With the Samsung Galaxy Gear smartwatch only several weeks old, the extent as to what you can do with it is limited since there are only about 70 apps in the Gear Store right now, and a lot of those need the full app installed on your Samsung Galaxy Note 3 in order to function ...more
Silence can therapeutic at times, but unsettling at others. When I'm in bed at night, I need some sort of background or white noise to help me fall asleep. Pure silence just does not do it for me. Whether it's a fan oscillating left to right, or the TV playing, I need backgrou ...more
Just because you have a Mac doesn't mean you can't root your Nexus 7 tablet. In fact, rooting Android 4.4 KitKat on both the 2013 and original 2012 N7 models is easy, if not easier than rooting it using a Windows PC. After rooting, you can enjoy many of tomorrow's features to ...more
I have a personal rule when it comes to an app's interface: If it doesn't follow Android's design guidelines, it was probably written with Apple's iOS in mind first and foremost. And if that truly is the case, I almost take this as a personal insult. I'm not a second-class ci ...more
SharePlay is arguably one of the most significant features to hit FaceTime since group calls, and it's still hard to find apps that support shared experiences in FaceTime. Apple does list a few apps, but there is no official index of all the apps with SharePlay integration. Th ...more
How to use Teflon tape for plumbing applications. I know it sounds simple but there are a few tricks to applying the Teflon tape. Teflon tape is also known as PTFE Tape. In the perfect world, a tap or pipe fitting when correctly fitted should not leak. However we don't live i ...more
If you've ever had teeth removed/minor surgery, you most likely received some laughing gas, or nitrous oxide. This gas creates a happy, lightened feeling, and causes instant laughter. In this article, I'll show you how to make some. BUT BE CAREFUL!!! DO NOT proceed in this exp ...more
This video reveals to us about the secret of ink cartridges. It is a very common problem faced by those people with ink printers that run out of ink, but this video shows us that even though it signals that we are running out of ink, do not throw the ink cartridge into the was ...more
Video chatting has become an important factor in the overall smartphone experience. Even just a few years ago, 37% of teens were making video calls on a regular basis, and that number has surely grown. 85% of households with infants have used video chat apps to call relatives ...more
Have you ever used an open wifi, which after you connect displays a website to enter your credentials to get internet? That website is called captive portal and widely used in airports, hotels, universities etc. Have you ever wondered what would happen if someone would set up ...more
Just installed the new iOS 5 on your iPad, iPhone or iPod touch? There's a lot of great features to check out and play around with. After messing around with it on my iPhone 4 for a few minutes, these seven additions caught my attention. Check them out below—and tell us what y ...more
Whether it's for health reasons or just to look better, many of us want to get in shape. It's a long process that starts with nutrition, and dieting is never easy. Fortunately, there are some great food-tracking apps that will make it a lot easier to become a healthier version ...more
Siri can perform many actions for you on your iPhone, such as sending messages, providing information, getting directions, looking up a contact, and playing music. Still, there are even more important Siri voice commands that every iPhone owner should know — even the ones who ...more
When you're stuck working or learning from home, video meetings can help you stay connected to employers, coworkers, schools, students, and more. And Zoom is the hottest video conferencing service at the moment. While Zoom is easy to use, it does have a fair share of sketchy f ...more
Many online users worry about their accounts being breached by some master hacker, but the more likely scenario is falling victim to a bot written to use leaked passwords in data breaches from companies like LinkedIn, MySpace, and Tumblr. For instance, a tool called H8mail can ...more
If there's an iOS app you want to hide from your iPhone's home screen, there are a few built-in ways to do so in iOS 14, but there is a clever workaround you can use in older iOS versions. Plus, it also works in iOS 14 as a way to disguise app icons instead of just hiding them ...more
Apple's macOS operating system is just as vulnerable to attacks as any Windows 10 computer or Android smartphone. Hacker's can embed backdoors, evade antivirus with simple commands, and utilize USB flash drives to completely compromise a MacBook. In this always-updated guide, ...more
For a moment, picture a situation where you want to host some files or images, but you do not want it traced back to you. Perhaps you're working on a project with others and need secure data storage. Anonymity is the new shield of the 21st century—and you best protect yourself ...more
Texting has become the king of communication—gone are the days where everyone called each other. These days, it's down-right weird when someone calls first. Whether it be on a phone or on a computer, SMS and MMS messages are the most common way people keep in contact, so why n ...more
The fine folks at ITS Tactical made this detailed tutorial on how to make a two-piece lock pick set out of only a few paper clips and using only a multi-tool in the construction. The host begins by demonstrating how to construct the pick, then how to use it on a real lock. It ...more
Nearly two years ago, Peter Chou, CEO of HTC, confirmed that the company would no longer be locking bootloaders. Whether or not they've actually lived up to this claim is debatable. Any phone bought from a wireless carrier comes locked. Only the new HTC One Developer Edition s ...more
Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more
When you set an alarm on your iPhone, you assume it'll go off at the set time. However, that's not always the case. There's one quirk in how iOS handles alarms that, if gone unchecked, will silence every alarm you set so that you won't wake up on time. The issue happens becau ...more
Foodborne infections often occur through the contamination of equipment, food-prep tools, and unsanitary surfaces. A recent report from the Centers for Disease Control and Prevention (CDC) reminds us that breast pump parts are part of the food-delivery chain — and they can bec ...more
Google's new Inbox by Gmail service offers a new take on email with a particular emphasis on productivity. But, as an invite-only service at this stage, not many people can access Inbox just yet. While users who have been lucky enough to receive an invite to the service will ...more
The new Google Assistant is only officially available on three platforms—newer Android phones (Pixels and those running Marshmallow and Nougat), the Google Allo app, and Google Home. However, most of the Assistant's basic functionality is also bundled into the Google app for A ...more
Google Play Services has been near the top of every Android user's list of battery-sucking apps for years now. It's a core system app, so you'd expect some battery drain, but for many folks, it runs rampant. This is partly due to the fact that Google has exempted Play Service ...more
The other day I was doing the math on roughly how many eggs I eat each year. I estimated about 500. That's a lot of eggs. And, subsequently, that's a lot of eggshells to throw in the trash. I felt weird realizing that I trash about 500 eggshells a year. And it wasn't the envi ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Well this is it folks, the final Pre-Release before Minecraft officially launches! These changes should be the final game changes until it releases in Vegas this Friday. Mojang has ...more
Let's face it — our phones are our heart and soul. We do everything on them, from banking to media consumption. However, sometimes we download apps that we don't want others to see. Sometimes, we wish to hide apps so that, in the rare times we lend our phone to someone, we don ...more
Due to weaknesses in the way Wi-Fi works, it's extremely easy to disrupt most Wi-Fi networks using tools that forge deauthentication packets. The ease with which these common tools can jam networks is only matched by how simple they are to detect for anyone listening for them. ...more
The internet is constantly under siege by bots searching for vulnerabilities to attack and exploit. While conventional wisdom is to prevent these attacks, there are ways to deliberately lure hackers into a trap in order to spy on them, study their behavior, and capture samples ...more
Windows 10 is due to be released on July 29th, and the majority of existing Windows users should be eligible to upgrade to the newer version for free. But there's been a lot of confusion about which older versions of Windows will be eligible for the free update, and some unce ...more
Google recently updated the camera software for the Nexus 5, and in doing so, made the app available to all devices running Android KitKat. This means that not only do we get a nice new camera interface on our phones, but we also get the benefit of an expanded development comm ...more
The next time you suffer a cut or abrasion, think twice before you reach for the Neosporin. It's time, and mom, tested — you get a cut, you wash it carefully, then apply some triple-threat antimicrobial ointment. You may or may not slap on a band-aid. We won't cover it here, ...more
When you are in Rome, do as the Romans do... avoid carrying your wallet in the back pocket of your jeans. But no matter what city or country you are in, there are several easy precautions you can take to keep yourself as pickpocket-proof as possible so that your amazing travel ...more
Open-source intelligence researchers and hackers alike love social media for reconnaissance. Websites like Twitter offer vast, searchable databases updated in real time by millions of users, but it can be incredibly time-consuming to sift through manually. Thankfully, tools li ...more
Welcome to Minecraft World! Check out our tutorials, post to the community corkboard, and come play on our free server! Functioning bathrooms seem like a stretch in Minecraft, but with redstone, they're not that far out of reach! This past workshop focused on creating a fully ...more
With over a million apps available in the App Store, you'd think that Apple would have come up with a better way to organize them on your iPhone. Sure, you can create folders in iOS 7 to organize your apps better, but the folders only display 9 apps at a time, with a seemingl ...more
This is a short explanation and tutorial on how to grab saved passwords from Google Chrome, ideally from a meterpreter session. The idea behind this is to understand how saved passwords work and how to keep them safe. Let's have some fun :D Understanding Google Chrome Saved Pa ...more
Passng Technique: The instep pass is the most common way and the most efficient to pass a ball in soccer. It requires the use of your inside foot. Passing a ball is similar to shooting. It requires you to have your plant foot a foot away from the ball. Bend your standing leg, ...more
As you get barbecuing this summer, you're likely to encounter a few grills that aren't exactly the cleanest. At parks or campgrounds and even on your friends' grills (or, um, your own), no one wants to place food on gunked-up grill grates. The leftover mess from previous barb ...more
| Updated Aug. 22, 2019 with new phones. When will my phone get Android Pie? For the first time since Android's inception, this question shouldn't have an answer that lets you down. That's because Android Oreo introduced Project Treble, a new low-level arrangement that makes ...more
I mentioned in one of my earlier articles something about ghost hackers, and very shortly stated a thing or two of what they do. Sit back because this is a very long article Now I want to tell you how to become one. What Is a Ghost Hacker? First you need to understand who t ...more
Hold crochet hook with dominate hand, needle facing toward you, hold dreadlock with left hand. In a spot with numerous loose hairs poke needle through dreadlock to other side. Grab loose hairs with needle and pull them through the dreadlock (use hands to keep loose hairs on ho ...more
There's a lot of personal information residing on your phone, possibly even more than on your computer, so it's only a matter of time before someone tries to access it. The perp can be anything from a paranoid significant other to a malicious identity thief. Personally, I'm m ...more
Thanks to its intuitive interface that makes sending and receiving money a breeze, Venmo has become the go-to app for millions in the US. In fact, you've probably heard the term "Venmo you" being tossed around between friends. But before you take the plunge and sign up, it's a ...more
Hello readers, and welcome to Null Byte. Before we start, for those of you who may not know me, my name is ghost_; I'm a relatively active member of our community and have been around for a while. During my time here, I've seen our community cultivate into the brilliant one ...more
Web application vulnerabilities are one of the most crucial points of consideration in any penetration test or security evaluation. While some security areas require a home network or computer for testing, creating a test website to learn web app security requires a slightly d ...more
Ah, the Nokia Lumia series... what can be said about Microsoft's recently-deceased line of smartphones? They might not have been the best, but they certainly weren't the worst, and they did get the job done in terms of what you would expect from a smartphone. The Windows-powe ...more
After months of waiting, the iPhone 11 is here. At an event in Cupertino, Apple unveiled the iPhone 11, 11 Pro and 11 Pro max. You probably have a lot of questions after reviewing the specs sheet, including wanting to know more about the IP68 rating that all three phones have. ...more
So, you've lost your Apple TV remote. Maybe it's busted. What are you supposed to do now? You could go out and buy a new one, but they're expensive if you have a newer Apple TV with a Siri Remote, and wouldn't you rather spend that money on a movie? You might be without a work ...more
In this video the instructor shows how to find out the fourth roots of a number. The properties of fourth root says that for any positive number of a, its fourth roots are real. And for any negative value a, its fourth roots are not real. So split the number inside the fourth ...more
Defcon is the largest hacker conference with something for everyone, whether it be the talks, parties, villages, or any of the hundreds of events. In this guide, we'll take a holistic view at everything that goes into attending the con for the first time, from securing your el ...more
A few long-awaited iOS 11 features that Apple had promised way back in June 2017 have finally made their way to iPhones with the iOS 11.4 update. Aside from finally delivering on those, there's not a whole lot new in iOS 11.4 as a whole, though, there are a few things you'll d ...more
Your iPhone just went missing, and now you're panicking. You need it for work, to get around, to contact your friends and family, and pretty much everything else in your life. So, what are the chances you might get it back? The odds may be stacked against you unless it's just ...more
Someone does't really like you. I don't know who or where they are, but they exist. If you want to change that, simply ask them to do you a favor. This trick is known as the "Benjamin Franklin Effect." The idea is that when someone who views you unfavorably performs a favor f ...more
Conducting phishing campaigns and hosting Metasploit sessions from a trusted VPS is important to any professional security researcher, pentester, or white hat hacker. However, the options are quite limited since most providers have zero-tolerance policies for any kind of hacki ...more
The new iPhone XS and XS Max have more issues than just their hefty price tags. Customers have only had the phones for a handful of days, but some are already complaining of cellular and Wi-Fi connectivity issues on both models. If your experience is the same on your XS or XS ...more
Want a tattoo that's daytime work-safe (invisible), but nighttime party-friendly (UV blacklight)? At first sight it may be hard to believe these tattoos are real, but in fact, they are. UV light tattoos are the perfect way to hide it from mom. The tattoos can be completely in ...more