How To : Clean your computer
The Lab Rats, Andy Walker and Sean Carruthers, give you information on cleaning your computer - why it's important, and how to do it.
The Lab Rats, Andy Walker and Sean Carruthers, give you information on cleaning your computer - why it's important, and how to do it.
ok jackasses this is the ultimate prank.. ok what you have to do is when someone is sleeping suprise them with an airhorn, then with a bucket of all sorts of bugs, snakes, shit , and piss. then when they jump up and are like what the hell butter the floor and put marbles every ...more
When joining a new network, computers use the Address Resolution Protocol to discover the MAC address of other devices on the same network. A hacker can take advantage of ARP messages to silently discover the MAC and IP address of network devices or actively scan the network w ...more
Aside from the popular television commercials Ogilvy & Mather did for Mattel's Scrabble back in 2000 and 2001, they also have a large history in print with Mattel. From 1998 until the present, they've been designing graceful, risible and salacious Scrabble and Junior Scrabble ...more
Wi-Fi tools keep getting more and more accessible to beginners, and the LAZY script is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA ha ...more
April Fool's Day, aka National Screw with Your Friends Day, is finally here. You can always pull a conventional prank, like strategically placing a whoopee cushion on your mom's chair, but that joke has been exhausted generations before smartphones were around. We live in a d ...more
Dried out markers are the worst. They take up space, and for some reason, even though they're totally useless, most of us have at least a few lying around just for the sake of not throwing them out. Luckily, Julie Finn over at Crafting a Green World has come up with a way to r ...more
The new iOS 14 for iPhone arrived Wednesday, Sept. 15, 2020, alongside iPadOS 14, and there are a lot of features to uncover. Improved widgets. Better home screen customization. Exciting Messages improvements. New abilities in Camera and Photos. There's so much here that it'll ...more
Hello there, people. Today, I am going to show you how to extract the essence from a useful plant, using either alcohol or olive oil. This is how you take a plant and turn it into a useful (and preservable) medicine. For those of you who know nothing about herbal medicine, let ...more
It's common for IoT devices like Wi-Fi security cameras to host a website for controlling or configuring the camera that uses HTTP instead of the more secure HTTPS. This means anyone with the network password can see traffic to and from the camera, allowing a hacker to interce ...more
It's almost time for Halloween, which means that it's time for the nastiest-looking food and drink to make its appearance. Severed fingers, brains, vomit... everything that would normally make our stomachs turn at any other time of year makes us cackle with glee instead on Hal ...more
With the release of the Mirai source code, botnets are back in a big way. In the early days of botnets, zombies (infected hosts) would report to IRC (Internet Relay Chat) channels for CNC (command and control) instructions. Modern botnets have evolved, but they continue to use ...more
One of Android's most glaring weaknesses is its lack of an iMessage equivalent. That is, of course, until now. There's one app that will allow Android users to experience iMessage on their non-Apple phone, complete with end-to-end encryption, message effects, and group messagi ...more
Microcontrollers are great. You can do anything from water your garden to catch wildlife trash diggers in the act—and on the cheap. I prefer to use the Arduino microcontroller because of the large and helpful community built around the website. Though it is my favorite, there ...more
Coinhive, a JavaScript cryptocurrency miner, was reportedly discovered on the BlackBerry Mobile website. It was placed there by hackers who exploited a vulnerability in the site's e-commerce software that allowed them to anonymously mine cryptocurrency every time the website w ...more
Hello and welcome to my article. I have made this article for anyone who wants to become a hacker, and wants to know how to get started. OVERVIEW: As you'll get further into the hacking community, and learn more about how it's all put together, you'll also realize very quick ...more
If you've ever used your iPhone's hidden Field Test mode to view your signal strength in decibel-milliwatts, locate the tower you're connected to, or find out the radio frequency in use, you no longer have to dig through all of the confusing-looking data every time you need to ...more
I recently posted a Tutorial about setting up Dendroid: http://null-byte.wonderhowto.com/how-to/setup-dendroid-android-rat-0167299/. I have worked the last 5 days on getting the Dendroid Binder, given with the Dendroid Source, working. This solution only works on Windows syste ...more
The DIY industry is booming, despite the desperate blackmailing of society by finance capitalists. Companies like Adafruit and Makerbot are grossing well over a million dollars a year, and Evil Mad Science Laboratories just recently dedicated themselves to running a full-time ...more
Ransomware is software that encrypts a victim's entire hard drive, blocking access to their files unless they pay a ransom to the attacker to get the decryption key. In this tutorial, you'll learn how easy it is to use the USB Rubber Ducky, which is disguised as an ordinary fl ...more
Barrow's article on Pupy made me wish for a RAT that could target an OS frequently used by gatekeepers at startups, tech companies, and creative firms: macOS. Once run, a RAT can do severe damage by dumping a user's stored credentials for many accounts. The best loot lives in ...more
To create an apostolic or pentecostal hairstyle, start with a poof in the front of the hair. It can be ratted behind for stability. Use two bobby pins to secure the back corner of the poof. Squirt the hair with hairspray before moving on. Then create a low ponytail in the back ...more
It has been a long while since I last came here to write an article. Graduate school keeps you busy. After I looked over what I had written previously, I decided that I should introduce another fun topic from cryptography. In this case, steganography. In this article, I will ...more
This video will show you with long hair how to go from wet hair to done hair in 5 minutes. All you need is a rat tail comb, mousse, wet hair and a butterfly clip.
With a cheap computer, smaller than the Raspberry Pi, an attacker can create a remote hacking device. The device can be attached to a target router without anyone's knowledge and enable the hacker to perform a variety of network-based attacks from anywhere in the world. As th ...more
After updating to iOS 14 or getting a new iPhone with iOS 14 preinstalled, you'll notice orange and green dots that occasionally appear at the top of your iPhone. These dots appear on all supported iOS 14 devices, from the iPhone 6S to the iPhone 12 Pro Max, and are there to p ...more
Halloween abounds in spooky costumes and even spookier makeup and accessories. But if you've had enough of ghosts and goblins and want to go for an entirely different look this year then check out this tutorial for creating a teddy bear/mouse look for Halloween. Cutesy rounde ...more
Welcome to a tutorial on crypting technology. In this article, we will be discussing types of crypters, how they work and why they work. After defining these, we will then make our own basic crypter using the function I gave to you as a task to complete by yourself in the prev ...more
Google Calendar is a cornerstone of the Google Suite, perhaps second only to Gmail itself. Whereas email is constantly plagued by phishing attacks, as of yet, the calendar is a relatively untapped social engineering attack vector. But it's relatively easy for an attacker to in ...more
If you save scraps of yarn, and have a dog, this is an easy project for you. The Mobius scarf has the advantage of not having any ends to come untied, or dangle down for your dog to trip over, or get tangled in branches and stuff. I made this one for Pepper, my 16lb rat terrie ...more
Here's something fun for the Null Byte community to do—a coding competition! This week, I wanted to get everyone involved by offering you all a nice library of possible program types to choose from and try to code. At the end of this competition, all of the submitted programs ...more
Having trouble covering your Bumpit due to thin hair? In this video tutorial, learn how to situate the Bumpit hair insert so that it doesn't show using a rat tooth comb, hairspray, comb, a Bumpit, straight hair, and a hair piece (which is explained). Don't let thin hair stop y ...more
If you don't want to dress up as a vampire, witch, werewolf, or zombie again this Halloween, step things up a notch and go viral. There have been a ton of funny memes and absurd news since last October, so the only hard part is settling on the right one for inspiration for you ...more
CEO's of IT companies doesn't know this because they are not a hacker. Only a true hacker can become a successful Security head officer. Head of Security: Well let me tell you something my good friend. Many companies we have today they are still getting attacked from hackers ...more
The Kardashian sisters know what looks flattering on their curvaceous bodies, from butt-skimming dresses to false lashes. Learn another Kardashian beauty trick by watching this tutorial, which shows you how to create curvy split bangs, a hair look for which they're famous. It ...more
Do you think humans are the only ones who like the challenge of a good word game? Well, think again, because homo sapiens aren't the only ones up for stimulating their brains. Other species on planet Earth like to play Scrabble, too, and they're the ones most likely to actuall ...more
A recent Japanese study proposes a simpler, softer, more natural-feeling alternative to silicone breast implants: fat-derived stem cells. The cells are extracted from liposuctioned fat, and then injected into the patient to increase breast circumference. San Diego-based biotec ...more
BURKITE n pl. -S a burker 63 points (13 points without the bingo) There's no better time than Halloween to have the BEJABERS scared out of you, and no better way than with a slasher flick or horror movie about HEXEREI. To some, Halloween is a time for candy, costumes and cel ...more
You don't need a big name hairstylist who claims he's done Jessica Simpson's hair in order to get luscious, enviable locks. In fact, all you need are cheapo, basic velcro hair rollers. But don't take our word for it. Simply check out this video to learn how to create thick, l ...more
Cocorais shows you how to style your short hair into a crimped wavy look with a step by step example doing her own hair. You'll need a heat-protecting spray, a curl-boosting spray, a rat-tail comb, some sectioning clips, hair wax, and a flat iron. Apply heat-protecting spray a ...more
Robert Xyster, submitter to Love.Earn, shares a military-grade formula for avoiding starvation in the wild. There are several deadfall trap tutorials on the web, but this HowTo is particularly unique because of its context. Using the Iraq terrain as a backdrop, the war vetera ...more
You may not have heard of visceral leishmaniasis, onchocerciasis, or lymphatic filariasis, and there is a reason for that. These diseases, part of a group of infections called neglected tropical diseases (NTDs), impact more than a billion people on the planet in countries othe ...more
Put cream all over your dick and put a rat inside your pants and see how cheesy this prank is in front of a school.
The culprit probably wasn't what doctors were expecting when a 57-year-old man in Hong Kong came to the hospital. The patient was admitted to the intensive care unit in critical condition. A clue to the cause of the infection would lie in the man's profession—he was a butcher. ...more
Hello again, folks! I'm back with another (final) guide on runtime crypters which is an extension on my previous runtime crypter guide. If you have not read it yet, I highly recommend that you do since the fundamental theory of the PE format. Again, this will be a Windows-spec ...more
For regions that experienced a boom in mouse populations last year, scientists say 2017 could see a surge in cases of Lyme disease. Caused by bacteria transmitted through the bite of an infected tick, Lyme disease causes serious neurological symptoms if left untreated. While ...more
Ecosystem changes caused by agricultural choices in Brazil are creating a dangerous microbe mix in exploding populations of vampire bats and feral pigs. Even as human-influenced climate warming is tipping the tables on ecosystems around the world, choices made by landowners i ...more
Bangs are the hottest hair trend for spring and summer, but who wants to drop $100 for trim at a salon? Learn how to achieve indie-inspired, piecy bangs at home with this easy tutorial. All you need are scissors, a rat tail comb, and hair. Save money in between salon visits ...more
The developers at Immersion VR are clearly fans of both Apple's ARKit and Rick & Morty, as the company has shared its second demo in as many weeks of the augmented reality platform that is influenced by the animated sci-fi series. This time, the payoff is huge. Immersion VR b ...more
This tutorial shows you how you can make a stop motion puppet modeled after Brown Jenkin, the eldritch horror that features in in the Cthulhu Mythos of H.P. Lovecraft. Brown Jenkin is a rat familiar with a human face, and this video shows you how to pull off this incredily cre ...more
Highlights add depth and interest to a hair color. Get that beachy, sun-kissed look and change up your style by adding some well placed highlights in your hair. You’ll save time and money by buying a kit and doing it yourself. Step 1: Choose where to highlight Decide where t ...more
Besides being useful, mousetraps can be pretty loud, which makes them perfect for the prankster at heart. They can scare the crap out of your intended victim, but for some, giving them the heebie-jeebies can be more difficult than just a normal trap. They might not scare as ea ...more
Get the most out of your hair, turn yourself into the beauty you are with just a little hair-styling. Watch this video tutorial on how to create sleek and sexy Cassie-inspired "half-do" hair, from Cassie's music video entitled "Official Girl". Wow everyone with this half-do ha ...more
Get that extra oomph in your hair by teasing it! Teasing your hair will allow you to poof it up a little bit for styling purposes. Teasing, backcombing, or ratting: however you say it, big hair is back in a big way. Learn how you can pump up the volume. Step 1: Straighten ha ...more
Remember when Ehren was a mouse and walked through a room of mouse traps? You know those mouse traps that are just a rectangle with all that sticky glue all over it that essentially traps the rat by sticking it to the surface? Well, do that to an entire room . . . tell Ehren h ...more
We don't think we're overexaggerating when we say that "Gossip Girl" singlehandedly started a massive hairband trend. Or, rather, that Miss Blair Waldorf started this fashion accessory love. For the greater portion of us, though, who haven't worn headbands since we were forced ...more
French braids are timeless hairstyles that make you look elegant and put together whether you're simply headed for Biology class or you're assembling a beautiful hairdo for a wedding. But don't you ever feel the need to spice things up every once in a while? Take a gander at ...more
As much as we'd all love to sport perfectly wavy, messy beach hair every day during the summer, sometimes it's just way easier to tie our locks up in a ponytail and forget about it. But to look like you're ready for a day out at the beach rather than prepped for a run at the ...more
Using extreme time-lapse microscopy, scientists watched a virus take over a bacteria to create a cell that looked and functioned more like a plant or animal cell. True story. In a study published in Science, researchers from the Division of Biological Sciences and Department ...more
The wearables space experienced its "big bang" moment back in 2015 when Apple released its first wearable device, the Apple Watch. Although the device was initially dismissed by some as an unnecessary charm bracelet packed with frivolous tech, in very short order, the public l ...more