOS 14 developer beta 3, and two weeks after the release of iOS 14 public beta 2. Apple released this update at 10 a.m. PDT. While we expected t ...more
Apple just released iOS 14 developer beta 3 for iPhone today, Wednesday, July 22. The update comes 15 days after Apple released the second developer beta for iOS 14, and 13 days after the release of iOS 14 public beta 2. Apple released this update at 10 a.m. PDT, the company' ...more
Thanks to online music services like eMusic and iTunes, compact discs are becoming a far distant memory, turning local music shops around the country into desolate wastelands. The once mighty movie rental store Blockbuster is now bankrupt because of online streaming services l ...more
There are several different kinds of disc drives that come in different iterations of the XBox 360, and each one has to be hacked a little differently. This video will show you how to flash the ms28 drive used in some systems, the second part of the video will show you how to ...more
When it comes to earning high scores in a web game like Crazy Taxi or Crazy Cabbie, sure, you could, like, actually play it — but where's the fun in that? Cheat your way to the top with this hacker's how-to. Learn how to hack Crazy Cabbie on Facebook! This video tutorial show ...more
Crazy Taxi is a Facebook game that allows you to drive crazy in a cab. Watch this video tutorial to learn how to cheat and remove the traffic on Crazy Taxi (08/17/09). 0:00 First level (fast motion) 0:25 Start HxD, search & replace Hex-values (01a075d55d03, 02a175d55d03) Data ...more
In this episode of Hak5, Darren shows us a USB key, dubbed the USB Hacksaw, that instantly and silently installs on target Windows 2000 or higher computers with guest or higher privileges which will monitor USB ports for flash drives and automatically download their contents f ...more
Using infrared (IR) light pens and the Wii Remote, it is possible to create very low-cost multi-point interactive whiteboards and multi-point tablet displays. Johnny Chung Lee, Carnegie Mellon University. The software can be downloaded at http://johnnylee.net
Looking to make use—if not necessarily good use—of your old hard drives? This how-to presents instructions for creating a hard drive speaker system to use in conjunction with an MP3 player. To follow along, you'll need an MP3 player (e.g., the Samsung YP-S3), at least one spar ...more
If you still own and use an original XBox console, good for you! You've got a little piece of history right there that most people just tossed or sold to a game store for $10. This video will show you how to replace the paltry 8gb hard drive that the console came with with a b ...more
If you've already flashed your XBox 360's disc drive, then congratulations, you've accomplished the most challenging step involved in hacking you XBox. You aren't done though. As Microsoft keeps updating it's firmware to try and fend off hackers, you must keep updating your cu ...more
Flashing the disc drive on the XBox 360 is the first step of truly hacking your XBox 360, enabling it to run whatever discs you like but also putting you at risk for being banned from XBox Live. Microsoft has used several different kinds of drives in the console over the cours ...more
Do you want to be able to play games for free on your XBox 360? If you have some time and patience, hacking the console is probably the next step for you, and the first step in that is flashing your disc drive. This will delete it's native firmware, which does not recognize bu ...more
Performing a proper dump and flash on an XBox 360 disc drive should not be attempted by those without advanced technical knowledge, including how to solder and work with computer hardware. If you want to though, you could not hope for a much better set of instructions than thi ...more
So you've watched this video, done your research, and decided that you want to flash the firmware on your XBox 360 with a LiteOn DG-16D2S rev. 7485 disc drive. Good for you! This video will walk you through the whole process. Be very careful, as messing up in small ways at any ...more
General Electric isn't known for their Christmas lights, but maybe they should be, because their GE Color Effects are pretty awesome. Especially the LED Color Effects G-35 String sets. And especially when someone named Darco hacks them. Darco, whose real name is Robert Sun Qu ...more
Cheaters may never win but, boy, do they ever get high scores. With this hacker's how-to, you'll learn how to use Cheat Engine 5.5 to earn an absurd amount of points, guarunteeing yourself a spot on the high scores list. Learn how to hack Crazy Cabbie on Facebook! This video ...more
Have a need for speed? And high scores? Look no further than this cheater's guide, which demonstrates a method for hacking Crazy Cabbie for high speeds and maximum points. Learn how to hack Crazy Cabbie on Facebook! This video tutorial shows you how to hack Crazy Cabbie (01/0 ...more
This video shows you a variety of hacks and mods for your Xbox 360, AppleTV and how to boost your wifi. You're shown how to make an antenna booster for your router, stream content to your Apple TV and upgrade the hard drive.
This is my first contribution in an ongoing series on detailing the best free, open source hacking and penetration tools available. My goal is to show you some of the quality tools that IT security experts are using every day in their jobs as network security and pen-testing p ...more
Want to know the easiest way to get eggs in Minecraft, the popular cube-based sandbox game? It's surprisingly logical: Build a pen, put some chickens in it and wait! This gamer's guide presents a complete, step-by-step walkthrough of the process. Love Minecraft? Search Wonder ...more
The XBox 360 Connectivity Kit is a great tool for connecting your XBox 360 hard drive to your computer, allowing you to manipulate your saves easily. This handy video for beginners will show you how to hook up the CK3 to you XBox drive. Once that's done, you'll be well on your ...more
Being able to pick a lock is considered to be a rite of passage for boys, especially those with aspirations of becoming a professional pirate/ninja, also known as a computer engineer. Pick your way to manhood with this tutorial on hacking a lock. Learning the method will only ...more
Hack N Mod offers an incredibly simple cell phone camera mod that delivers striking results. All you need is a lens from an old DVD player and you can magnify your zoom by five times. "You’ll find the lens directly under the disk tray. If you’ve just upgraded to Blu-Ray, now ...more
Netcat is a featured networking utility which reads and writes data across network connections, using the TCP/IP protocol. It is designed to be a reliable "back-end" tool that can be used directly or easily driven by other programs and scripts. At the same time, it is a featur ...more
The art of persuasion (or subtle emotional manipulation, depending on how you're looking at it) does not necessarily have to be an evil thing. When you want to make an important sales pitch to a tough customer, propose a risky business plan at work, or gently convince your si ...more
In this video, viewers learn how to install Wiiflow. Viewers will need to install cIOS 249 and 222 / 223. Wiiflow is USB Loader that you can use on a Wii that have modified or hacked. Wiiflow enables you to play your "legal ISO backup" by using any USB storage device like a th ...more
The biggest struggle with flashing DVD drives on Xbox 360s has been the price tag of the probe to extract keys on some drives. The probe and kit is required to extract the DVD key, which is needed to perform a drive repair, flash, or backup of any kind. Who wants to pay big bu ...more
Here's another Null Byte on hacking our Skyrim game saves. Some of the rarer items in Skyrim are really fun to play with. However, seeing as they are rare, you will probably not see all of the best weapons in the game. Null Byte doesn't take too kindly to games that don't give ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
If you want to flash the disc drive on your XBox 360, you are going to need to know the key to that drive or another one so that you can reassign a key to the drive after you flash it. This video will show you how to do that, as well as how to make your own DIY XBox connectivi ...more
Watch this video to learn how to draw a rose in just seconds. • To draw a rose, you need a paper and three sketch pens of light green, dark green and red colors. • First draw a “U” shape with the red color. • Mark the bottom peak point of the U shape with a thick dot. • Now f ...more
Open the Adobe Photoshop program. Choose a picture with a head shot. This maybe something that is already in your pictures folder on your computer, downloaded from the internet or transferred from your flash drives, and those photos you may have scanned and saved in your comp ...more
Thanks to the Freedom of Information and Privacy acts, we’re all entitled to see what the FBI has on us. Learn how to get your hands on your FBI file. You Will Need: * Paper and pen * A notary public Step 1: Make contact Make contact. The FBI website provides form letters w ...more
Eventually, we plan on doing some root the box competitions here at Null Byte, but we're still looking for a server to play on. Anyone want to donate one? You won't regret it. Root the box is like 'king of the hill', except you have to hack a server and maintain access. Each s ...more
Lost the product key for your game? If you have to reinstall the game and don't have that key anymore, you're out of luck, especially if you didn't "buy" the game. But never be in fear of losing product keys again with today's Null Byte, where we'll be practicing a little bit ...more
We're aiming for this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with, we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain acces ...more
The community tore up the first realistic mission last week. You've applied the techniques learned in the basic missions to a real scenario, so I'm pretty content. The realistic missions are where the learning gets intense and where we can apply real knowledge to extremely rea ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our moderators and contrib ...more
Warnings i cant be held responsible for any illegal act done by anyone but myself and there are copyrights so notise that taken the trademarks or copyrights are strigtly prohibeted by law and will be punshied by law and i or my partners cant be held responsible for sudo camma ...more
With a lot of Null Byters playing around with Linux because of its excessive use in the hacking world, some of you are bound to run into some trouble with the installation at some point or another. If you make a mistake, or you're intimidated by the wonky-looking installation ...more
This is the Windows OS counterpart to my tutorial on how to burn the new XDG3 formatted games on Xbox 360. Microsoft invented a new disc format system to trump piracy, it's called XDG3. XDG3's standard is to burn a whole extra gigabyte of data to the disc, to allow more conten ...more
Warning Don't torrent things that you do not have the rights to torrent. Everything I torrent, I have a physical copy of, and just want a copy on my computer without causing wear-and-tear on my DVD drive's laser. Piracy is naughty. I used to get extremely frustrated with Bit ...more
You've seen the felt mouse, which made computer clicking comfortable and chic, now brace yourself for something a little more interactive—DataBot. DataBot hails from the clever minds of Jan Barth and Roman Grasy, two Interaction Design students based in Germany who wanted to ...more
Deep in their heart of hearts, most Americans dream of having their car festooned with missile launchers and machine guns. Anyone who cuts them off or looks at them funny in traffic could be dispensed with quick and extreme justice, leaving a real-life James Bond and his passe ...more
Since its inception in 2007, the Pwn2Own computer hacking contest has been challenging the vulnerability of mobile phones and web-related software. In 2010, the fruit of two full days of hacking came down to the exploitation of the following web browsers: Safari 4 on Mac OS X, ...more
Though the idea of a highway-friendly mobility scooter might seem absurd, we think it makes perfect sense: After all, who has a greater need to move quickly than those with the least amount of time left to live? Via the Daily Mail: Colin Furze has adapted a conventional elec ...more
This might be so '2 weeks ago' but I've been away, oh well. In a few short words: The PS3 has finally been hacked via a USB device! Sure it can be possibly used for piracy, but let's not go into that topic. Instead read this nice intro into what an open PS3 can do for you (v ...more
Drinking too much is bad for your health and your wallet. Here are a few simple strategies for cutting back and keeping it in moderation. You Will Need * A pen and paper * Willpower WARNING: If your drinking habits show signs of alcohol addiction or abuse, seek professional h ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to track a U ...more
Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and r ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. No self-respecting Minecraft house is complete without a state of the art automatic cobblestone generator. But what does the average Minecrafter need with a bunch of cobblestone? To ...more
"How do I install Arch Linux?" That question was bound to come up eventually. And with me using Arch, it's no coincidence that all of you want to use it as well. Arch is arguably the best Linux distro available. Distros that come close are Gentoo and some aspects of Ubuntu, bu ...more
It's been a long time coming, but Microsoft has finally released a software development kit (SDK) for the Kinect on Windows 7 PCs. The word "hacking" is no longer needed, thanks to the free beta download available at Microsoft Research that allows anyone with a Windows compute ...more
SCRABBLE may seem like a board game for word nerds only, but believe it or not, SCRABBLE can be used to lure thousands of hot women into your bed... at least that's what Clive Worth claims. Now, I wouldn't put much faith in his "words", but somewhere in this world of lonely b ...more
If you’re having trouble getting games on your memory stick, this video will walk you through the steps of just what you will need to do to compress files onto a thumb drive. There are a variety of steps you will have to follow and you’ll have to have a little bit of time to w ...more
Oh, LifeHacker, we love you. You've brought us so many handy HowTo's: Hack Wireless Internet, Bypass Blocked Websites, Convert a Laptop Into a Projector, Watch TV & Movies on the Web For Free, 10 Must-Know Google Privacy Settings, and more. And now, another great one: LifeHac ...more
Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm ...more
INTRODUCTION The everyday PC user doesn't think much about its PC and problems that can cause critical damage to their data or other stuffs stored on Hard drive and other electronic parts until the problem actually occurs. Once a failure happens, the repairs can be costly and ...more
If you have made the switch from Windows to Linux, I want to congratulate you in advance. I'm sure you have noticed a huge performance increase when using Linux over other operating systems. This is only half the battle, though! Most users who are new to Linux end up using Ubu ...more