QR codes are everywhere, from product packaging to airline boarding passes, making the scanners that read them a juicy target for hackers. Thanks to flaws in many of these proprietary scanning devices, it's possible to exploit common vulnerabilities using exploits packed into ...more
Once a hacker has created a PowerShell payload to evade antivirus software and set up msfconsole on their attack system, they can then move onto disguising their executable to make it appear as a regular text file. This is how they will get a Windows 10 users to actually open ...more
Brute-forcing is an easy way of discovering weak login credentials and is often one of the first steps when a hacker finds network services running on a network they gain access to. For beginners and experienced hackers alike, it's useful to have access to the right tools to d ...more
Cross-site scripting is one of the most common vulnerabilities found on the web today, with repercussions of this type of flaw ranging from harmless defacement to sensitive data exposure. Probing for XSS can be tedious and time-consuming for an attacker, but luckily there are ...more
Welcome back, my novice hackers! Reconnaissance is one of the most important preparatory steps to hacking. As I have emphasized many times before here on Null Byte, you must know the operating system, the ports, the services, the applications, and sometimes even the language ...more
It's easy to lose the TikTok video you were watching when you accidentally refresh your For You feed, but it's not gone forever. TikTok has a new feature for your iPhone, iPad, or Android device that can show you all your watched videos over the last seven days. There are also ...more
The newest version of macOS has arrived. While everyone's mind is being blown by Mojave's groundbreaking new Dark Mode, we'll be taking advantage of its insecure file permissions to establish a persistent backdoor with a self-destructing payload that leaves little evidence for ...more
Whether you miss the good old days of Telnet or you want to know what hacking was like when security was nothing but an afterthought, Telehack is the game for you. The text-based hacking game is a simulation of a stylized combination of ARPANET and Usenet, circa 1985 to 1990, ...more
Browser extensions are extremely useful since they can expand web browsers like Google Chrome and Mozilla Firefox beyond their built-in features. However, we don't always know who's behind a browser add-on or what it's doing beyond what's advertised. That's where ExtAnalysis c ...more
Apple's iOS 16.3 update for iPhone had impressive new features, but iOS 16.4 might impress you even more. The latest iPhone update was released on Monday, March 27 — a day earlier than Apple Music Classical, Apple's new classical music streaming service — has at least 30 more ...more
New Year's Eve. It will be one hell of a chaotic night. Trust me. The overcrowded streets. Long lines for the urinal. Maxing out your credit card on that shot of Cuervo. You'll be lucky to make it out alive. If you do manage to stave off alcohol poisoning and survive the asc ...more
You know it's crazy out there when governments start blocking social websites like Facebook, Twitter and even YouTube. But that's what happened in Egypt, when tens of thousands of anti-government protesters took to the streets on Tuesday (January 25th) in hopes of ending Presi ...more
If you're looking to acquire the newest iPod model or latest Xbox without breaking the bank, your first stop would probably be eBay, maybe even the Amazon Marketplace, or any of the other reputable online marketplaces and auction sites. But you probably haven't hit up the penn ...more
Not everything that Facebook does is in the best interest of its users. Just look at past examples such as social ads, facial recognition, and instant personalization. Users were perfectly fine without these, and they still are. And now there's another annoying problem that Fa ...more
For the dedicated prankster, April Fool's Day is no joke. Nothing will stop them from coming up with the cleverest, most elaborate prank the world has ever seen. Or at least—their victim. The hardcore mischief-makers start planning out their ingenious prank the day after Apri ...more
There's three types of animal lovers in the world. The first are your basic pet owners. The ones with a cat or dog in the home, meant to be their cuddly companion. They love and adore it and consider it a member of the family. The second are animal rights activists. They ten ...more
If you loved The Da Vinci Code by Dan Brown, then listen up— there's been a new discovery found hidden within Leonardo da Vinci's most famous painting— the Mona Lisa. An Italian researcher named Silvano Vinceti sparked a new controversy over the world's most famous painting w ...more
Watch this video to learn how to cheat on a test with help from your iPod. Ask a trusted friend for their notes/answers the night before. Then at your computer, just type up their notes/answers, or the important parts, and then save it in your computer as "How to make Grandma' ...more
Pixel Perfect is the "perfect" show to help you with your Photoshop skills. Be amazed and learn as master digital artist Bert Monroy takes a stylus and a digital pad and treats it as Monet and Picasso do with oil and canvas. Learn the tips and tricks you need to whip those dig ...more
Have you ever wondered how to create an invisible folder? I mean an invisible folder, not a hidden folder. Nowadays, we are facing lots and lots of problems requiring us to keep our data safe and secure. There are millions of hackers all around the world that are trying to ste ...more
It's not brain surgery, but teeth whitening systems still hits the pocket books hard. However, there is a cheaper alternative to have the whitest teeth in the neighborhood, and it's called Photoshop. With Adobe Photoshop, you can have whiter teeth in seconds! Really. It's defi ...more
What's the easiest way to keep track of your website passwords? Maybe in a password-protected document on your computer? Makes sense. But surprisingly, this is no easy task in Mac OS X. Snow Leopard does not have an easy one-click option for password protecting files and fold ...more
Killstreaks: Advantages and Disadvantages 3 Kills – Spy Plane: Advantages: This lets you see enemies on the radar in the upper left hand part of your screen. Though it is one of the lowest killstreaks, it is very beneficial and gives you a huge advantage. Disadvantages: It ca ...more
First off, don't be frustrated. YOU CAN DO IT! Contrary to the message in the image above, it's NOT over. It's just beginning. And when it comes to solving the New York Times crossword puzzle, the old cliche does apply: practice makes perfect. I've read quite a few books and ...more
Someday, maybe not today, maybe not tomorrow, but someday, you'll find yourself on the road in your car, maybe on the highway, and you'll hear something. With your air conditioning on full blast and your stereo so loud your ears feel like they are bleeding, you normally would ...more
Photoshop. It’s like a mountain to climb. You can chug up to the top, working hard, never letting up, or you can just go part way up and scoot around the side of the mountain and still get to the other side. Not everyone needs to be a Photoshop guru, or ninja pixel punisher. T ...more
Although +Google Chrome has been getting many deserved kudos for its innovations and speed, many people still prefer to use +Mozilla Firefox as their primary browser. If you’re a dedicated Google+ user, you know that there are many Google+ Chrome browser extensions available t ...more
Learn how to flash a custom recovery image and load a custom ROM onto a rooted Droid Eris Google Android smartphone! Custom ROMs help you to unlock your phone's hidden potential and allow you to, among other things, turn your mobile phone into a 3G wireless modem with free WiF ...more
Warnings i cant be held responsible for any illegal act done by anyone but myself and there are copyrights so notise that taken the trademarks or copyrights are strigtly prohibeted by law and will be punshied by law and i or my partners cant be held responsible for sudo camma ...more
WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more
The dreaded moment you hope never happens—someone has stolen your laptop. You could have private information, pictures, or even private information belonging to the company you work for, all lost forever. It can cause you pain, money, or even a job. There are paid services th ...more
In Alan Wake, there are hidden messages hidden throughout the levels that are only visible with a flashlight. If you don't flash the light at a particular spot, you will not be able to see the message. These messages are left by a mysterious entity trying to give hints to Ala ...more
Submission for weekly staff contest. Full flickr set : http://www.flickr.com/photos/87457200@N00/sets/72157629081335634/with/6780458228/ location : /sethome mgabrys contemporary treehouse 1, island of trees, ruin garden, and cove (for future ruin project), 2.5 evenings of ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
We always have so many file formats in our computer, we use MS Word to view .doc files, MS Excel to view .xls files, Adobe Reader to view PDF files, image viewers to view all kinds of image formats, and browser to view html files. It seems we need to install many programs to v ...more
Learn how to load a custom ROM onto a rooted Acer Liquid Google Android smartphone! Custom ROMs — or firmware images — help you to unlock your phone's hidden potential and allow you to, among other things, turn your mobile phone into a 3G wireless modem with free WiFi tetherin ...more
Prop 25 prevents a suspension in CA’s budget. It means that legislators will not get paid if the budget is not passed on time. A budget will be passed with the vote of a small majority rather than two-thirds like it was before. However, a two-thirds vote is required to increas ...more
The nose is one of the many challenging facets of drawing the human face realistically, and its central location makes it impossible to hide your mistakes. This video will demonstrate for and explain to you, the budding artist, how to draw a good-looking nose in pencil. Step- ...more
Watch Bill Myers show you an easy way to quickly hide sensitive screen capture text or images using Camtasia Studio.
Yes, you read that right! There's a hidden space monkey screen option in Photoshop CS2 that will change the default image when Photoshop is loading. Watch this video and see just how to find it! The video was made around Easter, so it's a Photoshop Easter Hunt! Find the space ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Looking to build an awesome one-way entrance into your base? Why not create an awesome drawbridge so that no one can enter without your permission? This sty ...more
Computer crashes, fried hard drives, red rings of death, delinquent memory cards... nothing is worse than dysfunctional technology. In just a minute, your favorite and most used device has become the biggest headache of your life, frustrating you to the brink of madness. But w ...more
Today's guide is on creating a password protected folder on Windows 7 without any additional software. Yes, you heard that right. No extra software at all! This guide is intended for beginners. But please note, this method should not be used to store financial or otherwise hig ...more
APOLOGUE n pl. -S an allegory 61 points (11 points without the bingo) An apologue (or apolog) is an allegorical short story, poem, or picture that can be interpreted to reveal a hidden meaning or principle, typically a moral or political one. It's very similar to a fable, bu ...more
You're in a new city and you want to explore—what mobile app is best? If you want to know what club is hopping that night, use SceneTap. If you want to know if any friends are at a nearby get-together, use Foursquare. If you want to know what restaurant is best, try Yelp. But ...more
The term glitch always seemed best suited for computer programs, video games and electronic equipment, where a slight irregularity in the device or system would create a temporary malfunction with annoying, sometimes even amazing unexpected results. Only the effect was never r ...more
Wow, naked + batman + tattoo/body painting = some pretty "out-there" art... Korean artist Kim Joon has been fascinated with tattoo culture ever since his days in the military as a young man. Since, he has taken his obsession into the fine arts realm, treating the human body l ...more
First of all open any image and create a new ‘layer’ and add it to your image. Click on the transparency and then click ‘ok’. Now from the right menu bar choose the ‘elliptical’ icon to make a round balloon. Now select the 'free select tool' and select ‘mode’ to 'add to curren ...more
Yanik Chauvin demonstrates how to do Non Destructive Dodging (lighten) and burning (darken) of images using the tools in Photoshop. He shows the image of a man lying on earth with his camera. To start the work he wants to make a new layer which can be done in two ways either b ...more
Find out how to solve the 11th puzzle, entitled "The Inventor", in Assassin's Creed 2. Image 1: Just move the lightning bolt over the bulbs to bring them to life. Image 2: Highlight the area just at the base of the tower, between the two windows, to find this hidden image. Ima ...more
Need to stash a couple small valuables and your super secret Moleskin journal in a place where no one will ever find them? Get yourself some glue, a few cutting tools and a fairly thick book, and you'll have all of the utensils you need to make yourself a nifty book safe that ...more
You suspect somebody is lying to you. What are the signs you should watch out for? Listed below are nine common indicators you should look out for when you suspect a little truth-bending. While a display of one or more of these signs does not automatically indicate guilt, the ...more
Anonymity is something that doesn't exist today. Everything you do in the world is tracked, from the purchases you make to surfing the internet—even taking pictures on your iPhone. Everything you have ever said and done on the internet is still there—somewhere. This is called ...more
In this video, we learn how to use watercolor pencil techniques. The rendering process is similar to those with graphite. You will use strokes, giving them different lengths and colors to create texture. You can do crosshatching on the paper so everything is darker and you are ...more
You can resize keyframes in Adobe Flash and you can do this for anything like images, animation etc. So to do this first click on your first keyframe and hold down the shift key and then click on the last keyframe. Now select the free transform tool and resize that as showing ...more
Open Xara 3D. Hit show or hide cursor. Type the name JRR Tolkien. Open Animation Options. Set to swing 2. 4 frames per cycle. 1 frame per second. No pause. Angle 0. Select the second "R" and change the animation. Flip the "R" around so it is a mirror image. Go from frame one t ...more
This three part tutorial covers how to use Google Earth - including some cool features you may not know about. The first part goes over the basics, the second part shows you how to import higher resolution images and textures, and the third part shows you how to add placemarks ...more
When you're meeting new people, chances are they're no longer interested in collecting your phone number or email address. Instead, they're more interested to see if you have a Facebook account. So, what's a better way to get connected online in the offline world than a busine ...more
Hi there Dolls, I just got done putting the children to bed for the night. Fed the husband, made a little love, and took a bubble bath! I lathered up my body with a Gardenia lotion and have thrown on my amazing silk robe. I smell and feel wonderful as I sip on my Cantaloupe ...more
STANDP'S WINDOWS 7 "ASTON-2" CUSTOMIZED DESKTOP IT ROCKS COMPLETELY!. DEC 07 Computer Backup If you have taken good care of your computer then you know what you have to do to keep it running smoothly. It has to be cleaned regularly so there isn't any dirt and dust on it. It ...more