JavaScript is one of the main programming languages that the Web is built on. It talks directly to your browser and exchanges information with it in ways that HTML simply cannot. With JavaScript, you are able to access browser cookies, website preferences, real-time actions, s ...more
Once you've started a WordPress blog, it gives you your very first blog post, which says "Hello World". In this video, Cindy will walk you through how to change this very first post into an original work of your own. Make your very first splash onto the online world of blogging!
Hello! My name is Nicole Valentine and on behalf of Expert Village, I'm here to talk to you about how to coordinate birthday games for a birthday party. Now we're going to discuss the game can you read my mind. This game has a little bit of mystery flavor to it. You'll see wha ...more
Hello, my name is Nicole Valentine and on behalf of Expert Village, I'm here to talk to you about how to coordinate birthday games for a birthday party. We're going to now talk about how to play the game think fast. This is a very simple game. Just use a ball that you have at ...more
Hello, my name is Nicole Valentine and on behalf of Expert Village, I'm here to talk to you about how to coordinate birthday games for a birthday party. Now we're going to talk about group competition games. These make the party worth while. For example; if you have let's say ...more
Hello, my name is Nicole Valentine and on behalf of Expert Village, I'm here to talk to you about how to coordinate birthday games for a birthday party. Now let's talk about another group competition game. This game is known as stack the chair. You can easily get this at one o ...more
Hello, my name is Nicole Valentine and on behalf of Expert Village, I'm here to talk to you about how to coordinate birthday games for a birthday party. Now let's talk about another group activity game. Competition game that is. If you have let's say maybe 20 people in your gu ...more
Hello, my name is Nicole Valentine and on behalf of Expert Village, I'm here to talk to you about how to coordinate birthday games for a birthday party. Now we're going to discuss another birthday game and this one also happens to be an oldie but goodie. And this game is calle ...more
Hello, my name is Nicole Valentine and on behalf of Expert Village, I'm here to talk to you about how to coordinate birthday games for a birthday party. Now let's talk about this next game that you can use with 2 to 100 kids, this game is called Oops Johnny. The facilitator in ...more
Hello, my name is Nicole Valentine and on behalf of Expert Village, I'm here to talk to you about how to coordinate birthday games for a birthday party. Now let's talk about another common game that you can use at a birthday party. And you may recall this game from youth. Pape ...more
Hello everyone, In this video I will be going over what in my opinion are the top 10 bukkit plugins to make a great minecraft server. First thing I would like to state is that Essentials or commandbook was not featured in the video because I didn't want to feature something th ...more
Hello readers, My name is Ryan and I am a movie freak, fanatic, addict, or whatever you want to call it. Get it? Got it? Good. Well anyway I'm going to try to write some movie reviews and we'll just have to see if anyone else agrees or disagrees. Movie review number one will ...more
Just like a garage, basements can become areas where you're saying hello cold air, good-bye money! This is because when cold air fills a basement, the floor above it becomes cold and can actually lower the tempature in that room. To avoid this, you need to install proper insul ...more
Are Twitter and Facebook in trouble with the advent of Google's brand new social networking tool, Google Buzz? Financial Times reports, "The company says it is trying to reduce the 'noise' in social networking and make status updates, tweets and media streams easier to sort ...more
A facial massage can rejuvenate and soothe. Make sure your hands are clean to begin with. A lot of people don't like oil, having oil in their hands and putting it on their face, or they might be allergic to it or sensitive. So have a nice clean set of hands and starting with j ...more
Giveaway Tuesdays has officially ended! But don't sweat it, WonderHowTo has another World that's taken its place. Every Tuesday, Phone Snap! invites you to show off your cell phone photography skills. Submit your best shot to our weekly competition for a chance to win an awes ...more
Hello and welcome to yet another InfoSecurity World tutorial. This post is based on the Windows 7 'GodMode' panel. Windows 7 comes with many hacks, cheats and tweaks. This bonus lesson will teach you how to create Windows 7 GodMode. GodMode works a lot like the Windows Contro ...more
A cartoony, "Trials HD"-type game being released today. It's multiplayer so you can take on people at home or online. Looks like a lot of fun. You can also create your own levels. Here is an excerpt from the Game Informer review: It’s a rare feat. Building a game that enterta ...more
So you want to learn the basics of the fantastic language Java, but you don't want to search the Inter-webs looking for a great tutorial. Well you came to the right place, now may I present to you JAVA. Before We Begin You must have the latest version of Java Development Kit ...more
TCP/IP Client / Server Application Hello! Today's blog post will be about coding a very rudimentary Client and Server application duo, which will communicate by using TCP Sockets. It is, as illustrated, in principle, just two cans and a string that ties them together. The se ...more
This Null Byte is the first part in a mini-series on the art of Social Engineering. I will be teaching you how to effectively defend yourself against it. What is Social Engineering? Social Engineering is the art of hacking humans. It's when a person is manipulated into doing ...more
In general, hacking and information security is not just one discipline, but a number of them, and today we will look into some of the networking concepts. In the last Hacker Fundamentals, we talked about the OSI model as well as a little on TCP/IP and the protocols that make ...more
Industrial espionage, social engineering and no-tech hacking are all very real and there are simple precautions that you can take to protect yourself, which this article will discuss. Whether you are a high-profile businessman or a housewife (or husband), keeping information y ...more
WELCOME & THANKzZz For Your Contribution, Support And Time...! ...Hello, zZz~AKA~StanDP Here...; There are many ways to tweak, change, enhance your internet experience to suite your needs, I will discuss a few things I did to enhance my online experience along with Fire-Fox ...more
Hello everyone and welcome to Part II - The Ultimate Guide: Diagnosing & Fixing Connection Issues. In this tutorial we will discuss more advanced methods that I took in order to fix our home network. I have also attached a link to download the FREE eBook - so feel free to down ...more
ClariTrans is a requester on MTurk (www.mturk.com) they pay very well for transcribing short snippets of audio. Here is how you can transcribe their audio snippets properly to ensure your text will be approved and you will be paid: ClariTrans Transcription Formatting Guide S ...more
To create an elegant WordPress blog or website from scratch without being noticed that you're a complete beginner, you need that drive and pairs of eyes and ears. It may seem difficult at first but it can truly be fun and exciting. In order for you to have a long lasting blog ...more
Update This issue has been resolved Animals and building materials have been returned! If you did not get something back that you had bought for farm cash, CONTACT SUPPORT! After the fix, I still hadn't gotten everything back so I contacted support again yesterday, and got ...more
The developer community has already made some incredibly quick progress on implementing assemblers, interpreters, and emulators for the proposed virtual computer in 0x10c, Notch's latest game. But the truth is that the majority of programmers out there couldn't be bothered wit ...more
Finally! Gardening! Many have been waiting for ages for this invention to come true, and now it has! Come experience it for yourselves in the Test Realm (instructions on getting there will be added)! When you enter, go the Moolinda Wu and she will teach you how to start garden ...more
Hello! I just want to start off by saying that I absolutely love JACKASS Ive been a fan since the first time I saw the Show on TV, When I was a kid and loved it ever since. Anything you guys have done I have seen it and I mean it all From Jackass,CkY,VivaLaBam to Wildboyz you ...more
Charlie Miller and Chris Valasek conducted an experiment earlier this month that ended up with a Jeep in a ditch, although the driver didn't drive it there. The two remotely hijacked the car, controlling it through a laptop and a cell phone. FCA says vehicles from the 2013 and ...more
hello hackers,newbies and followers of this great community, after some research here in our community, I noticed that there is not even one tutorial that teach Web Development. We have a lot of tutorials on how to hack web site but many do not know exactly how a web site is c ...more
Welcome back, my future hackers! After my first tutorial about doxing, I decided I would dive a little bit deeper into the world of social engineering. In this tutorial we will learn some basic social engineering techniques to get into a company building, find out more informa ...more
Hello all. It's time for level 6 all, password encrypting. Step 1: Looking for ASCII Table First you have know what is ASCII here's a link for you buddies http://www.asciitable.com/ Step 2: Go for the Level 6 As you see here there are 2 input boxes the first checks for you ...more
Hackers often rely on lazy system admins and unpatched vulnerabilities to get access to a host. Keeping intruders off of our machines requires us to update daily, only run the services we need, and read the code, among other things, but we can still make mistakes. Luckily for ...more
The HoloToolkit offers a great many, simple ways to add what seems like extremely complex features of the HoloLens, but it can be a bit tricky if you're new to Windows Holographic. So this will be the first in an ongoing series designed to help new developers understand what e ...more
Welcome back! In the last training session we covered how to write and execute scripts. But today we'll be getting back to the code! Today we'll be covering something that is extremely important for building real-life applicable scripts, file input and output. When I say "... ...more
In python, or any scripting language for that matter, there are certain things that you will carry with you throughout your entire scripting career. Some of the most basic things that you will keep with you are output, variables, and their value types. We'll start by going ove ...more
In the first part of my containers series, we learned how to install Docker on our local machine, pull down "hello-world" and Ubuntu containers, SSH into containers, and install software when in a container. Now, we're going to work on building, customizing, and storing our re ...more
Hello fellows nullbyters, first of i will start saying that im addicted to this community, i feel the challenge growing up so fast, all the newbies, amateurs,advanced and professionals hackers around trying their best to help the community, badly but we got some script-kids to ...more
Hello y'all! I apologize if this question has been solved somewhere else, but I have looked around on Google, Yahoo, and Null Byte and have not been able to find any working solutions. I've been trying to set up my first ever virtualbox guest (Kali Linux 2.0), but I'm having ...more
Hello there learners and readers! I figured I'd show you guys my problem and how I solved it, hoping that it would help people who are facing the same issue. Today, we'll be talking about the solution of read failed: Network is down ioctl(SIOCSIFFLAGS) failed: Operation not ...more
Hello my anxious hackers, the week has started and here we begin a new series that I think will help many here and not only, for those that have the opportunity to follow our tutorials but they are not yet part of the community. Don't be a script-kid? what do you mean? In pro ...more
When your day sucks, all you want is a tall, ice-cold glass of beer at the end of it all. Nothing complicated about having some booze to temporarily drown your sorrows. But sometimes you get stuck with crappy beer (hey-o, Keystone Ice!), and it feels like the world is out to ...more
Hello Intro Today its another installment of my series which is something many of you enjoy, so here is part 4. Provide False Information: Many things fall into place when one has to successfully become a ghost hacker, and one of the key things is what you're telling peopl ...more
Hello, this is my first post on Null-Byte. This is made for those who have an interest in writing into another processes memory. Why would you want to do this? Who knows, personally I just wanted to mess around with games on my computer(have unlimited health). In this tutoria ...more
Hello you sexy, savage, surreptitiously tech-savvy penetrators (Pun intended)! Today I'm going to show you two really quick tricks that allows you to find someones saved passwords on their browser. To use these tricks you must have access to their browser, which means you are ...more
Cruise Automation, General Motors' (GM) driverless car arm, has hired two hackers who were once seen by many as a safety threat to help find vulnerabilities in its self-drive car network. Cruise CEO Kyle Vogt confirmed the hires of security consultants Charlie Miller and Chri ...more
I'm sure I'm not the only one on here that has googled "Why am I always tired?"... and I'm definitely not alone when I say that all of the advice I've found so far is useless: Go to bed early. (Wow, you think?) Don't skip meals. (Real talk: if I skip meals, it's under extreme ...more
Hello Guys, Today I have made a script for ddosing sites with VBScript! And I don't know how you guys do it, but I've made a script that refreshes the page in a chosen amout of milliseconds. And if you want it a number of times or if you want it to go on and on. And this is a ...more
Hello ladies and gentlemen, welcome back to the Part 2 of our UDP & Wireshark adventure as I promised. Last time we discussed about what DNS is and how it uses UDP as its transport protocol but we left some unexplained parts behind and I'm about to investigate those with you. ...more
Hello there Nullbytes, In my previous tutorial found here, http://null-byte.wonderhowto.com/how-to/vim-as-ugly-as-is-fast-0168012/, I wrote about using normal mode. Today we will go trough the basics of using the Normal Mode. The things we will be discussing: Making VIM mor ...more
Hello Strangers, This is my first article for null-byte and its about staying anonymous on the Internet. But the question is why would you want to stay anonymous online? May be you are an vigilante hacker like me? or You don't want companies logging your Data (Also like me ...more
Hello there, reader! If you've clicked on this How-to then it means you are interested in learning some C programming or just generally curious about what this page has to offer. And so I welcome you warmly to the first of many C tutorials! Introduction First of all, let me ...more
Hello, fellow hackers. I'm sure we've all seen it somewhere: the undying question of "How do I hack the game so-and-so?" And the answer usually is, "Come back when you actually know how to hack!" But how does one even go about "hacking" a game? What could that even mean? Wha ...more
Hello and Welcome back to another How-To on the Xbox Community Ambassadors World! In this How-To, I am going to tell you and kinda show you how to deal with or avoid angry Xbox Customers. Reminder! This world and how-to are not provided by Xbox Staff, but a fellow Xbox Commun ...more
What would you say if I told you it was entirely possible—even desirable—to cook anything from a simple dinner to a great loaf of bread without using measuring cups, spoons, or a scale? "Lies," I can hear you say, "Cheap internet lies!" But it's true. Experienced cooks are a ...more
Poison ivy, poison oak, and the lesser known skin irritator, poison sumac, can all cause a conundrum in the search of itch relief: to scratch or not to scratch. Fortunately, there are a number of home remedies one can try to help alleviate the itch(ing), with many like coffee, ...more
Ever drive a friend's car? Maybe a rental? Then you've probably found yourself in a very frustrating situation when you realize you need some gas. Heck, it probably even happens to you in your own car sometimes. What side is the gas tank on?!? Before pulling into the station ...more