While a lot of internet threats are rather over-hyped, there are some serious things to be cautious of when going online. Probably the biggest risk to the average internet user is malicious software. Commonly knows as "malware," this term refers to any program that exists sole ...more
A quick tutorial on how to effectively removed corrupted files from your USB pen drive Insert USB drive into computer. Click on "My computer". Right click on your USB drive (e.g., Removable Disk Drive E: )Go to "Properties" and select "Tools". Under "Error Checking" select "Ch ...more
Protect your Windows desktop or laptop computer from malicious software with anti-virus applications. This handy how-to presents a complete overview of the process. It's easy! So easy, in fact, that this video guide can offer a complete overview of the entire process in just o ...more
Want to be the master of your domain? Make zombies and other monsters spawn where you want them. This tutorial shows you how to use the free software NTB edit to hack MineCraft and alter the spawn points for monsters.
So-called "anti-virus" program doing more harm than good? In this clip, you'll learn how to uninstall fake anti-virus and anti-spyware software from your computer. It's easy! So easy, in fact, that this home-computing how-to from the folks at Britec can present a complete over ...more
You can use the free software program Cheat Engine to hack nearly any game, whether online or off, to alter your scores, inventory and experience points. Always make sure you are using the most current and up to date version of Cheat Engine! Part 1 of 2 - How to Change your sc ...more
This music production software tutorial describes a hack to allow you to trigger an instrument or effect when you RELEASE a key in Reason 3 or 4. This is useful for guitar strums, Hi-hats, mutes or delays, or vinyl scratch effects. With this trigger trick you can create back b ...more
Take a look at this instructional video and learn how to load virtual console games onto your Nintendo Wii. You'll need the Twilight Hack and an SD card for this process. The Twilight hack allows you to run unofficial software through the SD (Secure Digital) card inserted into ...more
In this video, the instructor shows how to schedule tasks in Microsoft Windows XP. Scheduled tasks are nothing but programs you want your computer to run at specific reoccurring intervals like daily, weekly, monthly, etc. This can be a very helpful feature if you want to updat ...more
As advanced gaming systems continue to evolve, older classics like the Nintendo Entertainment System (NES) are one step closer to extinction. They're rotting in the basements of gamers. They're gathering dust at the local pawn shop. Or worse... being thrown out in the trash li ...more
If your Windows PC has a virus and you don't have third-party antivirus software, or your AV program is otherwise unable to deal with it, you may want to try running a system restore, which will restore your machine to an earlier point in time in its history. For more informat ...more
How to hack a network by sniffing passwords with Ettercap software.
Don't cancel your virus scans because they're inconvenient. Reschedule them! Watch this software video tutorial to learn how to schedule and reschedule AVG anti-virus scans so you can complete them whenever you want to. This how-to video is geared toward new AVG users.
If you're trying to hack someone's wifi, a useful bit of software you may want to try is called Wireshark. Wireshark is a wifi packet sniffer, which is an essential step in actually breaking into someone's wireless system. Of course, this is illegal, so make sure you're only d ...more
Whatever your reasons for doing it, if you are trying to hack passwords, it helps to have the right software for getting the job done. With the Cain and Abel program, you will be well on your way to hacking even the toughest personal passwords. Visit us at bleedingedgesecurit ...more
Learn how to hack your 1.1.2 and 1.1.3 iPhone with Ziphone (zibri) software for Mac or Windows. No technical skills required!
In terms of internet, faster = better. We all want faster internet, but how exactly do you get a fast wireless connection? Believe it or not, the answer is quite simple. Here are 4 things that may be slowing down your connection. Interference from Other Devices Interference ...more
Take a look at this instructional video and learn how to install the Twilight hack for you Wii. The twilight hack is an exploit that reads a elf file off the root of your secure digital (SD) card. To start up this hack, you'll need to load the Zelda: Twilight Princess game bef ...more
If a virus infects your computer you want to do everything in your power to avoid having to reformat your system. Instead of running an automated removal program, it is possible to manually remove the malicious software. This video teaches you about manual virus removal using ...more
Are you a ... Windows Developer? Interested in ... testing the vulnerabilities inherent in your own operating system? If so, you're in luck. This video tutorial demonstrates a simple hack that will allow you to remove the Windows Genuine Advantage Validation software. For step ...more
Spyware are programs that infect your system and / or at the same time collect personal information without your consent. Advanced virus remover disguises itself as a legitimate virus removal tool, but in reality, it is itself a virus. Watch this video to learn how to disinfe ...more
What's cuter than a puppy? Not much, especially when you omit all the peeing, barking and furniture chewing, as Remedie Studio did with this sweet time-lapse homage to their beloved pup. Below, watch Dunder the German Shepherd grow from 8 weeks old to 1 year in 40 seconds. Ins ...more
Iowa firefighter Pete Lilja has modded the software of a Canon powershot to record images of Earth, from as high as 85,000 feet! Lilja's hack requires the following: 1 basic point-and-shoot consumer camera attach camera to a GPS transmitter (+ a phone number just in case the ...more
With the computer's rapid increases in power and efficiency, computer virtualization has taken the scene by storm. With virtualization software, and powerful enough computer hardware, your computer can run a virtual computer within itself. This effectively gives you multiple O ...more
Got 3D glasses leftover from the Superbowl? Time to break them out! You will need cheap 3D glasses from television promotions or you can grab them off eBay for this demonstration. Or you can simply make your own 3D glasses red and blue or yellow and blue cellophane. NOTE: Get ...more
Who hasn't gone mad trying to fix his/her computer, trying to delete all of the harmful software? It may not be funny with a real virus, but a fake one is. Or course, you can make a simple virus just with Notepad. There's no need to download applications to fool others; in les ...more
This is hardcore, serious hacking at its best. So it goes without saying that you probably shouldn't be attempting this computer hack unless you've successfully shut down your friend's computer at school using Command Prompt and sent out a fake virus to loved ones. This tutor ...more
In this hacker's how-to, you'll learn how to softmod your old Playstation 2 to enable you to run third party software and how to use CogSwapLoader and HDLoader to backup your PS2 games and play them either from a burned DVD or off your hard drive. This will let you hack the PS ...more
Need the newest copy of professorial design and photography software but cannot afford it? Find out how to crack Adobe photoshop without having to use a serial number.
Make your own 3D movie with this easy camera hack: record with two cameras simultaneously. Next, use video software to overlap the images, making it viewable through 3D glasses. Very clever (and cheap) concept by Ron and AmyJo Proctor. Check out their site for more details. T ...more
If you're struggling to get your PSP hacked after downloading the required software (ChickHEN and CFW), check out this video for a helpful walkthrough on how to get things started. This video shows you how to install ChickHEN R2 and boot Custom Firmware 3.60, allowing you to a ...more
In this tutorial, we learn how to get free virus protection with Avira. To do this, first go to Free AV, and download the software. After you install everything, open the program up. Next, you will want to scan your computer for any viruses that may be present already. It may ...more
In this video, we learn how to delete hidden driver viruses. First, scan your computer with anti-virus and try to delete the virus that is harming your computer. If you have done this and your anti-virus can't delete it, download HijackThis from Trend Secure. Go through the do ...more
This past Tuesday, Amazon pushed a big software update to Kindle users the world over. While the update introduces a host of great new features—secondary page numbers that allow readers to reference real-world editions, for example—, it also takes something away. What? Well, ...more
Hello and welcome to another InfoSecurity World tutorial. The intent of this article is to teach one how to encrypt sensitive files. When set up correctly with a strong password, it would be almost impossible to hack. Even the FBI have had issues decrypting this software. I'm ...more
VNC stands for Virtual Network Computing. It is remote control software which allows you to view and fully interact with one computer desktop (the "VNC server") using a simple program (the "VNC viewer") on another computer desktop anywhere on the Internet. The two computers do ...more
Since its inception in 2007, the Pwn2Own computer hacking contest has been challenging the vulnerability of mobile phones and web-related software. In 2010, the fruit of two full days of hacking came down to the exploitation of the following web browsers: Safari 4 on Mac OS X, ...more
Here's another cool hack using the Kinect, albeit one beyond the reach of most of us. Some students, staff, and professors at MIT have developed "hand detection" software using the Kinect's motion sensor. Below is a demonstration of this software. It recalls Tom Cruise's icon ...more
Ron Paul Republicans take over Nevada GOP Ron Paul fever is spreading across the country, but it faces furious opposition from the Republican Party establishment as Election Day nears. Following this week’s primary victory in Texas, Massachusetts Governor Mitt Romney is all b ...more
Watch out Macs. Flashback is back. Variations of the trojan have reportedly infected 600,000 Mac computers around the globe, with about 57 percent in the U.S. and another 20 percent in Canada. Dr. Web, who discovered the spreading Flashback, said that these trojans install t ...more
Have you ever forgotten your password and didn't know how to get back on your computer? Or ever had an annoying roommate you wanted to play a trick on to teach them a lesson? Or perhaps overly religious parents who think the internet is of the devil and won't let you read onli ...more
If you didn't think you could make a high speed photography trigger or hack together some creepy googly eyeballs for Halloween, then you've got another think coming, because learning how to use Arduino just got easier thanks to Jody Culkin and her wonderful comic book introduc ...more
Many windows users, if not all, run into a virus infection once in a while. This is unavoidable when using Microsoft's operating system. Without digressing too much, the fact that Windows is such a popular OS with no controlled software sources makes it easy for viruses and ma ...more
http://www.enigmasoftware.com/support... Having problems with your anti-virus software on Windows? See how to remove Anti-Virus-1 with SpyHunter. The Anti-Virus-1 program is a malicious antivirus program that could cripple your Windows PC, so don't take any chances. Remove it ...more
Link shorteners like TinyURL and Bitly are great for Twitter (or anytime you're limited on space), but they're also great for hackers. It's easy to hide a malicious link in an innocent-looking shortened URL, which increases the chances that people will click on it. Once you c ...more
to stay secure, you dont just need Tor, and a VPN. You need good browsing habits. What are Browsing Habits You Ask? Let me tell explain. Its basically how you behave on the internet, what websites you click, your language pattern (how you speak), what websites you are regist ...more
You have read How to Draft a Basic Pant Pattern. It's a most useful guide, but the image is hard to read and the steps many and complex. That's why I wrote a little software program to do the hard work for you. Just enter your measurements and click the button. Once you're sa ...more
Determining the antivirus and firewall software installed on a Windows computer is crucial to an attacker preparing to create a targeted stager or payload. With covert deep packet inspection, that information is easily identified. This attack assumes the Wi-Fi password to the ...more
In a previous article, we learned how to take advantage of a feature, Dynamic Data Exchange (DDE), to run malicious code when a Microsoft Word document is opened. The biggest challenge of this attack is that it requires getting the user to agree to a pop-up prompt. Fortunately ...more
Apple's macOS operating system is just as vulnerable to attacks as any Windows 10 computer or Android smartphone. Hacker's can embed backdoors, evade antivirus with simple commands, and utilize USB flash drives to completely compromise a MacBook. In this always-updated guide, ...more
Welcome back, my novice hackers! New hackers often ask me the same question: "What is the easiest platform to hack?" My response is always the same—it is not a platform, but rather a particular piece of software that is easiest to hack, which is on nearly every client-side sy ...more
Welcome back, my hacker apprentices! My recent posts here in Null Byte have been very technical in nature, so I thought that I'd have a little fun with this one. Have you ever had an annoying neighbor whose dog barks all night, who has loud parties that keep you awake, or who ...more
Facial recognition software is being more widely used with every passing day. Your local law enforcement is probably already using it, and it will be even easier for them now that the FBI handed out its own facial recognition software to state authorities. Even the fine folks ...more
Malevolent hackers can divert your incoming calls and texts to any number they want, and they don't need to be a criminal mastermind to do it. Even friends and family members can reroute your incoming calls and messages so that they know exactly who's trying to reach you, and ...more
Welcome to an introduction on writing basic malware, an optional sub-series in which I expose you to malware and its technologies. This is written for those who wish to seek a beginning in malware analysis or enlightenment on the subject. We will be justifying the writing and ...more
Most of you already know that a zero-day exploit is an exploit that has not yet been revealed to the software vendor or the public. As a result, the vulnerability that enables the exploit hasn't been patched. This means that someone with a zero-day exploit can hack into any sy ...more
Welcome back, my rookie hackers! The more we know about a system or network, the better our chances of owning it and not leaving a trace for investigators to follow. One of the often overlooked sources for information is the Simple Network Management Protocol (SNMP). Many roo ...more
Welcome back, my budding hackers. So many of you are interested in hacking Wi-Fi that I have decided to revisit my Wi-Fi Hacking series with some updated and more in-depth material. I strongly suggest that you look at some of my earlier posts, such as "Getting Started with Te ...more
This past weekend, one of the most notorious hacker organizations in the world, Hacking Team, was hacked by some unknown organization. The Hacking Team is an Italian company that sells it software and services to companies and governments (yes, my rookie hackers, there are leg ...more
All of my hacks up to this point have been operating system hacks. In other words, we have exploited a vulnerability usually in an operating system service (SMB, RPC, etc.) that all allow us to install a command shell or other code in the target system. As I have mentioned nu ...more