New to Microsoft Excel? Looking for a tip? How about a tip so mind-blowingly useful as to qualify as a magic trick? You're in luck. In this MS Excel tutorial from ExcelIsFun, the 319th installment in their series of digital spreadsheet magic tricks, you'll learn how to run a V ...more
In this video, we learn how to do a free reverse cell phone look up for call records. This will work for some cell phones, but not all of them. First, go to the website Your Spying Eyes. This is a great search tool where you can look through records of cell phones to find out ...more
Everybody gets phone calls from those strange numbers you kinda sorta recognize. Is that an old friend? Is it the guy you met last week? What's that area code anyway? Get to the bottom of the mystery by using reverse phone book services. This video will show you to find the so ...more
Learn how to print double-sided and reverse printing order in Microsoft Word. * Go to the Start menu and open Microsoft Word. * Once you have opened Word, go to Tools and click on Options. * Go to the Print tab and check-mark the 'Reverse Print Order' option and click 'OK'. * ...more
If you're tired of the so-called "top" tweets appearing first in your Twitter timeline instead of only the latest from the people, companies, and bots you follow, there's a way to get rid of them. Twitter switched to an algorithm-based timeline in 2016, which replaced the sta ...more
In this Excel magic trick video the tutor shows how to perform reverse two way look up for date and time columns and row headers. In this tutorial he shows a spreadsheet that contains dates in columns and times of a day in rows which makes up a small table schedule. Now he sho ...more
One of the ultimate goals in hacking is the ability to obtain shells in order to run system commands and own a target or network. SQL injection is typically only associated with databases and their data, but it can actually be used as a vector to gain a command shell. As a les ...more
What's up readers? Today I'll be introducing to you a new vulnerability called the Format String vulnerability (in case you missed the title). It won't be much, just a little motivation to keep you guys going. A little teaser, if you may. Pre-requisite information: For those ...more
Not to be confused with the band, ABBA switches are so named because they reverse outputs such that they fire in A-B-B-A order. So, your redstone devices will essentially fire in one order (A and then B) when activated, and then deactivate in the reverse order (B and then A). ...more
Ever since 2009, you could send a photo or video that you've already taken right from the Messages app on your iPhone. You would just tap on the camera icon next to the new message box, then choose either to take a new one or select one from your library. If you're running iOS ...more
Parlez-vous français? While we all wish we were fluent in multiple languages like Jason Bourne, most of us are probably one-trick ponies. When traveling abroad, or even when taking language courses, having a translator handy is extremely important. You can buy one of those hu ...more
Welcome back! In our last training session we covered classes and how OOP can make programming/scripting easier. Today we'll be taking a breather and covering something fairly simple, bitwise operators. Bitwise operators are relatively simple. Essentially, when we use bitwise ...more
Once a hacker has created a PowerShell payload to evade antivirus software and set up msfconsole on their attack system, they can then move onto disguising their executable to make it appear as a regular text file. This is how they will get a Windows 10 users to actually open ...more
In this tutorial I will be explaining the purpose of unique encryption/decryption scripts ( I will be referring to these at "UEDS" for this tutorial). Then, I will show you how to make one. Finally I will talk about the downsides to the method I use. I will also provide links ...more
RouterSploit is a powerful exploit framework similar to Metasploit, working to quickly identify and exploit common vulnerabilities in routers. And guess what. It can be run on most Android devices. I initially covered RouterSploit on Kali Linux and macOS (OS X), but this tuto ...more
Hello, everyone! Many of you don't even know about my existence here on Null Byte, so I thought of contributing something rather interesting. Recently, someone asked how to make your own "Bad USB," and I promised to make a how-to on this topic. In addition, it would be nice t ...more
3D modeling is usually a very long and complicated process. Manipulating the thousands to millions of vertices, faces, and triangles to the correct shape you want is just the first part of the process, and can take a good while depending on the level of detail needed. From th ...more
Being able to write your own hacking tools is what separates the script kiddies from the legendary hackers. While this can take many forms, one of the most coveted skills in hacking is the ability to dig through the binary files of a program and identify vulnerabilities at the ...more
Since its debut, retro thriller Stranger Things and its characters have become ingrained in our popular culture — especially the telekinetic Eleven. For cosplayers, it didn't take long before they grabbed their boxes of frozen Eggo waffles, blonde wigs (or bald caps), and pink ...more
Changing the rear disc brakes on your 2001 Chrysler Town & Country (henceforth referred to as T&C) can be quite a challenge, but if you can spare a few hours (remember that you need to budget time to get the brake parts from the parts house) and are willing to get a little dir ...more
To some, SCRABBLE is just a board game to play during family game night or during a casual get-together. Others think of SCRABBLE as a mere hobby. But with any activity, there will always be fanatics—the ones who would rather sell their soul than stop—the ones with a constant ...more
For this particular example, I will be working on Wndows (sorry X users). I might write a similar guide once I am more comfortable with programming in Linux. What You Will Need Visual C# 2010 Express (Get it here) Pirate Metal Source Code (For when you are done with the guid ...more
It takes talent and training to drive a semitrailer. See if you have what it takes to operate one of these rigs on the open road. Step 1: Prepare for tests In order to drive a semi, you must get a commercial driver’s license and pass a medical exam. Age requirements vary fro ...more
Individually addressable LEDs, also commonly called "NeoPixels" after the popular Adafruit product, are a bright and colorful way to get started with basic Python programming. With an inexpensive ESP8266 or ESP32 microcontroller, it's easy to get started programming your own h ...more
Automation applications bring the future a little closer. If you've seen Minority Report or other futuristic sci-fi movies, the intrigue of having your electronics work independently is something we can all appreciate. While smartphones continue to improve and push the limits ...more
Note: a bug was found in the Insertion Sort implementations. The bug was corrected in each language. Please refer to the pastebin links for the most up-to-date versions of the sample code. Any screenshots may be behind. More about the bug can be found here. Hello World! Today ...more
Okay, you can't really become the king of the world by stacking three pistons. For that, you have to stack four pistons. Seriously though, stacking pistons is an incredibly useful thing to know how to do, and it can be used to make invisible doors, hidden staircases, portcull ...more
When Stardew Valley launched back in 2016 on Steam for PC, it was instantly deemed a success for steering the RPG farming simulator genre back on the right track. Before its release, we hadn't seen too much in this particular field of games that caught the eye of the general p ...more
The 280-character limit for tweets on Twitter is double what it used to be back in the day, but it's still not enough to express in-depth thoughts, ideas, commentary, rants, blogs, stories, and the like. These tweetstorms, as they're called, are the reason why Twitter created ...more
Why can't I see who is stalking my Facebook profile? There are other social networks that do let you see who's viewed your profile, mainly LinkedIn and its "Who's Viewed Your Profile" feature. Regular users can see a recent list of who has been spying on you, along with some ...more
Hello everyone! How's subnetting going? Did you practice a lot? I hope you did, but even if you didn't we will go through some more examples so you can be feeling confident after reading this article. It's all about that bad boy binary! We will move from the previous article' ...more
The next big iOS version for iPad, iPhone, and iPod touch was revealed by Apple at WWDC 2018 and dropped for everyone on Sept. 17, 2018, less than a week after Apple revealed the new iPhone lineup. We've rounded up all the big picture items and secret features and changes we c ...more
On the airplane, in the middle of cold and flu season, your seatmate is spewing, despite the clutch of tissues in their lap. Your proximity to an infectious person probably leaves you daydreaming (or is it a nightmare?) of pandemics and estimating how likely it is that this se ...more
From personal photos and videos to online banking passwords saved in your web browser, your phone has all kinds of sensitive data that needs to be protected. One of the best things you can do for your Samsung Galaxy S4's data is have a lock screen with a hard-to-guess PIN or p ...more
The default tool for payload generation is MSFvenom, a Metasploit standalone payload generator as well as encoder. This tool is an incredibly powerful tool for payload generation, but it can be difficult and requires a bit of reading for newer users. Even after the initial re ...more
Hello all, this is my first submission to null byte! I noticed something a little strange, particularly that whenever Meterpreter is discussed, it is virtually always in the context of Windows. Granted, the Windows Meterpreter is more powerful than the version that can run on ...more
In our media-enriched world, past and present, SCRABBLE has made a name for itself, whether deliberately, subconsciously, or influentially. You may have a read a book that had the popular word game within a chapter, watched a movie that showed your favorite characters bringing ...more
It's easier than you might think to hack into Wi-Fi routers using just one unrooted Android phone. This method doesn't require brute-forcing the password, a Windows OS for converting PowerShell scripts into EXE format, a reliable VPS for intercepting hacked Wi-Fi passwords, or ...more
Kali Linux, by default, probably doesn't have everything you need to get you through day-to-day penetration testing with ease. With a few tips, tricks, and applications, we can quickly get started using Kali like a professional white hat. Most Linux distributions are highly c ...more
Remember the arcades? Were you saddened when they closed up one by one, leaving no outlet to actually go out and socialize while you played video games? With all the home consoles and internet connectivity, gaming has evolved, but the social factor has been eliminated. Sure we ...more
Over the years, I have enjoyed playing with Asterisk. I have found Asterisk to be extremely powerful and fun to play with. There are several books and many scattered how to articles out there, but most are outdated and the information required to build Asterisk from beginning ...more
The worst can always happen. Even if you think you're absolutely prepared, you can somehow find yourself stranded in the middle of nowhere by yourself. It can happen. Without a map, without a compass, without a cell phone... without food and water. There are plenty of dange ...more
The video starts by informing about the basic safety precautions, tools needed and backing up data prior to hard drive replacement. There are a series of screws which need to be removed in the following order.1. Removing the battery from the back and then remove three screws t ...more
Before you begin repairing your Video iPod, get all of your tools and equipment ready to go, like your anti-static mat, your ESD bracelet, and some screwdrivers. Then, start fixing your broken iPod. To reassemble, just follow the steps in reverse order.
In this video, our author, KRASHARPSHOOTER, shows us how to install a TechT Lightning Rod. First we remove the screw on the underside, and turn it over and remove the four base screws. Now lift up on the piston housing and remove it. Then, remove the nut and the tension guide. ...more
First type your word and set the font. Now select the word and break it apart by pressing the ctrl+B twice. Now select the erasing tool and erase the letters in reverse order like when you write that word, you write it in a order but you need to erase it just reversal of it as ...more
Despite all the glitz and glamour of the '20s, flappers were more than anything else dressing the scandalous way they were in order to look like men. They flouted traditional notions of female beauty by binding their breasts, wearing sheaths that disguised their feminine curve ...more
No two eyebrows and faces are the same, so why should you think that just one eyebrow shape looks the best? Each face shape demands eyebrows with a particular angle, curve, and length in order to look the most attractive. Watch this makeup tutorial to learn how and where to t ...more
GetConnectedTV shows you how to multitask during phone calls on your Blackberry. You do not have to hang up your Blackberry in order to look up information. This works well if you are using an earpiece, Bluetooth, or the speaker function on your phone. When a call is made to y ...more
The video is a Photoshop tutorial teaching how to create the starry sky effect, an effect that turn regular sky in a photo into a starry night sky using the Adobe Photoshop software. This effect is created by the use of Photoshop filters like noise, blur, levels and masking in ...more
In order to create Fergie's look in "Meet Me Halfway" (both the eyes and the makeup), you will need the following: an eyebrow stencil, eye shadow primer, nude bone color, a frosty champagne color, a warm and neutral brown color, nude matte color, brown eyeliner, mascara, conce ...more
Contrary to popular belief, graffiti doesn't have to be all tough names, tough tags, and tough gansters. In fact, you can draw just about any subject you want using the graffiti style in order to make it look cooler and more street beautiful. But don't take our word for it. S ...more
In order to create a fairy inspired makeup look, you will need the following: foundation, pink blush, powder, blue eye shadow, purple eye shadow, pink eye shadow, lavender eye shadow, and glitter. Apply foundation. This look is achieved through pastels and glitter. Use a ligh ...more
In order to create a Cleopatra inspired makeup look, you will need the following: lipstick, eyebrow pencil, blush, bold eye shadows, and false eyelashes. A high arching brow is essential. Arch the brow. Use an eyebrow pencil to make a dramatic eye. The brow should also be ful ...more
Image consultant, Sara Connolly shows you how do look good when asking for that promotion or at that meeting. In order to become successful you need to look like you already ARE successful so have a go at this serious boardroom look. Immaculate make-up is part of your professi ...more
In order to create your own vampire inspired makeup look, you will need the following: false teeth, red lip tint, smoky eye shadow, mascara, eyeliner, foundation, and concealer. Apply concealer to all of the imperfections and dark areas on your face. Apply a foundation that i ...more
Expand your crocheting repertoire by learning how to crochet a crinkle stitch, which does indeed replicate fabric crinkles. With very hole-y yet tightly woven vertical lines of yarn intersection with horizontal ones, this type of stitch creates excellent warm fabric for scarve ...more
The modern, sleek aesthetic is so overrated. If you're an arts and crafts aficionado, you know that adding vintage and old world touches to your craftmaking creates results that are whimsical and beautifully antique. Learn how to make your new cardstock look just like old by ...more
In order to create a pin-up Rosy the Riveter look with a bandana, you will need the following: hairspray, bobby pins, round brush, wax or smoothing cream, a bandana, and a curling iron. Once you've got all of that, follow along with Kandee Johnson's video guide below. Video: . ...more
School's out and summer's in. And what better way to celebrate your newfound freedom to schlub around and do absolutely nothing than with a trip to an amusement park? A well-deserved break from your break, hitting up Disneyland is a great way to unwind and perhaps meet a cute ...more