How to Program X Code

How to Program in C# : Variables and Data Types (Part 2)

Welcome back my friends !! Today we'll go through the second part of this C# series Let's start!! Last time we left off with Console.WriteLine and Console.ReadKey now we'll combine these with some variables and comments. Comments are useful for multiple reasons: for exemple ...more

How to Java : E3 (If/Else Statements)

Hello Java-ers, In the previous two tutorials, we learned about installing the JDK, Installing/CreatingAProject in Eclipse IDE, and data types in Java. In this tutorial, we will be learning about if/else statements. -------------------------------------- In Java, an if sta ...more

News : Playing an Electric Guitar With 100,000V

Video: . I made this Tesla Coil using the myRIO and LabVIEW. It uses electricity to play the music, which can be Star Wars, Harry Potter or even Hunger Games! The music is played by the spark heating the surrounding air (causing it to expand) then the spark turning off (causin ...more

How To : Build a Solar-Powered Mini-Synthesizer Wristwatch

There's nothing worse than when you come up with a brilliant idea while you're busy with other things and then promptly forget it. Whether it's the perfect ending for your novel or a comeback you should've said during that argument with your roommate last week, it's always ann ...more

How To : The Ultimate Guide to Hacking macOS

Apple's macOS operating system is just as vulnerable to attacks as any Windows 10 computer or Android smartphone. Hacker's can embed backdoors, evade antivirus with simple commands, and utilize USB flash drives to completely compromise a MacBook. In this always-updated guide, ...more

How To : The Top 80+ Websites Available in the Tor Network

There are nearly 100,000 unique onion service addresses online with over two million people using Tor every single day. Join me as I explore a small fraction of what the Tor network has to offer. It's puzzling to imagine about 100,000 .onion websites in existence. Readers who ...more

How To : Fake Captive Portal with an Android Phone

Have you ever used an open wifi, which after you connect displays a website to enter your credentials to get internet? That website is called captive portal and widely used in airports, hotels, universities etc. Have you ever wondered what would happen if someone would set up ...more

News : Android 8.0 'Octopus' Could Be a Complete Misdirect

The fourth and final beta version of Android O just made its debut, and the biggest change is what appears to be a new code name. When you access Android 8.0's version number Easter egg, you'll be greeted by ... a cartoon octopus. Octopus starts with the letter "O," and Googl ...more

How to Java : E5 (For Loops)

Sup? Today, we'll be learning about for loops in Java: What they are, how they work, and how to create them. Lets begin In Java, like many other programming languages, we have Loops, which are functions that repeat the statement(s) within their brackets until something withi ...more

How To : VIM, as Ugly as It Is Fast

Hello there Nullbyte users! This will be my first article here. Feel free to give feedback in the comments! Today I'll be introducing the UNIX text editor VIM. VIM is a text editor that is completely controlled from the keyboard. An experienced VIM user is A LOT faster than ...more

How To : Security-Oriented C Tutorial 0x0B - User Input

Hey readers! This tutorial will be the entry point for the introduction of buffer overflows. Something like requesting user input is a very common place for vulnerabilities to pop up and we will definitely have fun while trying to make programs crash. But for now, let's start ...more

How To : Fun with OSX Terminal

Disclaimer: All information in this tutorial is for entertainment and educational purposes ONLY. You pesky teenagers. In my previous tutorial, I covered how to make a backdoor in an OSX system. I also covered some fun commands to try whilst the backdoor connection is in tact. ...more

  • Hot
  • Latest