Only so much data can be passed through the network and to your computer's networking interfaces. This is limited by the amount of bandwidth you have. The more bandwidth you have, the faster your network connections will be. Not only this, but your transfers will be more paral ...more
Not every app is designed well. With nearly 3 million apps on the Play Store and countless more that you can sideload from other sources, there are bound to be a few stinkers. And many of them do a terrible job using RAM. Poor memory management by apps hurts everyone. Whether ...more
Welcome back, my greenhorn hackers! Lately, much of the discussion here on Null Byte has revolved around evading detection and not getting caught hacking. Several of you have written me asking for a series on evading detection and forensics, and while I began a series 5 month ...more
I was in college, and my 15-inch Sony Vaio laptop was my prized possession. It was my first PC and probably the most important thing I brought with me to my dorm — it was both how I completed my assignments and my primary source of entertainment. How could it turn its back on ...more
Warnings Be careful giving Memory to Java, I recommend leaving at least 2gb to your computer for the operating system and any background processes. This can result in Ram getting overloaded and PC crashes Video By TechHutus (me). How To Allocate More RAM to Java Alright so i ...more
In case you didn't catch the big event in Cupertino, Apple just unveiled two of the most cutting-edge phones ever made — the iPhone 8 and the iPhone X. Out of the many glorious specs that were rattled off on stage, one stands out for being just a little confusing: Both models ...more
Welcome back, my hacker novitiates! Eluding and evading antivirus software and intrusion detection systems is one of the most critical tasks of the hacker. As soon as a new exploit is developed and discovered, the AV and IDS developers build a signature for the attack, which ...more
Although the Clock app in iOS has undergone some design changes over the years, you still can't set more than one timer on your iPhone. Oddly enough, Apple's own HomePod speaker added this feature, mimicking the timer on Amazon's popular Echo smart speakers. Fortunately, throu ...more
If you need to hack an Android device, try a remote administration tool. Known more familiarly as a RAT, there are open-source RATs that are barebones and exorbitantly priced RATs that are more polished. There are also low-cost and polished RATs that aren't intended to be RATs ...more
Welcome back, my novice hackers! This is the third installment of my Python scripting series. If you haven't read the previous two articles, take some time now to go back and read Part 1 and Part 2 before you proceed here. As I mentioned in previous tutorials, Python is prob ...more
Whenever a friend borrows my Samsung Galaxy S3 to browse the web or make a quick call, I always pause to make sure there's nothing incriminating on it. I'm no superfreak, but some of my friends are, so I have more than a few photos on my device that I wouldn't wish upon anyone ...more
If you ever want to go beyond the basics on your Android phone, unlocking the hidden "Developer options" menu is the first thing you should try out. With it unlocked, you can change the way parts of stock Android looks, enable ADB connectivity with your computer, add visual re ...more
The Raspberry Pi Zero W and Pi 3 Model B+ include integrated Wi-Fi, Bluetooth Low Energy, and more than enough power to run Kali Linux. They sound like perfect all-in-one penetration testing devices, but the lack of support for monitor mode and packet injection usually meant b ...more
Let's say you wake up in the middle of the night and check your phone to see the time. As soon as you do, you're greeted by a wall of notifications on your lock screen. You just wanted to know how much longer you could sleep, but now your mind's racing after seeing all of the ...more
This video will show you how to send text SMS from Gmail account. Your mobile number has to register with your Gmail account. The receiver could also respond to your SMS. Watch the video and employ the technique. Video: .
Performance boosters generally get a bad rap, but that doesn't mean they should all be dismissed—particularly when they're as well thought out as the latest work from developer Danijel Markov. After recognizing a few inefficiencies in the way Android handles memory management ...more
When i went to class today, a good friend asked me a question. He wanted to know what the best hacking software was to basically do everything. What i told him was this: Well there isn't an "Ultimate" tool boot there are a number of tools which deserve a "Medal." So what i'm t ...more
Okay, so you're rooted and need to return your Nexus 5 to its stock firmware. Whether it's because you need to send your phone in to the manufacturer to fix a defect or you just want to use the device's over-the-air updating feature, unrooting and returning your Nexus 5 back t ...more
As pentesters and hackers, we're going to be working with text frequently — wordlists, configuration files, etc. A lot of this we'll be doing on our machine, where we have access to whatever editor we prefer. The rest of it will be on remote machines, where the tools for editi ...more
Welcome back, my greenhorn hackers! One of the most important issues any hacker must address is how to get past security devices and remain undetected. These can include antivirus software, intrusion detection systems, firewalls, web application firewalls, and numerous others ...more
This episode of Full Disclosure demonstrates how to hack/crack MD5 password hashes. MD5 (Message-Digest algorithm 5) is a hash function commonly used by websites to encrypt passwords. MD5 is a one-way hash; therefore, to crack the password you most try every possible dictionar ...more
One of the best things about iOS 7 is the Control Center, which gives you quick access from anywhere on your iPhone to turning on or off Airplane Mode, Wi-Fi, Bluetooth, and more. It also makes it very easy to adjust the brightness of your display, and gives app shortcuts for ...more
In the tech world, it's all too common to slap a fake label and packaging on a lower quality product, especially SD cards. If you've ever bought an SD card on the cheap from a slightly-less-than-reputable source (or even a reputable source, in some cases), how do you know if i ...more
Brute-forcing is an easy way of discovering weak login credentials and is often one of the first steps when a hacker finds network services running on a network they gain access to. For beginners and experienced hackers alike, it's useful to have access to the right tools to d ...more
Not all smartphone chargers put out the same amount of current. The adapter in your car probably charges your phone a lot slower than the one plugged in at your bedside, and if you use wireless charging, it may be a bit slower still. Even considering the variance in listed am ...more
As informative as they can be, the new app icon badges and unread counts on the Galaxy S9's home screen are a little redundant since Android already has a notification center. If you'd rather not have these little dots overlaid on your home screen icons, there's an easy way to ...more
Learn how to play straight gin. Grab a friend, pull out a deck of cards, and get comfortable. Straight Gin is easy to learn. You Will Need * A deck of cards * Two players * A table and chairs * And pens and paper Step 1. Draw for dealer Remove the jokers and shuffle the de ...more
Samsung Health has become one of the most comprehensive wellness apps thanks to features that cover everything from step counting to nutrition logging and symptom diagnosis. But because the app has so much to offer, it can be easy to overlook some smaller, but useful features. ...more
When attempting to compromise a target, we want as much control as possible over the victim. Metasploit's meterpreter allows us to have immense control over the victim, the only issue is that sometimes we can't land a meterpreter. We may only be able to land a standard shell, ...more
In November 2016, the RCS Universal Profile (Rich Communications Services) was introduced. The technology takes text messaging to the 21st century, emulating many of the features found in IM apps like WhatsApp and iMessage, but working through your phone number like regular SM ...more
In five short years, three generations of ultra-low-cost Raspberry Pi devices have challenged the boundaries of what a person can do with a $35 computer — especially with Kali Linux. With each Pi more powerful and cheaper than the last, the addition of the Pi Zero in 2015 too ...more
Hello guys, I recently made a how to about whatsapp but the problem with that script is that it is way to long and you need to copy and paste it so many times so I made a new one that works just fine and is more easy to use lets get into it (Here Is How The Code Supposed To Lo ...more
Getting root is considered the Holy Grail in the world of Linux exploitation. Much like SYSTEM on Windows, the root account provides full administrative access to the operating system. Sometimes even a successful exploit will only give a low-level shell; In that case, a techni ...more
With high-resolution photos and 4K videos being standard these days, it's no surprise that media hogs most of the storage space for many iPhone users. If that's you, there's always iCloud, but you only get 5 GB free, and a paid 50 GB or 200 GB plan can fill up fast. To save mo ...more
Phishing is the easiest way to get your password stolen, as it only takes one mistake to log in to the wrong website. A convincing phishing site is key to a successful attempt, and tools to create them have become intuitive and more sophisticated. SocialFish allows a hacker to ...more
The telecommunications industry has come a long way since Ma Bell opened the first telephone exchange in the late 1800s. With the advent of fiber optics and wireless broadband technology, we no longer have a need for a dedicated phone connection, as today's data networks can c ...more
Bloatware is a problem on Android, and it's not just a Samsung thing. Removing apps that have the Uninstall or Disable button grayed out in Settings has always involved sending ADB commands to your phone from a computer, which itself was always such a pain to set up. Thankfull ...more
Take a look at this instructional vidkeo and learn how to make your own computer numerical control (CNC) machine out of two old CD drives. CNC machines serve as controllers for a number of devices such as machine tools by reading G Code instructions. With a own CNC machine, yo ...more
In this tutorial we learn how to say number 1 to 10 in Vietnamese. When you learn how to say this, make sure you have the accent down right or understand how to read the language. M™t = One, Hai = Two, Ba = Three, Bon = Four, Nam = Five, Sau = Six, Bay = Seven, Tam = Eight, Ch ...more
Installing Laminate Flooring on Stairs Laminate flooring can be installed on a flight of stairs, and this process can also be used when installing laminate on a floor and having to drop down a step to a sunken room. I will describe how to prepare and install laminate floorin ...more
You would think that recovering your smartphone or another important item that you leave behind in an Uber ride would be a simple process, but it can actually be a pain in the ass. You have to find out how to report it to the driver, hope the driver is honest, pay a fee, and c ...more
Want to send text messages, but don't want your recipient to know they're from you? You can use a website called AnonText.com, which lets you send anonymized text messages to any cell phone number. Use your computer, or, if you have a smartphone (like an iPhone, Droid HTC Evo) ...more
With Signal's class-leading end-to-end encryption, you can be sure your messages will remain secure as they travel to the recipient. However, once the message arrives, its privacy is completely dependent on the receiver, who could share it anywhere if they wanted. To patch thi ...more
Description: Admit it, having thousands of valid email Ids give you the power to do anything! Such as adding thousands of friends to your Facebook, MySpace, Twitter, etc profiles or promoting your article or blog in just a single click and much more! But how do we do it? I se ...more
Your hair dryer can come in handy for a number of unexpected uses, from removing crayon marks on walls to helping mold your plastic store-bought glasses to fit your big head. Not surprisingly, your hair dryer can also be used to defrost things, quickly dry wet things, and spee ...more
You know what's awesome? You own a Nexus. That means, with Google's blessing, you have easier access and control over your device than other manufacturers allow. You can really dig in and do some interesting things if you root. The big 'R' word can be intimidating for the new ...more
The Galaxy S8 continues to be a treasure trove of hidden features that, with a little digging and experimenting, can be easily unlocked to further enhance your overall experience with the device. DPI scaling, or the ability to adjust the size of on-screen content, is among the ...more
While photography usually gets all the love, our phones have gotten really good at capturing video. Think about it — when was the last time you needed a camcorder for a vacation? With mobile cameras getting better each year, we're now at a point where smartphones can be used f ...more
Jet lag is inevitable when you're traveling long distances by plane, and it can leave you feeling completely wrecked for several days to a week after you arrive at your destination. For people who simply cannot afford the few days to completely recover from the physical and m ...more
Developers creating login systems know better than to store passwords in plain text, usually storing hashes of a password to prevent storing the credentials in a way a hacker could steal. Due to the way hashes work, not all are created equal. Some are more vulnerable than othe ...more
In this video the author shows how to play Wii ISO's without actually burning them do disks using the USB flash drive. A normal DVD disk's average capacity is 4.7 GB, but a normal Wii Play game takes about only .09 GB space. In a DVD we will be wasting a lot of space when you ...more
This video is about how to download movies, music, and software using torrents. The first thing that you will have to do is to download either uTorrent or BitTorrent. After you have download either of the two, go ahead and browse for a torrent website. After you have found the ...more
Apple just unveiled iOS 8 at the Worldwide Developer's Conference, and it has a lot of exciting features to play around with. Unfortunately, it won't be available to the public until this coming fall—but that doesn't mean you can't get it right now. There is a way to get iOS ...more
Google Voice has a hidden feature that lets you record any phone call you're participating in, and unlike other apps, it doesn't cost a dime. When it comes to recording phone conversations, you may think the worst and associate it with something shady like obsessive exes and ...more
In this video, we learn how to remove water spots from chrome. This is one of the hardest surfaces to get water stains off of, but it can be done easily. First, grab an empty spray bottle, vinegar, water, a rag, and a paper towel. Now, mix two parts of vinegar to one part of w ...more
To convert between diameter and radius just follow a few steps. Sometimes we aren't given the number directly so first we need to find the diameter. First step, take a circle. In that circle, find the middle point and draw a line. That line is the diameter. Just divide by t ...more
Smartphones are great. They help you keep in touch with your loved ones and stay up to date on what's going on in the world. The problem is that like everything else that's useful, they cost money to use, and between calling, texting, and data plans, it can get really expensiv ...more
Samsung's latest Oreo Beta update for the Galaxy S8 brings an impressive number of new customization features. On the lock screen, we've seen the introduction of new colorization options for the clock and transparent notifications. Not to be forgotten, the Always On Display is ...more
This video is for those who are either at an advanced skill level or have practiced video number two in this series a few times. Part 1 of 3 - How to Practice vocal riffs, runs & control. Part 2 of 3 - How to Practice vocal riffs, runs & control. Part 3 of 3 - How to Practic ...more
So you've managed to get a shell on the target, but you only have measly low-level privileges. Now what? Privilege escalation is a vast field and can be one of the most rewarding yet frustrating phases of an attack. We could go the manual route, but like always, Metasploit mak ...more