Lost the product key for your game? If you have to reinstall the game and don't have that key anymore, you're out of luck, especially if you didn't "buy" the game. But never be in fear of losing product keys again with today's Null Byte, where we'll be practicing a little bit ...more
We'd like this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with (anyone want to donate one?), we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a ser ...more
We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no ne ...more
We're aiming for this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with, we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain acces ...more
The community tore up the first realistic mission last week. You've applied the techniques learned in the basic missions to a real scenario, so I'm pretty content. The realistic missions are where the learning gets intense and where we can apply real knowledge to extremely rea ...more
Community byters, it's time to get serious. We are finally moving on to the realistic missions in HackThisSite. This is where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding ...more
When it comes to social engineering, Null Byte is here to show you how it's done. Social engineering is the key fundamental to unlocking tons of possibilities and opportunities in your everyday life. So, what is social engineering? Social engineering can be called many things. ...more
Your IP (Internet Protocol) address is your unique ID on the internet. It's synonymous with your home address. Anyone in the world can contact your computer through its IP address, and send a retrieve information with it. I'm sure at one time or another you've heard that hack ...more
You'll see a lot of Linux action going down here at Null Byte. We use Linux for hacking-related stuff because it provides a more relaxed programming environment, making it easy to write exploits and tools. Linux has many features Windows is lacking, such as full control over t ...more
Nobody could predict the success of Microsoft's Kinect, not even Microsoft themselves. So, it was quite a surprise when it ended up earning a Guinness World Record for fastest-selling consumer electronics device, and an even bigger surprise to see people buying one that didn't ...more
Del The Funky Homosapien ft. Khaos Unique "Proto Culture" Chorus:] Let me tell you about the Proto Culture If you don't know the culture, here's the whole structure We've had enough of the lackluster-trust us We get the kind of games you can't rent at Blockbuster [KU:] Ga ...more
Making bread from scratch is extremely difficult. Painstakingly following instructions does not necessarily guarantee successful results. Baking delicious homemade bread takes practice, skill, and frankly, a level of real culinary artistry. Enter the no-knead method. First po ...more
This is a guide showing you how to get Java games onto your Samsung Tocco F480 phone via USB—for free! You don't need Samsung PC Studio, but you do need a few things... Download Required Applications and Drivers... Download and install these applications. I have included li ...more
Halloween just isn't Halloween without Jack O'Lanterns. Below, anything and everything you need to know on the art of pumpkin carving. 1. Prepare a Pumpkin for Carving Serious Eats' video demonstration is for true novices: "This video is for you unlucky souls who never got t ...more
The community here on Null Byte has always been great and helpful in sharing their know-how, even before I took up admin duties in this World. I jumped at the chance of leading Null Byte because I enjoy teaching and informing people on all of the important need-to-know things ...more
If you follow the Anonymous, Occupy, and IT security scenes, you have no doubt heard about a dox release. What is it? How can it hurt you? And most importantly, how can you protect yourself from it? Some of these steps might seem common sense, while others will be an ah-ha! mo ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
There are so many hackers around these days, and they are becoming very smart. So smart that they have successfully taken down many government websites. The most recent attack was on the Department of Justice (DOJ). To read about the history of these hackers, check out Wikiped ...more
This is a two-part series to locking down the computer to provide maximum protection. Even though this guide will sound intrusive, we are talking about reality here. Extreme measures must be taken to protect our computers, especially when we have confidential documentation or ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. This week: A phoneography challenge on silh ...more
WonderHowTo is made up niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Happy Thanksgiving! We hope everyone enjoys th ...more
Movies like to show hackers breaking passwords with fancy software and ludicrous gadgets. The reality of busting passwords open is much more mundane. Simple as it may sound, most passwords are broken purely by guesswork. Check out this infographic from ZoneAlarm, as well as th ...more
In 2007, Nintendo introduced the world to motion control video games with the Wii. Microsoft and Sony built on Nintendo's phenomenal success and released their own motion control products for the XBox 360 and Playstation 3 late in 2010: the Kinect and the Move. The Move is bas ...more
The Holy Grail of chicken has just been found by an unsuspecting reporter of the Chicago Tribune. Yes, that's right: The secret 11 herbs and spices in Colonel Sanders' Original Recipe chicken has finally been revealed, and it looks legit as hell. While a copy of the Original ...more
Please share this info with all your facebook friends. It's not just Farmville players that are affected by scams and spam! This post will help you keep your facebook account clean and safe. We start by showing you a scam and discussing what is real, then we show you how to re ...more
Today, we're pleased to announce that WonderHowTo is getting a major site-wide update to make it easier to follow the subjects you're passionate about and to share your creations with people who will give you the kudos you deserve! We Built You a New WonderHowTo! In preparat ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more
Big brother is watching when you're playing around on another system—and big brother is that system. Everything from operating systems to intrusion detection systems to database services are maintaining logs. Sometimes, these are error logs that can show attackers trying vario ...more
Injection is an attack vector that involves breaking out of a data context and switching into a programming context through the use of special characters. These characters are significant to the interpreter being used, but not needed for the general user input being asked for. ...more
The agents of empire do not always arrive with warning. When you are besieged, surrounded, and infiltrated, imagination is often your best weapon against the oppressors. If all you have at hand is some duct tape and a disposable camera, fear not, you have the makings of a powe ...more
Remember that scene in The Matrix when Trinity uses a realistic Nmap port scan, followed by an actual SSH exploit (long since patched) to break into a power company? Well, believe it or not, but that scene is not far fetched at all. If you want to exploit vulnerabilities and r ...more
When you first become interested in learning how to program, it can be difficult to find a place to start. A lot of questions come up, especially if you're new to the idea of programming entirely. After you pick which language you want to learn, you have to worry about how you ...more
+Nik Cubrilovic discovered last week that Facebook could track your web activities even after you logged out of your Facebook account. After some blatant denials from Facebook spokespeople, Facebook decided to fix the logout issue, but not before +Michael Arrington, on his new ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more
You can hack into nearly any Facebook or Flash based game on the Internet - no cheat codes or special strategies needed. All you really need is the free game hack program Cheat Engine, and a compatible browser like Firefox.
You'll need Cheat Engine, the free game hack program, for this cheat to work. Once you have Cheat Engine, go into WebKinz and open up Cheat Engine. Follow along with the tutorial, and get as much free KinzCash as you want!
Want to make Plants vs Zombies your own? You can, all you need is Cheat Engine! Use this versatile program to hack the game, and you can get extra game cheats, a fast cooldown, an unlimited sun hack and free money.
Cheat Engine is a free program that you can use to hack into nearly any Flash game on the web. It's recommended you have these games running in Firefox. Then open up Cheat Engine when the game is running, and hack away!
Want some easy to follow instructions on how to hack Icy Tower? They're right here. Hacking Icy Tower 1.4 has never been easier. This wintery video tutorial teaches you how to cheat on Icy Tower (12/14/09). Download Cheat Engine 5.5 and just follow along with the video. There ...more
Get a super high score on Icy Tower! You can reach 1,000,000 with this neat little hack using Cheat Engine. This wintery video tutorial teaches you how to use Cheat Engine to hack Icy Tower (11/09/09). Don't be the only one left out not cheating! Learn now. Icy Tower is a fl ...more
Get tons of money to spend in the free online game Ninja Saga! This tutorial is easy - all you need is the latest version of Cheat Engine. Open Ninja Saga, scan it with Cheat Engine and then enter in however much money you want!
This tutorial shows you how to execute a speed hack when playing Roblox. All you need is the free game hacking program Cheat Engine. Open Roblox, then open Cheat Engine and use the following hack to change the speed of the game.
Start with just a little bit of money and the multiply it into a vast fortune! All you need is the most current version of the free game hacking software, Cheat Engine! Then open your game in Firefox and follow the tutorial!
This tutorial shows you how you can use the free hacking program Cheat Engine to change both your speed and the stats for your weapons when playing World of Warcraft. The cheat works best when used on the live servers.
Instead of scoring 100 points every time you drop a block, this cheat will show you how to get 300 points! All you need is the most current version of the free program Cheat Engine and Firefox to play the game in.
Want to blow past all your friends in the online game Fashion World? It's easy! All you need is the free program Cheat Engine, which will allow you to hack into the game and change the values to give yourself more money and levels! Use Cheat Engine to hack Fashion World for mo ...more
You'll need to make sure that your version of Cheat Engine is at least 5.6.1 or higher. If it is, then you can follow this tutorial, which shows you how to hack the game Elephant Rave and get resources for free!
This video tutorial shows you how to use a free program to customize the HTC Home plug-in for Windows Mobile touchscreen devices. You can use any Windows Mobile cell phone or other device for this hack. YOu can run applications like Streaming Media on your HTC Home site from y ...more
Get tons of free money, unlimited items and instant levels with this hack for Fish World using Cheat Engine. CE will get you whatever you want in Fishworld. In this Fish World video tutorial, see the steps on how to use Cheat Engine to hack Fish World (10/29/09). Download Che ...more
Learn everything you could possibly want to know about the internet, multiplayer game Evony. Watch this video tutorial to learn how to max out prestige growth in Evony. The lower your rank is, the more prestige you will gain for each task completed. The lower your title is, t ...more
Learn everything you could possibly want to know about the internet, multiplayer game Evony. Watch this video tutorial to learn how to hack Evony (09/17/09). Evony, formerly known as Civony, is a free, interactive, browser-based, online game, similar to Civilization. You can ...more
Learn everything you could possibly want to know about the internet, multiplayer game Evony. Watch this video tutorial to learn how to get heroes and troops in Evony. Evony, formerly known as Civony, is a free, interactive, browser-based, online game, similar to Civilization. ...more
Wish things were free? Well, with this hack, you can make sure all the gold is zero and everything costs nothing. How? With Cheat Engine! Play Arcuz online with this video tutorial. See how to hack gold with Cheat Engine for Arcuz online (12/19/09). Download Cheat Engine 5.5. ...more
Need resources in Evony? Hack them… with a speed hack. You just need Cheat Engine and this video. Watch this video tutorial to learn how to hack speed in Evony with Cheat Engine (10/12/09). In order to perform this speed hack for Evony, you need to download Cheat Engine 5.5. ...more
Evony is so slow sometimes, so why not speed it up a bit? Speed hack it! In order to do that, you need Cheat Engine. Watch this video tutorial to learn how to speed hack Evony with Cheat Engine (10/04/09). In order to perform this speed hack for Evony, you need to download Ch ...more
Note: The article assumes that the reader has a fundamental understanding of at least one other programming language, and that this is intended serve as a quick reference for Perl's basic syntax & behavior in regards to Variables, Control Structures, & Functions. Learning to ...more
As the COVID-19 virus continues to spread, counties, cities, and states are closing down businesses, events, and schools that aren't absolutely necessary. Some companies around the US are recommending or requiring employees to work from home during the coronavirus pandemic. If ...more
When we reviewed the best file managers on Android, MiXplorer easily topped our list with its abundance of features, including tabbed browsing, support for up to 19 different cloud services, file and folder encryption, and much more. The only major complaint we had was the fac ...more