Make a Rose Part Two

News : Here's What the 2018 LCD iPhone Could Cost

This year will be an interesting one for iPhones. With speculation that the expensive iPhone X is underperforming, rumors have circulated that Apple will release three "bezel-less" devices, one of which will cost less by omitting the OLED panel for a traditional, yet large, 6. ...more

How To : Track ADS-B Equipped Aircraft on Your Smartphone

Flight disruptions can cost billions of dollars, but most modern commercial flights rely on air traffic control systems that harbor serious vulnerabilities. The Federal Aviation Administration uses an infrastructure called NextGen, which relies on Automatic Dependent Surveilla ...more

Apple AR : Watch This Phone Levitate Before Your Eyes

Sometimes the demos for Apple's ARKit are so good that it almost looks like magic. A recent demo, in particular, shows exactly what kind of magic tricks you can perform using the ARKit. The demo was posted by @LaanLabs on Twitter. Laan Labs creates apps and are known for thei ...more

News : DIY 3D-Printed Arduino Robot

This is a nice project that you can continue to work on and modify as you learn more Arduino projects. The Instructable linked below goes through the complete build for the Bluetooth-enabled robot seen in the first half of the video. As long as you have a 3D printer, this pro ...more

How To : Save Time & Money with These One-Pot Meals All Week

Dinner is meant to be enjoyed after a long day away from home—it shouldn't cause stress or fuss. But for many, that's exactly what a home-cooked meal represents, especially on a work night. The prep work, the steps involved in following the recipe, the numerous amount of bowls ...more

News : Inside Bitcoin - Part 2 - Cryptographic Hashes

If you haven't read the last article, feel free to stop by and give it a read, but abstaining from reading it will not, for the most part, be detrimental to your understanding. Today we are going to explore some of the inner workings of Bitcoin. As we previously learned in th ...more

How To : Perl for the Aspiring Hacker - Part 1 - Variables

Before I start a series on remote exploitation, I think we should learn the basics of Perl. Perl, Ruby, C, C++, Cython and more are languages that some penetration testers just need to learn. Perl is a great language for multiple things, sadly, like many other scripting langua ...more

How To : Make a Fully Undetected Backdoored Program

You always wanted to make an undetected payload and make it look legit, Well this is what this tutorial is about, You're going to learn how to backdoor any (Unfortunately only 32-Bit) software, Let's get into it Step 1: Download Shellter First of all, Head to Shellter downlo ...more

How To : Create Multiple Desktops in Windows 10

Linux and Mac users have long enjoyed the use of multiple virtual desktops to free up clutter on their home screen and keep individual workflow environments separated, but Windows users have always been stuck with one solitary desktop. That's finally changing with Windows 10, ...more

How To : Open a Hershey's Kiss the Right Way

In this video and food hack tutorial, you will learn how to open a Hershey's Kiss The Right Way . The correct way to open Hershey's kisses is probably not what you think. Video: . Step 1: Hold the Tag The first thing that you want to do is find yourself a Hershey's Kiss and h ...more

How To : Networking Basics for the Aspiring Hacker

Hi there, nullbytes! I've been recently using NullByte as my only source of learning (almost) and it has proven to be really good to me. I've compiled some of the articles about networking, and ordered them in a way that made sense to me, and I thought about sharing the list ...more

  • Hot
  • Latest