Facebook unveiled a lot of changes last week, and, as usual, it's causing a lot of consternation and controversy. People within my Facebook, and on Google+, keep asking how to remove the ticker, and are trying, and mostly failing to make sense of the changes. I've decided to ...more
Their were many pedestrians in the scene as,they seen firefighters struggling with the horrifying disaster and they couldn't do much only continue to stare as bodies continued to drop.. Firefighters arrived at the Triangle Shirt Waist Company Fire minutes after the alarm was ...more
INTRODUCTION In this world of Internet era, almost everyone wants to create theirs own web presence by either hosting their own blog, articles, photos, videos, reviews, etc etc . But some people choose their own way and decide to have something bigger! What is it? Its a websi ...more
Work is commonly composed as a Microsoft Word document but if you would like to convert that document into a PDF file that any operating system can ready you will need to follow a few simple steps. If you need to turn a Word document into a PDF file, here is an easy way to ma ...more
It can be hard finding fellow singles in the suburbs but it can be done! Keep your eyes peeled and make sure you are out and about meeting new people in public settings. Don’t forget about your online or in print options. If you want to meet a single someone in the suburbs, h ...more
In this how-to video, you will learn how to block Facebook messages going to your email address. First, go and open Google in your web browser. Next, go to the Facebook website. Click on settings and edit your information. Click on the notifications tab. Now, you will be prese ...more
Find a PDF You need a PDF file on your computer to convert, so keep the file path in mind. Visit aXmag Go the aXmag website to submit a PDF. Choose the PDF Click the "Browse" button to choose your PDF file you want to convert. Once chosen, fill out your email address in t ...more
SyncVue announced at NAB that they would be offering a new version of their remote collaboration software for editors and producers. Well the long awaited update is finally here and all existing SyncVue users will definitely want to grab it. The functionality is improved and t ...more
If one of your is really messy then you can try this prank on them. It actually happened with me and believe me it works!! If the person concerned just doesn’t clean up his or her mess and from table or bed and you really find it irritating since that is the situation with mos ...more
You either love politics, or you don't, but office politics are entirely different than your local elections. It could mean respect, raises, or could even mean your job. Just staying out of it could stunt your career. Here’s how to jump in and get ahead – without getting burne ...more
If you are having a small issue with someone or are having trouble recovering money from somewhere, you may want to consider filing a lawsuit. Filing in small claims court is complicated, but with this tutorial, you will be on your way to understanding the steps a bit better. ...more
So you don’t need to have a full on conversation but you do want to relay some information to someone. A text message the perfect option to get a short message across using your cell phone or even just to say hi. Text messaging makes it easy to communicate with friends and fa ...more
If you use Facebook more than you probably should, then you may have noticed all of those emails they send you. You'll get one when somebody comments on your wall, when someone comments on a comment you wrote on somebody else's comment, when somebody comments on a photo someon ...more
Warnings READ READ READ! Have the Jackass crew go out to the club or maybe one of the members house, then tell one of the jackass members like Bam(Best choice) or anyone else to put a sleeping pill into another jackass members drink like Weeman(Best choice), and tell Bam its ...more
Find a friend’s pool in either late Spring or early Fall (need a cool night, but still want swimming to be an option). Unbeknownst to the friend, turn off the heater mid afternoon, allowing the water to cool during the evening. Overnight, fill the pool with Jell-O packets. An ...more
It's easy to get around in the 2010 Ford Lincoln MKX, because it has a built-in navigation system. But how do you use it? How do you find your way around? This video will show you the steps necessary to set a waypoint on the touch screen inside the 2010 Lincoln MKX. Getting di ...more
Have a tweaking Zen Vision M? Your battery might need replaced, so do it yourself instead of paying someone else to do it! You don't need to pay an expensive professional when you only need to pay for the battery. This step-by-step video demonstration will show you the procedu ...more
The 2010 Ford Lincoln MKX can do plenty of things, and a lot of those features are geared toward comfort. Like your seats. You can position your seats exactly how you want them. And you can save that position so you can always come back to it later, just in case someone messes ...more
Not a social butterfly? You can go out into the world while ignoring a particular person or just not get caught up in a conversation with anyone at all. With the use of some distracting devices and a little acting you can be on your way. Follow these tips to make ignoring som ...more
Want unlimited Tiki power on Island Paradise? Just use Cheat Engine to hack your way to more power. This is only for 1 use only. Watch this Island Paradise Facebook video to see how to hack unlimited Tiki power in Island Paradise (11/26/09). Use Cheat Engine 5.5. 1. Open Che ...more
Restaurant City is a Facebook game that allows you to create your own restaurant. Watch this video tutorial to learn how to hack Restaurant City: Money cheat (09/30/09). Download Cheat Engine. 1) Open Restaurant City 2) Download and open the X-Force Generator 3) Scan 0000D49 ...more
The best way to show your parents that you are ready to date is by being responsible. Document just how responsible you are and present them with possible, mind-easing dating options and you’ll be dating in no time. If you’re more than ready to start dating, but your parents ...more
Choose the Right Path Making a choice What do you do, when you do not know what to do? Perhaps, you do nothing. But such inaction may be unhealthy and even suicidal. Someone said, “The only thing for the evil to triumph is the good should do nothing”. Many people have been i ...more
since zipper rides have wide seats either connect two porta johns or find a "doublewide" 2 seater crapper. if you can get away with using just one crapper, cool. mount all safety harnesses and mount the the crapper in the ride mounts. have the guys fill the crapper/s up and ha ...more
One night after partying, find the most wasted person in the group. For security purposes, don't be afraid to slip him a roofie or two throughout the night. The next morning, while he is still sleeping, strip him down butt-naked, put a blindfold and a pair of ear muffs on him, ...more
The idea is to find a popular fishing spot like a pier or riverbank or low bridge and have zisman bring his pole. After a minute conversation with a local talkin bout how people don't fish like they used to hell back in my day we caught em with our bare hands you youngters are ...more
The prank will involve : -A very high cliff -A car -A track for the car -An unsuspecting victim (preferably someone EXTREMELY afraid of heights) The idea would be to put a car near the edge of a cliff. Unknown to the victim, the car would be on a track to keep it from dri ...more
Many online users worry about their accounts being breached by some master hacker, but the more likely scenario is falling victim to a bot written to use leaked passwords in data breaches from companies like LinkedIn, MySpace, and Tumblr. For instance, a tool called H8mail can ...more
The latest film addition in the American-produced Millennium series, The Girl in the Spider's Web, was just released on Blu-ray a few days ago. As you could expect, the movie has many hacking scenes throughout, just like the previous English and Swedish language movies centere ...more
Shodan calls itself "the search engine for internet-connected devices." With so many devices connected to the internet featuring varying levels of security, the special capabilities of this search engine mean it can provide a list of devices to test and attack. In this tutoria ...more
Apple's Wallet app lets you store boarding passes, concert tickets, gym memberships, vaccination cards, movie stubs, rewards cards, insurance info, student IDs, and more in one place on your iPhone, and you just double-click the Home or Side button to access them. Unfortunatel ...more
Phone numbers often contain clues to the owner's identity and can bring up a lot of data during an OSINT investigation. Starting with a phone number, we can search through a large number of online databases with only a few clicks to discover information about a phone number. I ...more
These days, if you're having friends over, they'll probably ask to log into your Wi-Fi network before asking for a drink. But if you've forgotten your password, it can be quite hard to find, since most devices obscure the characters with asterisks. But it honestly doesn't tak ...more
It's finally out. After months of testing, iOS 13 is available to install on your iPhone, which means over 200+ new features you can use right now. The update, released on Sept. 19, can be installed over the air or from a restore image using iTunes in macOS Mojave and older or ...more
I misplaced my iPhone 6 just a few weeks ago, so I know firsthand that losing an iPhone sucks. Luckily, my tale didn't have a bad ending. While at a bar, I went to use the restroom and mistakenly left my iPhone on an unguarded chair. When I returned, it was gone. Admittedly, ...more
Welcome back, my aspiring hackers! Domain Name System (DNS) is one of those things we seldom think about unless it doesn't work. Then, it can be very frustrating when we attempt to navigate to a website and we get that frustrating error message. DNS enables us to type in a d ...more
An attacker can repurpose public MyBB forums to act as command-and-control servers. It only takes a few lines of code to configure a MacBook to fetch commands and send responses to any website the attacker desires. Before you keep reading, know that this project is not geared ...more
Welcome back, my hacker novitiates! In previous guides, we have used one of the most powerful hacking platforms on the planet, Metasploit, to perform numerous hacks. They ranged from exploiting Windows XP and Windows 7/8 vulnerabilities, to installing a keylogger and turning ...more
Websites are often misconfigured in ways that allow an attacker to view directories that are not ordinarily meant to be seen. These directories can contain sensitive information such as private credentials or configuration files that can be used to devise an attack against the ...more
Welcome back, my budding hackers! One of the keys to being successful as a hacker, pentester, or cyber warrior is the ability to find vulnerabilities or flaws in the target system, which are what we exploit when we hack. We have looked at several ways to do that including var ...more
Open-source data scraping is an essential reconnaissance tool for government agencies and hackers alike, with big data turning our digital fingerprints into giant neon signs. The problem is no longer whether the right data exists, it's filtering it down to the exact answer you ...more
Google's design chief Matias Duarte has gained fame and acclaim for his recent visual revamp of the Android operating system, and now, Google's starting to incorporate this Material Design styling into more of its products. The latest of Google's wares to get the Material Des ...more
Welcome back, my novice hackers! Reconnaissance is one of the most important preparatory steps to hacking. As I have emphasized many times before here on Null Byte, you must know the operating system, the ports, the services, the applications, and sometimes even the language ...more
Aircraft equipped with ADS-B are constantly shouting their location into the radio void, along with other useful unauthenticated and unencrypted data. In this guide, we will make an ADS-B receiver using a Raspberry Pi with a software-defined radio (SDR) dongle, which we can us ...more
When the Chromecast first came out about a year ago, developers were quick to find a way to root the streaming device. Google was almost as fast, however, in updating the Chromecast's firmware to close the loophole that this method used. Recently, the developers at Team Eurek ...more
We're all looking to meet someone, and in this day and age the easiest way to do that is through one of the various dating apps out there. But we can all admit it can get disheartening swiping through all of those people for the frustration of someone not answering your messag ...more
It's been said time and time again: reconnaissance is perhaps the most critical phase of an attack. It's especially important when preparing an attack against a database since one wrong move can destroy every last bit of data, which usually isn't the desired outcome. Metasploi ...more
Hello everyone! I hope you are having a great day so far. Today, instead of caring about networks we are going to talk about subnetting based on host requirements as promised in my first article about subnetting. Just like in the previous articles we will jump right into the e ...more
Welcome back, my fledgling hackers! A short while ago, I did a tutorial on conducting passive OS fingerprinting with p0f. As you remember, p0f is different from other operating system fingerprinting tools as it does not send any packets to the target, instead it simply takes ...more
On April 7, 2017, residents in Dallas, Texas, woke to the sound of emergency sirens blaring all over the city. No one could shut them off, and after repeated efforts to contain the situation, the city had to shut down the entire system. While the media reported a sophisticated ...more
Auditing websites and discovering vulnerabilities can be a challenge. With RapidScan and UserLAnd combined, anyone with an unrooted Android phone can start hacking websites with a few simple commands. RapidScan does an excellent job of automating the deployment of vulnerabili ...more
Nmap is more powerful than you know. With a few scripts, we can extend its functionality beyond a simple port scanner and start to identify details about target servers sysadmins don't want us to know. Possibly the most popular and well-known reconnaissance tool currently ava ...more
Chance are, you or someone you know is that person in the gym: flexing in front of a mirror, posing for the perfect photos to show off your workout results. But finding the right picture is hard. The thing is, it doesn't need to be. A good gym selfie or workout video doesn't ...more
When attending networking events, a LinkedIn exchange is a common occurrence. Equally common is the awkward fumbling dance with how to add each other. Fortunately, we have the solution: the ultimate way to add LinkedIn contacts. You no longer need to spell names with non-typi ...more
Apple's latest update for iPhones, iOS 13, introduces over 200 new and exciting features. Many of those changes come to Siri, resulting in a better, more useful version of the digital assistant we've known for years. If you simply look at iOS 13's webpage, however, you wouldn' ...more
Apple has packed a lot of new features into the iOS 13 update, and practically no core app has gone untouched. The Messages app, in particular, got plenty of love, including new ways to dress and use your Memojis. Beyond the improvements and additions made to Memojis, Message ...more
For the uninitiated, it can be difficult to buy that special hacker in your life a perfect holiday gift. That's why we've taken out the guesswork and curated a list of the top 20 most popular items our readers are buying. Whether you're buying a gift for a friend or have been ...more
The iTunes App Store makes it easy to buy an app or game on someone else's behalf, and it's a great way to send an iPhone user a thoughtful gift. The Google Play Store doesn't have such functionality, but there are still a few workarounds to accomplish the same goal: gifting a ...more
Smartphones and laptops are constantly sending Wi-Fi radio signals, and many of these signals can be used to track us. In this guide, we'll program a cheap IoT device in Arduino to create hundreds of fake networks with common names; This will cause nearby devices to reveal the ...more
Android is a highly customizable operating system, but that doesn't always apply to the apps you find on the Play Store. Most of the time, when you install an app, you're stuck with the default look and feel — but luckily, this isn't the case with Firefox. Unlike most other br ...more