Got 3D glasses leftover from the Superbowl? Time to break them out! You will need cheap 3D glasses from television promotions or you can grab them off eBay for this demonstration. Or you can simply make your own 3D glasses red and blue or yellow and blue cellophane. NOTE: Get ...more
At first, it seemed like a clever art installation housed on the web, but now we're not so sure... the Newstweek hack may indeed be legit. Earlier this year, Newstweek claimed to have developed a way to hack into webpages on a local Wi-Fi network using a homemade device that ...more
This tutorial video will teach you how to hack a sealed envelope to open it and re-seal it perfectly. This is great for anyone looking to snoop through someone else's mail. But that is illegal, of course.
This video demonstrates how to discover the dating history of people by searching on the website www.rateabull.com. The site searches their own dating database, as well as several other social networking sites.
In this video, we learn how to kill bed bugs with bed bug dogs. There are now upcoming kinds of K9 dogs that are specifically trained to smell the scent of bed bugs. This is a great tool to use to detect early on if your room has bed bugs in it. If you don't have bed bugs alre ...more
Want Gary the Gadget Guy's background for Club Penguin? Well, there are just a few simple steps to getting the background on CP. Watch this video tutorial to learn how to hack backgrounds in Club Penguin (10/29/09). It works only if the item is available. He is only available ...more
Club Penguin is a flash-based website with an a virtual world of online games for kids to play. Learn how to hack Club Penguin with tricks and cheats. Watch this video tutorial to learn how to wear member clothes as a non-member in Club Penguin (09/23/09). Download CP Trainer ...more
If you have any problems you can email me or visit my website at www.gapto.webs.com!!! This video shows you how to hack into Restaurant City using Cheat Engine and Restaurant Tools v5. Restaurant City is a Facebook game that allows you to create your own restaurant. Descrip ...more
Kaplan University presents Visionary Voices, a series of interviews that chronicle our goals in regards to adult education and continuing education throughout your life. Kaplan University offers online degree programs designed to expand the way you think and help you develop b ...more
In this Computers & Programming video tutorial you will learn how to hack into a compuuter, the easiest way. Go to start > run, type in ‘cmd’ > OK. To find the IP address of a website, type in ‘tracert myspace.com’. This example is to find IP address of myspace.com. Th ...more
Today's post is a small go-to guide for beginner programmers in Null Byte. With many of our community members picking up programming from our Community Bytes, it only makes sense to lay out a one-stop guide for your reference. Hopefully this guide will help you make an educate ...more
In this video, we learn how to do a free reverse cell phone look up for call records. This will work for some cell phones, but not all of them. First, go to the website Your Spying Eyes. This is a great search tool where you can look through records of cell phones to find out ...more
In this tutorial, we learn how to use the notepad to get by school internet blocks. First, open up Notepad on your computer, then type in "<html>" "<body>", "iframe src=http://www.youtube.com", then "height=100%", then "width =100%". To finishe, type in "<iframe>>/body><html>" ...more
Hacking seems like the only solution to today's flash-based games, like Club Penguin. If you can't do it yourself, let a cheating program do it for you. That's the new fad. Cheat Engine. That's all you need to hack online games. Watch this video tutorial to learn how to cheat ...more
This is Cheat Engine hacking for Club Penguin. If you want more coins, you have to hack your way to them. And to hack your way to more coins, you're going to need Cheat Engine. Watch this video tutorial to learn how to earn Club Penguin coins with Cheat Engine (10/23/09). Dow ...more
In this video, we learn how to hack school filters to get on Facebook with Tracert. First, go to the start menu and then type in "cmd" into where it says run. After this, type in "tracert" and then the website name. Wait for all of the information to fill in in the black scree ...more
Six months ago, 1.3 million registered users of Gawker Media had their passwords compromised when the site was hacked by Gnosis. The passwords were encrypted, but 188,279 of them were decoded and made publicly available for all to see. Just three weeks ago, Sony Pictures was h ...more
In this tutorial, we learn how to find someone's IP address. First, log into What's their IP. Once you open this, enter your email and click the links that can be sent to your friends. Once they click on these links, the website will email you that person's IP address. You can ...more
This is hardcore, serious hacking at its best. So it goes without saying that you probably shouldn't be attempting this computer hack unless you've successfully shut down your friend's computer at school using Command Prompt and sent out a fake virus to loved ones. This tutor ...more
JavaScript is one of the main programming languages that the Web is built on. It talks directly to your browser and exchanges information with it in ways that HTML simply cannot. With JavaScript, you are able to access browser cookies, website preferences, real-time actions, s ...more
Big Block Games has a pretty good indie track record. They've spent years developing their fun free-roving space game, Black Market, which is still in Beta. And they've spent just as much time with their much simpler, but fully completed physics platformer, Super Goblin War Ma ...more
To hack into Google images follow the following steps. You will first need to open a new internet browser window and go to Google, then load their images website. Next type into the search bar your image query and press search. Once you have gotten your search results paste th ...more
What's your highest scoring game of Scrabble? Since starting this Scrabble World, I've been able to break 500 points on a regular basis. This year I've even managed to break the 600-point barrier a couple times. If you ask me, that's a pretty hefty sum to score in one game, b ...more
JavaScript is the language of the internet. It is what allows us to create dynamic, interesting webpages that are fast, web-based applications and so much more. The primary use of JavaScript is to write functions that are embedded in or included from HTML pages and that intera ...more
For as much money as they've made from North American video game audiences over the years, Japanese game developers don't seem to have very much faith in them. Dozens of great titles from their 40 years in the industry have appeared in Japan and across Europe, oftentimes even ...more
Impress dinner companions with your flawless manners—it’s as simple as observing a few key rules. You Will Need * A crash course in dining etiquette Step 1. Know the basics As soon as you take your seat at the table, place your napkin in your lap and obey the basic rules: ...more
How to dress for a job interview is important to know before you go in. Watching the video will establish ways to assess company culture, exceptions, accessories to dress at a job interview and how to play it safe and professional. 1. Dressing for Company Culture in a Job I ...more
The community tore up the first realistic mission last week. You've applied the techniques learned in the basic missions to a real scenario, so I'm pretty content. The realistic missions are where the learning gets intense and where we can apply real knowledge to extremely rea ...more
Nicholas Entertainment Group (NEG) is a Polish independent game publisher that recently got their hands dirty with development. Their first game (with Intoxicate Studios) is the forthcoming horror first-person shooter Afterfall: InSanity, which comes out next month—dangerously ...more
A century ago there wasn't much life available for quadriplegic people. Handicap accessibility was barely even a concept, and lacking medical technology kept any semblance of independence out of reach. Today those unfortunate enough to be paralyzed from the neck down have brig ...more
Sometimes an iDevice is best used for idle, pointless fun. Today's segment of Making Art on Your iOS Deviceis a mixed bag of time-wasting cool effects and random, but useful art-making tools. Below, 10 apps for creating anything from erratic hand-shaken digital effects to your ...more
Club Penguin is a flash-based website with an a virtual world of online games for kids to play. Learn how to hack Club Penguin with tricks and cheats. Watch this video tutorial to learn how to cheat Club Penguin: padlock pin hack (09/25/09). Club Penguin is a multiplayer onli ...more
Club Penguin is a flash-based website with an a virtual world of online games for kids to play. Learn how to hack Club Penguin with tricks and cheats. Watch this video tutorial to learn how to hack Club Penguin: money cheat (09/29/09). Download Penguin Storm 8. Club Penguin i ...more
So, you want to hack Club Penguin, do you? Easy enough… just use Cheat Engine. Cheat Engine solves any gamer's problems, which means cheating. Watch this video tutorial to learn how to use Cheat Engine 5.5 to hack Club Penguin (11/03/09). Download Cheat Engine. You can hack C ...more
Get tons of coins for Club Penguin. Don't be the only one not cheating your way to the top. It's easy to do and you get tons of coins! Watch this video tutorial to learn how to hack coins in Club Penguin (11/19/09). Download the Money Maker hack in order to get the coins you ...more
Need more coins on Club Penguin? Everybody does. But you're willing to cheat for it. That's where this comes in. Sorry, Mac and Linux users, this only works for PC. Watch this video tutorial to learn how to coin hack Club Penguin (11/18/09). It's easy to cheat coins in Club P ...more
Moonwalk on Club Penguin! In order to moonwalk like Michael Jackson with your penguin, you need to have Penguin Storm 10. So make sure you download it first before you start penguin dancing. Watch this video tutorial to learn how to moonwalk in Club Penguin (12/07/09). Don't ...more
Club Penguin is a flash-based website with an a virtual world of online games for kids to play. Learn how to hack Club Penguin with tricks and cheats. Watch this video tutorial to learn how to get a member puffle on Club Penguin when you're a non-member (09/28/09). Download P ...more
Why throw snowballs the normal way when you could throw them super fast in Club Penguin? Get you snowballs up to super speed. Watch this video tutorial to learn how to throw snowballs fast on Club Penguin. 1. Hold the letter "T". 2. Rapidly click your mouse. 3. Fast snowball ...more
Today, I want to share a tutorial on one of the most useful but old methods which you could use to hack websites, that is using the Dot net nuke (DNN) vulnerability . I know some of you already know about this method. Note: This method only works if the website has the vulner ...more
Welcome back, my greenhorn hackers! My preference for Linux as a hacking platform is well documented, and I have even created a series of tutorials to train new hackers. Without being proficient in Linux, you can't really call yourself a hacker. Every once in while, though, ...more
Welcome back, my novice hackers! Before we try to attack a website, it's worthwhile understanding the structure, directories, and files that the website uses. In this way, we can begin to map an attack strategy that will be most effective. In addition, by knowing what files ...more
Welcome back my fellow army of hackers! Today we'll be hacking a website. Hacking is technically not the right word used here. It should be defacing! So we are going to deface a website... What's Defacing? Website defacement is an attack on a website that changes the visual ...more
hello hackers,newbies and followers of this great community, after some research here in our community, I noticed that there is not even one tutorial that teach Web Development. We have a lot of tutorials on how to hack web site but many do not know exactly how a web site is c ...more
Welcome back, my rookie hackers! When Wi-Fi was first developed and popularized in the late '90s, security was not a major concern. Unlike wired connections, anyone could simply connect to a Wi-Fi access point (AP) and steal bandwidth, or worse—sniff the traffic. The first a ...more
Welcome back, my hacker novitiates! Often, to hack a website, we need to connect to and exploit a particular object within said website. It might be an admin panel or a subdirectory that is vulnerable to attack. The key, of course, is to find these objects, as they may be hid ...more
Dirty, malformed, and outright mischievous text strings have long been the enemy of interactive website developers. Strings contain any combination of letters, numbers, spaces, and punctuation, and are entered into text boxes on websites by users. These strings in particular c ...more
There are more than 2 billion Android devices active each month, any of which can be hacked with the use of a remote administration tool, more commonly known as a RAT. AhMyth, one of these powerful tools, can help outsiders monitor a device's location, see SMS messages, take c ...more
People have asked: "Here is an IP address. Can you hack this? Can you hack me right now?" Hacking takes time and skill. You can't just get an IP or an email and hack it in ten minutes unless the password is 1234. I say, "No. I can't really do what you want me to do like this ...more
Tesla founder and CEO Elon Musk offered some insight into how hackers might seek to turn driverless cars into zombie fleets, but remained upbeat about what can be done about it. Speaking at the National Governors Association this weekend, Musk covered a lot of ground when ask ...more
Welcome back, my tenderfoot hackers! Well, the first season of Mr. Robot just ended and Elliot and fsociety successfully took down Evil Corp! They have effectively destroyed over 70% of the world's consumer and student debt! Free at last! Free at last! Of course, global finan ...more
Hello null_byters, after some time out here we are again with another tutorial, continuing our beautiful series, today we will write our first real world bash script. BEFORE WE START Before we start today's lesson Let's recap what we learned in the previous lesson, right now ...more
We use smartphones for just about everything, and while that may be beneficial to us in our day-to-day lives, it can also be used against us in the court of law. Law enforcement officials can seize smartphones and give warrants to Apple, Google, your cellular provider—whoever ...more
Hi guys, this is going to be kinda like a follow up to my previous post on hacking facebook with the remote keylogger. If you haven't seen that post I suggest you do. So like you can click here. Anyway let's move on. Even though people are the weakest form of security, some o ...more
What's your Twitter handle worth? If it's considered "desirable" (aka short and simple), it'll get you around 100 bucks, or, if you prefer, the affections of a teenage girl. A user with the handle @blanket found out the hard way that Twitter's security is atrocious when his a ...more
Welcome back, my budding hackers! People often ask me, "Why are you training hackers? Isn't that illegal?" Although I usually give them a short version of this post, there are MANY reasons why YOU should be studying hacking. Before I begin, I want to re-emphasize to all of y ...more
Greetings fellow hackers. This tutorial is about creating "safe" passwords. This is different from strong passwords. Safe passwords is just creating a password that is not used by someone else or colleague, my definition. But how do you prevent something like this from happeni ...more
Skype is a great way to stay in contact with friends and family over the internet, and people tend to share a lot in their chats, so why not try and find a way to hack it! Once a Skype account is hacked, you can view all conversations within the last three months, see how long ...more
Though you can use the Social Engineering Toolkit to clone websites, this way is much more customisable. For example, you could send the credentials your victim enters to a script that mails you notifying you of new data someone's just entered, or automatically store them in ...more
Most of you already know that a zero-day exploit is an exploit that has not yet been revealed to the software vendor or the public. As a result, the vulnerability that enables the exploit hasn't been patched. This means that someone with a zero-day exploit can hack into any sy ...more