Everyone from first responders to hotel cleaning staff use radios operating in the sub-megahertz range to communicate, often without even encoding the transmission. While encoding and encryption are increasingly used in radio communication, an RTL-SDR adapter and smartphone ar ...more
Net neutrality is dead and your internet service providers can collect all the data they want. While VPNs are a great way to protect some of that privacy, they're not perfect. There is another option, though, called Noisy, which was created by Itay Hury. It floods your ISP wit ...more
When your opponent throws down "AA", you tell them no abbreviations, but alas... it's not. They build "ZA" on the board for 64 points, and you say it's slang, but it's in the dictionary. Next is "EF", and you let them know that spelling out letters is not allowed and ridiculou ...more
For the uninitiated, it can be difficult to buy that special hacker in your life a perfect holiday gift. That's why we've taken out the guesswork and curated a list of the top 20 most popular items our readers are buying. Whether you're buying a gift for a friend or have been ...more
A relay is an electrical component that works like a light switch, where it's turned on or off with an electrical signal. By connecting a relay to a Wi-Fi connected microcontroller like an ESP8266, you can build a connected switch that can be controlled from the web browser of ...more
Two-letter words are one of the most important parts of playing Scrabble. If you don't know all of the small ones, then you're missing out on one of the easiest ways to score big. Check out How to Score Big with 2-Letter Words in Scrabble and memorize all that you can. Definit ...more
ESP8266-based microcontrollers can be used to create exciting and legal Wi-Fi hacking games to test your or your friends' Wi-Fi hacking skills. When you first start learning how to hack Wi-Fi, it can be tempting to use your powers on Wi-Fi networks you don't have permission t ...more
In my previous article, we learned how to generate a vulnerable virtual machine using SecGen to safely and legally practice hacking. In this tutorial, we will put it all together, and learn how to actually hack our practice VM. This will provide some insight into the methodolo ...more
Hackers can be notoriously difficult to buy gifts for, so we've curated a list of the top 20 most popular items Null Byte readers are buying during their ethical-hacking studies. Whether you're buying a gift for a friend or have been dying to share this list with someone shopp ...more
Ransomware is software that encrypts a victim's entire hard drive, blocking access to their files unless they pay a ransom to the attacker to get the decryption key. In this tutorial, you'll learn how easy it is to use the USB Rubber Ducky, which is disguised as an ordinary fl ...more
Math always seems hardest until someone shows you how to do the problem and then it all seems just so simple. This video will walk you through the process of finding the surface area of a cone when you also have to derive the slant height. Use this example to help with your ot ...more
Write a fraction as a decimal Some fractions are easy to convert to decimals. Fractions with 10,100 or power of 10 are written like they sound. 1/10 is .1, 3/10 is .3, 5/100 is .05, 17/100 is .17. Some you can rename to have a power of 10 denominator. They are 2,4,5,10,20,25, ...more
The next libSSH or OpenSSH exploit may be just around the corner. Keep your SSH service out of Shodan's database before hackers find new ways to bypass the password protecting the server. Shodan has been called the "hacker's search engine" because it's literally a searchable ...more
It always sounds like a good idea to throw a party... until the party gets there. Next thing you know, you're running around hiding anything breakable, and once everyone leaves, you're stuck cleaning up the mess. But the worst part is footing the bill for everything, and if yo ...more
Null Byte users have often requested video content, but the question has always been what format would best serve our community. This week, we partnered with Null Space Labs, a hackerspace in Los Angeles, to test the waters by hosting a series of talks on ethical hacking for s ...more
Many popular IoT devices have terrible security. For instance, a hacker who's on the same Wi-Fi network as a Sonos speaker can assume direct control over the device's behavior. If an IoT device doesn't secure the messages used to control it over a network, it's easy for somebo ...more
Bluetooth Low Energy (BLE) is the de facto wireless protocol choice by many wearables developers, and much of the emerging internet of things (IoT) market. Thanks to it's near ubiquity in modern smartphones, tablets, and computers, BLE represents a large and frequently insecur ...more
In this video by PI Classroom you get to learn how to remove the sim chip from an i-phone. The video provides a step by step process for removing the sim chip. The only tool required is a paper clip. *Turn the i-phone on its head so that the power button and the plug for the h ...more
While hackers know and love the Raspberry Pi, many don't know of its cheaper cousin, the microcontroller. Unlike a Pi, which can be used more or less like a regular computer, microcontrollers like the Wi-Fi connected ESP8266 require some necessary programming skill to master. ...more
Now that you have your two-letter words down and have practiced your skills, it's time to move on to another important part of Scrabble gameplay—the opening move. There's a well known adage that states, “The player going first will win 54% of the time—all other things being eq ...more
Flight disruptions can cost billions of dollars, but most modern commercial flights rely on air traffic control systems that harbor serious vulnerabilities. The Federal Aviation Administration uses an infrastructure called NextGen, which relies on Automatic Dependent Surveilla ...more
For years, PuTTy has reigned supreme as the way to establish a Secure Shell (SSH) connection. However, those days are numbered with the addition of the OpenSSH server and client in the Windows 10 Fall Creators Update, which brings Windows up to par with macOS and Linux's abili ...more
Just about anyone who's been gaming for a long time occasionally feels nostalgic for the simpler consoles of yesteryear. I don't play much anymore, but my grandmother (yes, grandmother) got me started on NES when I was about three years old, and most days I'd still take that o ...more
Recently, I ran across SecGen, a project which allows a user to create random vulnerable machines. I absolutely love vulnerable machines, since a vulnerable VM is a safe and legal way to practice hacking tactics, test out new tools, and exercise your puzzle-solving skills. Wh ...more
Solving long and extensively complicated equations in grade school was tough to do by hand. Keeping track of which part of the equation to solve first took time, training, and lots of bad grades. As soon as middle school began, our dependance on calculators grew and difficult ...more
With a cheap computer, smaller than the Raspberry Pi, an attacker can create a remote hacking device. The device can be attached to a target router without anyone's knowledge and enable the hacker to perform a variety of network-based attacks from anywhere in the world. As th ...more
PirateBox is a great way to communicate with others nearby when cellular and Wi-Fi networks aren't available. With it, you can anonymously share any kind of media or document and even talk to one another by voice — without being online. However, it needs a Raspberry Pi, which ...more
Earlier this month, game developer David Braben and his Rasberry Pi nonprofit foundation revealed a $25 USB PC. The computer can connect to an HDMI monitor on one end, and a USB peripheral on the other (such as a keyboard or a USB hub). You can use the USB hub to connect multi ...more
OpenVAS is a powerful vulnerability assessment tool. Forked from Nessus after Nessus became a proprietary product, OpenVAS stepped in to fill the niche. OpenVAS really shines for information gathering in large networks where manual scanning to establish a foothold can be time- ...more
Hak5's products get a lot of attention. Popping up in popular shows like Mr. Robot, their hacking tools are bold proof of concepts with space built into the design for the community to add their own tweaks and modifications. On Friday, Oct. 27, Null Byte attended the Hak5 rele ...more
Growing up, my family would get together in the living room every Saturday night and gather around my mom's old boombox radio and listen to Disco Saturday Night on 104.3 FM from 6 p.m. to 2 a.m. (the show ended in 2008 after 14 years of consecutive shows). The old ladies in th ...more
Use a simple mathematical formula to find the circumference of a circle. The circumference of a circle can be determined by using the formula 2 times pi times the circle's radius. Pi is equal to 3.14. If a circle's radius is 10 centimeters, first multiply pi times 2. Pi, or 3. ...more
Nerds get a bad rap most of the time, but on Halloween, everyone wants to be one. However, not everyone knows how to geek it out without going too far. There is a limit, even for nerds, and these eight Halloween costumes are nerdy times pi. #1. Mozilla Firefox Costume Dressi ...more
Configuring onion services for the first time can be tricky. A surprising number of system administrators make seemingly trivial mistakes that ultimately lead to catastrophic cases of de-anonymizing supposedly anonymous sites on the dark web. OnionScan is a tool designed to id ...more
In my previous article, I discussed installing and configuring OpenVAS on Kali Linux. Now it's time to start using OpenVAS with the Greenbone Security Assistant to audit networks for security issues. This can be extremely helpful when you are looking for vulnerabilities or mis ...more
Lock screen apps are a dime a dozen, but every now and then one pops up that defies expectations. We've already covered some good ones for the Samsung Galaxy S4, including Picture Password Lockscreen (which gives you secret unlock gestures), SlideLock (which improves notificat ...more
For people who are interested in math or who need to know how to find the volume of a cone for any reason, whether it be homework or architecture, this video will show you how to do so. The formula for finding the volume of a cone is (1/3) pi x radius^2 x height. You can find ...more
This video shows how to calculate the circumference of a given circle. The video first describes the circumference or perimeter of a circle as the distance around the outside of a circle. To find the circumference we need either the radius or the diameter of the circle. When y ...more
If you're getting into automation, Bash scripting is usually the way to go. However, there are a couple of limitations, and one of them is logging into another device like a Raspberry Pi and running a script automatically. To help in those situations, we're going to automate d ...more
In this video tutorial the author shows how to find the surface area of a cylinder. He shows a four step approach to solve this problem. First he gives us a formula to find the surface area of a cylinder, where Surface area A = 2 * Pi * R * R + 2 * Pi * R * H, where R is the r ...more
Although mowing is key to keeping your lawn healthy and good looking, it isn't anything worth jumping up and down for when it comes time to doing it. As it turned out, the first time I mowed my lawn wasn't nearly as fun or exciting as Hank Hill made it out to be. Maybe it was ...more
If you want to carry a variety of network adapters without looking suspicious, a perfect solution is accessing them through Airserv-ng. Tucked away in the Aircrack-ng suite, this tool allows a hacker to plug any number of network adapters into a Raspberry Pi and access them ov ...more
With a tiny computer, hackers can see every website you visit, exploit services on the network, and break into your Wi-Fi router's gateway to manipulate sensitive settings. These attacks can be performed from anywhere once the attacker's computer has been connected to the rout ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. Thanks to all of our active moderators and ...more
Remember the Power Pwn, the clever little hacking tool disguised as a power strip? It's great in theory, but with a $1,295 price tag, it definitely doesn't fit into most people's budgets. But what if you could make your own for a fraction of the cost? That's exactly what the ...more
With the nation facing a shortage of ventilators for COVID-19 patients and no apparent ramp-up in the production of new ones, engineers, medical resistents, and do-it-yourselfers are sharing plans for homemade versions. But before you go online to start ordering parts for any ...more
So the cooking of the bird doesn't lie on your shoulders this Thanksgiving. Lucky. But before you relax too much, there is a wild card- you never know who will be handed the carving knife. Below, five handy infographics for carving a turkey like a pro. 1. Carve Your Turkey th ...more
New to Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this Excel tutorial from ExcelIsFun, the 234th installment in their series of digital spreadsheet magic tricks, you'll learn how to convert between degr ...more
This video tells us the method to find the surface area of an aluminium can or cylinder. The surface area includes the outside area of the curved portion and the aluminium top and bottom. The formula to find area is the multiple of 2, pi, r, r+h or (2)(pi)(r)(r+h). The radius ...more
Mirror, mirror on the wall, who's the smartest of them all? Since Max Braun's Medium post went viral back in January of 2016, smart mirrors have been appearing on tech blogs in all shapes and sizes. Some are technically sound, some incredibly easy, but all are visually compel ...more
In this video the instructor shows how to calculate the area of a circle using squares. She starts with the formula of the circumference which she says is circumference C = Pi * D, where D is the diameter of the circle. Now she says that you can turn the shape of circle into a ...more
In this video the tutors explain about the concepts of Circular Velocity and Acceleration. She explains the concepts using a real world small experiments. She shows that the equation to calculate circular velocity is v = (2 * Pi * r) / T, where r is the radius of the circle th ...more
I've been doing tutorials on Rasberry Pi and I would like to thank everyone that have both read the tutorials and gave me feedback on how well I'm doing. But now I've decided to take a small break and start a mini series that I'm hoping to be at least five tutorials. This does ...more
3D printers allow hackers and makers alike to create something from nothing. They're an incredible technology that lets you build protective cases and covers for gear such as a wardriving phone and Raspberry Pi-Hole. 3D printers can even help you out in a bind when something b ...more
In this video the tutor shows how to find the volume of a cylinder. He relates the cylinder to real world examples of cans etc. Now he states the formula of the volume of the cylinder as the area of the base circle multiplied by the height of the cylinder. So the formula turns ...more
This video shows the method to find the volume of a cube, cylinder, pyramid or cone. Volume is equal to the multiple of the area of the base and the height or V=(base area)(height). Starting with the cube, the volume= [(side)(side)](side) or side cube or side^3. In the video s ...more
Steps involved in calculating the lateral surface and total area are: Consider a cylinder with radius r, height h. Then to find lateral area we need the formula 2*pi*r*h, circumference - 2*pi*r, total area 2*pi*(r+h) and area of circle (pi^2)*r. Therefore by using only the ra ...more
Learn how to find the area of circle by activity method. Requirements: A circle cut out, a pair of scissors, sketch pen, and a ruler. Take a circle of the radius. Fold the circle along itself. Fold it again. Fold yet again. And again. Now unfold and observe the crease. Numbe ...more
A security analyst has discovered a flaw in Chromecast's initial setup process that allows would-be hackers to assume full control over the online streaming device. Dan Petro, of security consulting firm Bishop Fox, created a handheld device that is capable of hijacking contr ...more
In this video the author show how to find the volume of a sphere. The formula for finding the volume of a sphere is 4/3 * Pi * r*r*r, where r is the radius of the sphere. Now to compute the volume of a sphere you have to note down the radius of the sphere and substitute it in ...more