This how to will show you how to program a fairly simple Hacking bat file. First open notepad. Then copy the text into notpad: REM ============================================================ REM errorcode401.blogspot.in @echo off title Rar Password Cracker mode con: cols=47 ...more
Hack Into a Program
Many tutorials show you how to use Cheat Engine to execute one function of one particular game - but not this one! This tutorial gives you a good understanding of what Cheat Engine can do, and how you can use it to hack nearly any game!
With this video tutorial, you'll learn how to hack demo versions of applications such that they'll run indefinitely. You'll just need to modify the date and time on your computer. Learn how to use trials of programs without them ever expiring instead of buying the real thing w ...more
Screw the airplane man. Ticket prices are too high. Competitive consumer choices are pretty much nonexistent. And need I go into the pain of being crammed into those tiny seats, elbow-to-elbow, thigh-to-thigh with a perfect stranger? Even your average Richie Rich winces at the ...more
Whether you're looking for just one or two items, or want to dramatically increase your inventory, you can use these programs to hack into MineCraft and edit or cheat your inventory. This video shows you how to cheat on both a Mac and PC.
This tutorial is aimed at using Cheat Engine to cheat at games that are not online, such as Need for Speed (demonstrated in this video). Change your stats, add extra inventory items or increase your amount of money or experience points!
Welcome back my hacker apprentices! In recent weeks, the revelation that the NSA has been spying on all of us has many people up in arms. I guess I take it all in stride as I just assume that the NSA is spying on us all, all the time. Basically, the PRISM program simply look ...more
How To : use terminal on MAC to hack or edit plz notice this is advanced computer programing not for middle school
Warnings this only for educational use i dont take responsiblety for any use of this article if you want to use this for use at a school plz contact me at email@example.com hi im a computer enginer/programmer (NOT games) but i am good at hacking and i want to help. notise th ...more
Hello my fellow hackers! Since i am new here, i'd first like to introduce myself: i am Phoenix750, a young passionated hacker who likes to share everything he knows with other people of my kind. I have been reading null byte for quite some time now, but only could register tod ...more
How To : Are Your Cloud Documents Safe from Hackers? Make Sure with These Free Cloud-Worthy Encryption Programs
The convenience of storing things on the cloud can definitely make life easier, but if you're storing sensitive files, it could be a total disaster if anyone hacked your account. Some encryption services can be expensive, but if you just need it for personal use, there are som ...more
Welcome back everyone! in this tutorial, i will talk a little bit about the history of the C programming language aswell as some famous programs that are programmed in this language (it is not really necessary to be able to code in C, but it's still nice to know!). after that, ...more
RSbot is no more, long live powerbot! If you want to hack Runescape this program, no matter it's name, has been the authority since 2006. If you've ever wanted to use it or tried to and had problems, this video is for you. It will teach you how to download and install powerbot ...more
The Null Byte community is all about learning white hat hacking skills. In part, this is because I believe that hacking skills will become the most valuable and important skill set of the 21st century. This week, The U.S. Department of Defense confirmed my belief by announcin ...more
As a web developer, I often read articles about hackers (from the lowly to the knowledgeable) infiltrating websites via the dreaded 'SQL Injection' method and completely taking control, changing, gaining access, or destroying the owner's data. As a fellow web developer, I'm su ...more
Many FarmVille farmers want money fast, or experience fast, or want to level up, or want to speed things up— make and earn things faster. No matter how long they play, they're not getting what they want, and that is to outshine everybody else. But you can't reach the top by si ...more
Thanks to online music services like eMusic and iTunes, compact discs are becoming a far distant memory, turning local music shops around the country into desolate wastelands. The once mighty movie rental store Blockbuster is now bankrupt because of online streaming services l ...more
Whether it's the new iPad Killer or not, one thing's for sure—the Motorola XOOM is hackable. Just hours after its release last week, Verizon's new Android-based tablet (running Honeycomb) was rooted by hacker Koushik Dutta, which seems easy enough. "Since it’s another Google ...more
Club Penguin is a flash-based website with an a virtual world of online games for kids to play. Learn how to hack Club Penguin with tricks and cheats. Watch this video tutorial to learn how to hack Club Penguin for loads of money with WPE Pro (03/22/09). 1. Open Up you intern ...more
Social Profile Change the privacy settings on your social profile (Facebook, MySpace, Friendster, Twitter, etc.) so that the following information can't be found by a random person who you didn't accept you as a friend: Birthdate E-mail address Hometown Pictures A hacker ca ...more
This hacking tutorial presents a crash course on the subject of packet analysis and intrusion detection. Two programs receive special emphasis, Wireshark and Snort. For more information, watch this network security video tutorial.
With FarmVille being one of the hottest Facebook games on the market, it's no wonder it's the primary target for scams and virus downloads. Anyone playing FarmVille is at risk, but the primary targets are those looking to improve their gameplay and build their farms and neighb ...more
This is a Computers & Programming video tutorial where you will learn how to hack Google to find anything. There are no audio instructions; only a demonstration of the steps to follow. Go to Google and type into the search box: intitle:”index.of” (type anything here) and searc ...more
Want to hack a LAN? Well, hacking local area networks is easier than you'd think. And by watching a few short videos, you can become a master hacker, something every techie wants to achieve. And what's the best way to hack a LAN? Ettercap, a password sniffing program. The pro ...more
This video demonstrates how to set up your computer to play WoW with a Wii remote. The video walks you through downloading the correct programs to your computer, connecting the Wii remote to your computer, and playing WoW with the Wii remote.
Watch this instructional video to learn how to use Google Hacks. Google Hacks is a collection of software that explores Google's search function. Hacks is meant in this definition. "A Hack is a modification of a program or device to give the user access to features otherwise w ...more
WikiLeaks. In recent weeks, it's been the hottest topic on the web. It's been attacked on a multinational level by political influence peddling. First, U.S. Senator Joe Lieberman swayed Amazon's decision to stop hosting WikiLeaks. Then, Tableau Software removed graphs from th ...more
iChat is gaining steam as a mainstream online chat program. Fortunately for you, you little prankster, it is exceptionally easy to change someone else's iChat away message to whatever hilarious thing you want from your computer! This video will show you exactly how to do it, w ...more
There are several different kinds of disc drives that come in different iterations of the XBox 360, and each one has to be hacked a little differently. This video will show you how to flash the ms28 drive used in some systems, the second part of the video will show you how to ...more
In this video tutorial, viewers learn how to hack the flash game, Age Of War 2. Users will need to download the Cheat Engine program for this process. Begin by starting the game. The game should start with 2500 gold. Then pause the game and open Cheat Engine. Click on the Proc ...more
It's official! You can jailbreak whatever devices you want without fearing reprisal from the federal government! WIN! If you were worried about the legal implications before, worry no longer, and start taking advantage of your devices! This video will show you how to hack an i ...more
Hacking the PSP is a complicated process, and there has been some demand for a software tool that would make the process easier. This video has that solution. It explains how to use a program called PSPtool to create the magic memory stick and Pandora's battery much more easil ...more
Take a look at this instructional video and learn how to hack into your iPod's firmware on a Mac. In order to hack into the 5.5g iPod's firmware, you need to download the Alterpod, a firmware editing software. With this program, you'll be able to download themes onto your iPod ...more
Now that you're officially allowed to do it, jailbreaking your iPhone, iPod Touch, or iPad is a better idea than ever before! This video will show you everything you need to jailbreak a wide variety of Apple devices, including the iPhone 3G and 3GS, the iPod Touch 2G and 3G, a ...more
Systm is the Do It Yourself show designed for the common geek who wants to quickly and easily learn how to dive into the latest and hottest tech projects. We will help you avoid pitfalls and get your project up and running fast. Search Systm on WonderHowTo for more DIY episode ...more
Enjoying the many benefits of Facebook Places? But what if you want to check in somewhere you're not? Your smartphone can automatically detect your geographical location, preventing you from just checking in just anywhere, but like all technology… it's a long way from perfect, ...more
Trucha Bug Restorer is a powerful piece of homebrew software that you can use on your Wii to make sure that it is formatted properly in order to play burned games and use other hacks. This video will show you how to use it to set up an installation of cIOS on your Wii, which i ...more
So you've watched this video, done your research, and decided that you want to flash the firmware on your XBox 360 with a LiteOn DG-16D2S rev. 7485 disc drive. Good for you! This video will walk you through the whole process. Be very careful, as messing up in small ways at any ...more
Update: If you're running iOS 7 or higher, you'll want to check out the new way to fully close your background applications. With the newest version of iPhone firmware, you will be able to multitask. Finally, Apple has given us the ability to access more than one program at o ...more
It's Christmastime, so what better of a game to play than the winterized Icy Tower? And what better game to hack with Cheat Engine? This wintery video tutorial teaches you how to hack Icy Tower with Cheat Engine (06/12/09). This is really about hacking the floors on Icy Tower ...more
In this "super" video tutorial, you'll learn how to convert a Super Nintendo controller to PC controller. Now, dig deep into your garage and pull out those old SNES pads (or controllers) and get ready for some "super" modding! This Super NES hack will convert the controller t ...more
General Electric isn't known for their Christmas lights, but maybe they should be, because their GE Color Effects are pretty awesome. Especially the LED Color Effects G-35 String sets. And especially when someone named Darco hacks them. Darco, whose real name is Robert Sun Qu ...more
This is a quick and easy tutorial that shows you how to find out your character coordinates in a 2D game using the free game hack program Cheat Engine. It's not very difficult, just follow along with the steps in the video!
With the rather large success of the Community Byte activities, both programming and HackThisSite, I have decided to continue to do both activities every session! With that said, when programming sessions occur, they will be lead by Sol Gates in Gobby. Also, the programming mi ...more
If your computer is working slow--or not at all, there could be some unsavory programs running amok in your system. Trojans, malware, viruses, and hacks are dangerous to the health of your operating system. This video tutorial demonstrates the measures to take in order to rid ...more
There is a vast amount of knowledge out there on computers! In fact, it is so vast that no single person could ever possibly ever learn everything there is to learn about hacking or computers in general. People usually specialize in a certain field: cryptography, computer secu ...more
Lots of tutorials show you how to use Cheat Engine to hack a specific game, like FarmVille or Pet Society. This tutorial, however, shows you how you can use this awesome free program to hack any Internet or Facebook game!
Here's something fun for the Null Byte community to do—a coding competition! This week, I wanted to get everyone involved by offering you all a nice library of possible program types to choose from and try to code. At the end of this competition, all of the submitted programs ...more
Hacking can't be that hard, can it? At least, that's what it seems like thanks to movies like Hackers, The Net and that last Die Hard flick. Even the Jurassic Park girl's got some game. They all look like they're typing 20wpm, yet can generate a screen full of code in the blin ...more
Welcome to another Community Byte announcement! In the past two sessions, we have coded an IRC bot in Python capable of issuing commands. Since it can issue commands and most of you are new to programming, that project will stay idle for a while. Other commands such as voice a ...more
In this video, we learn how to hack your iPhone 3G. To do this, you will need: iPhone 3G, Firmware 3.0 or 3.1 file, charger cable, and the Redsn0w program. First, connect your phone to the computer and then start up the Redsn0w program on your computer. Turn the phone off, the ...more
Eventually, we plan on doing some root the box competitions here at Null Byte, but we're still looking for a server to play on. Anyone want to donate one? You won't regret it. Root the box is like 'king of the hill', except you have to hack a server and maintain access. Each s ...more
We'd like this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with (anyone want to donate one?), we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a ser ...more
We're aiming for this to be one of the last HTS mission announcements, at least for now. As soon as Null Byte finds a server to play with, we are going to start doing root the box competitions, which is like king of the hill, except you have to hack a server and maintain acces ...more
The community tore up the first realistic mission last week. You've applied the techniques learned in the basic missions to a real scenario, so I'm pretty content. The realistic missions are where the learning gets intense and where we can apply real knowledge to extremely rea ...more
Community byters, it's time to get serious. We are finally moving on to the realistic missions in HackThisSite. This is where the learning gets intense and where we can apply real knowledge to extremely realistic situations. We will also be continuing the normal Python coding ...more
Since the early genesis of the brilliant Microsoft Kinect hack, inventive applications have been popping up nonstop. One of the most fascinating projects to surface recently falls within the realm of 3D printing. "Fabricate Yourself"—a hack presented at the Tangible, Embedded ...more
Iowa firefighter Pete Lilja has modded the software of a Canon powershot to record images of Earth, from as high as 85,000 feet! Lilja's hack requires the following: 1 basic point-and-shoot consumer camera attach camera to a GPS transmitter (+ a phone number just in case the ...more
i am stone taker and currently pursing b.sc computer science. i am from Africa.i want to to master become know programming very well especially c++; i hope you can help me with hacking too, for educational purpose only.
In this clip, you'll learn how to set up PV3D for hacking the Number3D class. Whether you're new to Adobe's popular Eclipse-based integrated development environment (formerly known as Flex Builder) or are a seasoned developer merely looking to improve you're chops, you're sure ...more
Believe it or not, people are still using Friendster. Which is great news for all you hackers because that means there are accounts to hack! With this video you'll find out how to exploit a programming loop hole in order to hack into someone's Friendster account. We can't prom ...more