M S Dos

How To : Play Retro PC Games on Android with DosBox Turbo

If hearing the names of classic PC games like Commander Keen, Fallout, Master of Orion, and Wolfenstein 3D send you into a fit of nostalgia, then DosBox Turbo is the perfect app for your Android device. DosBox Turbo is a highly optimized and feature-enhanced Android port of D ...more

How to Hack Wi-Fi : DoSing a Wireless AP Continuously

Welcome back, my nascent hackers! In previous tutorials for my Wi-Fi Hacking series, I have shown you how to crack WEP and WPA2 passwords, break a WPS PIN, and create Evil Twin and Rogue access points. In this continuation of the series, let's look at slightly different appro ...more

News : The Best Places to Download PC Games Online

Digital distribution games are already firmly established on the PC, and they've infiltrated every present and next-gen console to some degree. Whether you like to play DOS, AAA, PC or indie games, there's a way to purchase most of them without leaving the comfort and warmth o ...more

How To : Use SecGen to Generate a Random Vulnerable Machine

Recently, I ran across SecGen, a project which allows a user to create random vulnerable machines. I absolutely love vulnerable machines, since a vulnerable VM is a safe and legal way to practice hacking tactics, test out new tools, and exercise your puzzle-solving skills. Wh ...more

How To : Install Windows XP from a DOS bootable flash drive

If you do not have a CD-Rom drive on your new computer, or it is broken, you can still install Windows XP. In this tutorial, learn how to go 'old school' and use MS DOS to install XP with a bootable flash drive. This video will show you how to access DOS on your computer and u ...more

How To : Install MS-DOS on a Modern Computer

For those needing to replace old controller hardware on cutting mills, those into native retro gaming, or for those who want to see what all the fuss was about in the 1980's, or for those who just want a play with old but great technology, this tutorial shows you step-by-step ...more

How To : Break down IP and TCP header with Wireshark

Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to break dow ...more

How To : Style a quick bohemian updo like Blake Lively

Only have a few minutes to get ready but want to look chic? No problem! Spend all the time you can on your makeup and clothing and do this super fast hairstyle to top it all off. This updo, inspired by Blake Lively's style on "Gossip Girl" is a very cute, stylish way to keep y ...more

How To : DoS Using SlowHTTPTest

Well Welcome Back My Fellow Hackers. What is Slowhttptest? You may be asking. Slowhttptest is a Application Layer Denial of Service attack aka an attack on HTTP. You can read more about it here and also download it if you don't have Kali Linux. slowhttptest - Application Laye ...more

How To : Things to Do on WonderHowTo (01/18 - 01/24)

WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. More amazing community contributions this w ...more

How To : Change drive letters or directories in DOS command

This video shows us how to change driving letters or directories in DOS command. Firstly go to start menu and then click on run. Then type cmd and press OK with which a DOS command cmd window will pop up. Now you need to change the directory and these is done by typing ‘cd..’ ...more

How To : Style curly hair up-dos

How to style a curly hair up-do; get professional tips and advice on methods, techniques, and products for doing your own hairstyling in this free beauty video series. Part 1 of 15 - How to Style curly hair up-dos. Style curly hair up-dos - Part 2 of 15. Click through to watch ...more

How To : Make a Dos-à-Dos Book from a Cardboard Box

This is a tutorial on making a dos-à-dos book by recycling a thin junk cardboard box (dos-à-dos means back-to-back). In the video, you'll see how a cardboard box that has four sides the same size will make a triple-book in one. To make a double-book, just take away one side. T ...more

How To : Style a Sexy Updo for Daytime

"Up-dos" can be sexy, chic, and perfect for daytime. In this video, our hair expert Eugene shows you how to create one in a just few simple steps. Mist hair Use a spray gel on damp hair on the root area. Example: Pantene Pro-V Root Lifter Spray gel Add texture Use the "mon ...more

How To : Install FreeDOS in Ubuntu Linux

The author show how to install FreeDos which is a free open source version of DOS. He shows how FreeDos is made up of many programs and how they are contributed by many people over the internet. He show how to install the DOS in a Virtual PC. He explains that all the old DOS p ...more

How To : Turn Your Boring To-Do List into a Real-Life RPG

When you think about it, isn't life just one big open-world RPG just begging to be conquered? We all have a set number of specific tasks or chores we must complete every single day like clockwork. Sometimes, these items on our to-do list can become tedious and cause us to lose ...more

How To : Set environment variables in Windows XP

This video shows you how to set environment variables in Windows XP. A lot of the older software written for windows requires the use of environment variables. There are variables set at the system level and programs that run in a DOS window or older programs can access these ...more

How To : Play "Entre dos Tierras" by Heroes del Silencio

Learn how to play the solo from Heroes del Silencio's "Entre dos Tierras" on guitar with this free guitar lesson. This video guide presents a complete, step-by-step breakdown of the solo. For more information, and to get started playing this solo on your own electric guitar, t ...more

How To : Configure BIG-IP ASM L7 for DoS protection

See how to enable Layer 7 DoS and brute-force protection within DoS within BIG-IP ASM. Whether you're new to F5 Networks' popular network appliance or are a seasoned network administrator just looking to better acquaint yourself with BIG-IP, you're sure to benefit from this fr ...more

How To : Make pizza dough from scratch

Instead of picking up a Digiorno pizza from Albertson's tonight, try doing something a little different for a change. As many a good cook knows, fresh always tastes better, enhancing the overall flavor of your dish (not to mention offering heftier amounts of nutrients). If yo ...more

How To : Knot a Hermès Scarf in 21 Different Ways

Hermès is all about giving out the free goodies—this week I posted a tutorial for making your own papercraft "Kelly bag" and for years now they've created "knotting cards", a set of DIY illustrations presenting different ways to wear their iconic scarves. Typically list headl ...more

Hack Like a Pro : Advanced Nmap for Reconnaissance

Welcome back, my novice hackers! Reconnaissance is one of the most important preparatory steps to hacking. As I have emphasized many times before here on Null Byte, you must know the operating system, the ports, the services, the applications, and sometimes even the language ...more

How To : Hack LAN passwords with Ettercap

Want to hack a LAN? Well, hacking local area networks is easier than you'd think. And by watching a few short videos, you can become a master hacker, something every techie wants to achieve. And what's the best way to hack a LAN? Ettercap, a password sniffing program. The pro ...more

UDP Flooding : How to Kick a Local User Off the Network

Only so much data can be passed through the network and to your computer's networking interfaces. This is limited by the amount of bandwidth you have. The more bandwidth you have, the faster your network connections will be. Not only this, but your transfers will be more paral ...more

How to Hack Databases : Hunting for Microsoft's SQL Server

Welcome back, my fledgling hackers! The database is the hacker's "pot-of-gold," as it contains information that is very valuable to both the business and the hacker. In this, the second of my series on hacking databases, we're on the "hunt" for Microsoft's SQL Server. Althoug ...more

How To : The Five Phases of Hacking

Five Phases of Hacking:- The five phases of Hacking are as follow: Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks The Five Phases of Hacking Reconnaissance:- This is the primary phase where the Hacker tries to collect as much information as possib ...more

How To : Score Big with Simple 2-Letter Words in Scrabble

No matter what word game you're playing, whether it's Scrabble or one of its near-homogeneous counterparts like Lexulous, Wordfeud or Words with Friends, one of the easiest ways to stay on top of your opponent is knowing all of the legal two-letter words you can play. You're n ...more

Prev Page
  • Hot
  • Latest