Incident

How To : Use a Polaris incident light meter

In this Fine Art video tutorial you will learn how to use a Polaris incident light meter. The meter has a power, mode, ISO control and a multi flash exposure buttons. On the side you have the up / down and the trigger buttons. Power on the light meter. Select the mode, say amb ...more

How to Hack Wi-Fi : Hunting Down & Cracking WEP Networks

While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and they can be cracked in a matter of minutes. We'll show y ...more

How To : Inject Coinhive Miners into Public Wi-Fi Hotspots

Coinhive, a JavaScript cryptocurrency miner, was reportedly discovered on the BlackBerry Mobile website. It was placed there by hackers who exploited a vulnerability in the site's e-commerce software that allowed them to anonymously mine cryptocurrency every time the website w ...more

How To : Track a Target Using Canary Token Tracking Links

Canary tokens are customizable tracking links useful for learning about who is clicking on a link and where it's being shared. Thanks to the way many apps fetch a URL preview for links shared in private chats, canary tokens can even phone home when someone checks a private cha ...more

How To : Block specific phone numbers from calling you

Privacy is important. Whether its a telemarketer or a crazy ex, sometimes you may need to block someone from contacting you. With this tutorial, learn how to get rid of those pesky callers. You Will Need • Internet access • Phone • Call-blocking service • Cell phone's owne ...more

How To : Why You Should Study to Be a Hacker

Welcome back, my budding hackers! People often ask me, "Why are you training hackers? Isn't that illegal?" Although I usually give them a short version of this post, there are MANY reasons why YOU should be studying hacking. Before I begin, I want to re-emphasize to all of y ...more

How To : Conduct Recon on a Web Target with Python Tools

Reconnaissance is one of the most important and often the most time consuming, part of planning an attack against a target. Thanks to a pair of recon tools coded in Python, it takes just seconds to research how a website or server might be vulnerable. No matter what platform ...more

How To : Use a light meter

Mark Wallace explains how to use a light meter, how it works (incident and reflective meters), and what type to purchase. Use this for still or motion cameras.

News : The Scariest LiDAR Vulnerability We've Seen Yet

A vulnerability in the design of LiDAR components in driverless cars is far worse than anything we've seen yet outside of the CAN bus sphere — with a potentially deadly consequence if exploited. The hack is also going to be hard to fix, researchers Hocheol Shin, Dohyun Kim, Y ...more

News : Why YOU Should Study Digital Forensics

As many of you know, I have been running a couple of series here on Null Byte about digital forensics called Digital Forensics for the Aspiring Hacker and Digital Forensics Using Kali. Although many readers have seemed to enjoy these series, just as many seem to be pondering, ...more

How To : Use a stripper deck for basic tricks

Following the Dalton incident, the stripper deck rapidly fell out of favor with poker cheats, but remains popular to this day with magicians. The deck looks perfectly normal but has tapered edges on all the cards. The goal of the magician in using a stripped deck is to have a ...more

How To : Write the Action Adventure Screenplay - Act one

Hey everybody, This feed is about the traditional three act structure when writing an action/adventure story or screenplay. Act I "The Setup" Act 1 is a great time to begin throwing out a lot of foreshadowing. For many films, once you watch a few times the same film over an ...more

How To : Make shutter shade sunglasses from duct tape

Okay, so the shutter shade trend sort of rode the wave of Kanye West's popularity after he wore it for his video for "Stronger," and then decreased in fan enthusiasm after the Taylor Swift music video incident (your ego is more than your "imaginary friend," Kanye). But, never ...more

News : A Human Has Caught the Bird Flu... From a Cat!

Cats give us so much—companionship, loyalty, love... and now the bird flu. Several weeks ago, a veterinarian from the Animal Care Centers of New York City's Manhattan shelter caught H7N2 from a sick cat. According to a press release from the NYC Health Department on December ...more

How To : Walkthrough the flash game Foreign Creature 2

In this video, you will be walked through the game Foreign Creature. There are human characters in this one, with word clouds, in an office setting with bulletin board, desks, rolling shelves, and tack boards. In another scene of the game, you will see a hospital setting with ...more

News : The Triangle Shirtwaist Fire

Their were many pedestrians in the scene as,they seen firefighters struggling with the horrifying disaster and they couldn't do much only continue to stare as bodies continued to drop.. Firefighters arrived at the Triangle Shirt Waist Company Fire minutes after the alarm was ...more

Prev Page
  • Hot
  • Latest