When using Linux, we often need to install new software, a script, or numerous large files. To make things easier on us, these files are usually compressed and combined together into a single file with a .tar extension, which makes them easier to download, since it's one small ...more
In this tutorial, we learn how to wish someone a happy new year in Vietnamese. To say this phrase in Vietnamese, you will say "Chœc M_ng N_m M_i". You can add on phrases, such as 'prosperity' by saying "An khang th_nh v__ng". You can also add on "good health" by saying "S_c kh ...more
Recently, I've been experimenting with BeEF (Browser Exploitation Framework), and to say the least, I'm hooked. When using BeEF, you must "hook" the victims browser. This means that you must run the script provided by BeEF, which is titled "hook.js", in the victims browser. On ...more
I can definitely say that my MacBook is one of my best friends, but I was still very disappointed when I realized that the only game my laptop came with was chess. For starters, I'm not very good at chess. I haven't even beat the computer once, which really grinds my gears. Bu ...more
You can change how the date appears on your Android phone. One of the salient advantages of a Google Android smartphone over, say, an Apple iPhone, is the inherent extendibility of the open-source Android mobile OS. There are a seemingly infinite number of settings to tweak an ...more
Let's say that the screen on your iPhone is showing signs of discoloration, which makes the display annoying to use. You'll need a replacement display or a new iPhone as soon as possible. If you have one of the newer iPhone models, the cost to fix it might be more than your wa ...more
In this tutorial, we learn how to sign in offline to Xbox LIVE (Xbox 101). First, you will go to your Xbox console and then go to 'my Xbox'. After this, you will go to your preferences and then go to 'Xbox live'. From here, change your setting to make it say that you are offli ...more
Nothing beats a human translator, but Google Translate and other software-based solutions have developed into decent alternatives for help with basic translations. Need an English word translated into German? No problem — but what if you need to have a conversation with someon ...more
What could you do with two of you? Or, two cats, or two cars, or two of anything? Cloning, it's the way of the future and this tutorial shows you how to clone and print a 3D model of virtually anything. Using Anim8or and Pepakura Designer you can model your face and print it u ...more
Let's say you're watching a video and everything's going great, but you feel the need to raise the volume a tiny bit. You hit the volume button on your Nexus 5, and all of a sudden, a giant volume slider appears that obscures half of your video for 3 seconds. I know it's happ ...more
It is a truth universally acknowledged that food molded into fancy shapes somehow seems tastier. That's true even with chocolate, which is inherently delicious. Now, while you can buy chocolate that's been pre-molded into fancy shapes, you can have a lot of fun and save a few ...more
While Apple usually sets the precedent for its consumers to follow, the iPhone SE returned the company's iconic smartphone to a small form factor, one that had been ditched by the iPhone 6 and beyond. However, it appears Apple is finished with 4-inch phones for good, as the iP ...more
Apple's AirPods are convenient because you can easily switch which Apple device is connected to your AirPods with just a few taps. But unless you're using Shortcuts to make the connection, you aren't using the fastest method possible. For the uninitiated, Shortcuts is a power ...more
Garlic isn't just a food, it's a legend. It's been found in the pyramids of Egypt and is referenced in the Bible. Hippocrates, the father of Western medicine, prescribed it regularly, and it was given to the first Olympic athletes in Ancient Greece to enhance performance (tak ...more
Look at the image below to learn all about the divisibility rules. Real Life Examples Divisibility rules can be used in everyday life. For example, if you're at a grocery store and you need to find which deal is better by using divisibility rules. Let's say 2 cans of beans co ...more
Offensive pictures, depressing tweets, political statuses, and just plain old dumb comments are only a few of the reasons why people unfriend or unfollow others on social media sites. Sometimes it's just social spring cleaning, other times there's no reason at all. Personally ...more
So, how does someone keep their hacking life completely secret? What This Is: I'd like to know how hackers keep their hacking life secret. So with a bit of experience and knowledge obtained from elsewhere I want to share what I know, and also ask a few questions to become ev ...more
Hello there learners and readers! I figured I'd show you guys my problem and how I solved it, hoping that it would help people who are facing the same issue. Today, we'll be talking about the solution of read failed: Network is down ioctl(SIOCSIFFLAGS) failed: Operation not ...more
This anemone flower looks extremely delicate and thus complicated, but trust us when we say that it's much easier than you think to mold this flower into being. Take a look at this cake decorating tutorial to learn how to craft an elegant black and white anemone flower that g ...more
If you just got an iPhone 12, 12 Pro, 12 Pro Max, or 12 mini, and you've never owned an iPhone before, some of the most basic tasks can be baffling. Shutting it down, force-restarting it, quitting apps, and even viewing the percentage of battery remaining sound simple but aren ...more
Hi there, Crackers, Welcome to my 7th post (Part-1), this tutorial will explain about the basics of Batch Scripting. Why Batch? Batch is a really easy and interesting scripting language, it is used for malicious purposes, i.e. how can you exploit the victim's PC/life, furthe ...more
Creating realistic trees in Maya is hard enough without the leaves, but when you add the lively green leaves onto the branches, the difficulty level doubles. An animated leaf needs to mimic a real life, living leaf, which is intricate, to say the least. So, if you've been havi ...more
Walking into a bar or crowded dinner party can be intimidating. Being surrounded by a bunch of people you're unfamiliar with or trying to impress the smokeshow at the bar is no easy task...for most of us. Video: . If you aren't as smooth as Ryan Gosling (and let's face it, you ...more
You might be proficient at sending your family and friends money using Apple Pay Cash on your iPhone, but what about when you need some digital currency in your wallet to buy in-app purchases or to get back the money you spent on someone's lunch? Requesting some Apple Pay Cash ...more
How say faux hawks were only for short hair? Get the faux hawk without cutting your hair. Watch this hair styling how to video to learn how to style your hair with a faux hawk. Materials: Finesse hairspray Bobby pins Babybliss pro nanotitanium 1'' straightening iron
Today's word is "hyperbole". This is a noun which means an exaggerated statement. For example, you can say, "Jane said to her sister, 'Your butt is as big as the State of Wisconsin.' She used hyperbole to emphasize her point that her sister is overweight."
Remember when MITMing people to pentest webapps and log-ins you had to fire Ettercap,Arpspoof, SSLstrip, then look for credentials in the captured packets? No more thanks to (or fault of?) "Subterfuge". Surprisingly, there's nothing about Subterfuge here on Null Byte (is it? ...more
'Tis the season to be jolly, and what's more jolly then unleashing a torrent of bullet fire on the opposing team using a LMG emblazoned with a Santa Claus emblem? I recently did an emblem roundup of superhero and villains for Call of Duty: Black Ops 2, but now it's time to us ...more
Though you can use the Social Engineering Toolkit to clone websites, this way is much more customisable. For example, you could send the credentials your victim enters to a script that mails you notifying you of new data someone's just entered, or automatically store them in ...more
Want to build your own life-sized, working replica of WALL-E? Be prepared to take on a second job! Mike Senna spent two years perfecting his own version, working 25 hours a week and totaling somewhere around 3,800 hours for the whole project. He had no blueprints to go by, so ...more
Instant ramen makes me nostalgic for my college days, when a bowl of this cheap noodle soup was my go-to comfort food for many all-nighters. I always opted for using the provided seasoning back then, but it turns out there are many ways to transform this dish from college dor ...more
Bash (Shell) Scripting for Beginners Intro I am an occasional Linux user currently playing around in CrunchBang and loving it. Prior to this, I used to dual-boot Windows and xfce-buntu (or xubuntu) at work, and due to some unforeseen circumstances, my screen always went fuzz ...more
Craigslist is probably the greatest site ever created, and I'm just talking about it's classified section, both awesome and amazingly creepy. Seriously, spend 20 minutes scrolling through the personals and you'll never want to take your eyes off the screen. But I digress—Craig ...more
The desktop browser market has some stiff competition going on, but Opera has always been able to maintain its market share by offering innovative features such as a data saver option. With over 350 million users, it's safe to say folks are appreciative of the efforts being ma ...more
If you've recently built a Wi-Fi spy camera out of an ESP32-CAM, you can use it for a variety of things. A baby monitor at night, a security camera for catching package thieves, a hidden video streamer to catch someone going somewhere they shouldn't be — you could use it for p ...more
If you're struggling with freeing up space on your iPhone thanks to your massive collection of photos and videos, there's a feature in iOS 8 that could help you get some of that much-needed internal storage back while giving you more room in the future. It's called iCloud Pho ...more
The most common Wi-Fi jamming attacks leverage deauthentication and disassociation packets to attack networks. This allows a low-cost ESP8266-based device programmed in Arduino to detect and classify Wi-Fi denial-of-service attacks by lighting a different color LED for each ty ...more
Check out this video from Chemical Reaction Tutorials (CRTutorials). If you love filmmaking, prop making, editing and everything else that goes along with making movies, then you'll want to see what Adam has to say about axes. Adam explains how to create a simple axe film pro ...more
There's a hidden feature on iOS that will turn your iPhone or Apple Watch into a remote control for your nearby iPad or other Apple devices — and it's nowhere near as complicated as Switch Control. For the longest time, Switch Control was the only built-in way to control one ...more
The NSA's massive internet spying efforts will continue. In President Obama's latest press conference, he went public to (in so many words) say that the NSA's spying efforts will continue uninterrupted. This, coming just weeks after the Amash Amendment which would have defund ...more
Though they share the same name, the HTC One and OnePlus One have completely different sound quality. HTC had put a lot of time and effort into fine-tuning their BoomSound technology, while OnePlus is still fairly new to the game, with brand recognition being a much greater ob ...more
Watch to learn how to say the numbers from seventy to eighty in French. soixante-dix - seventy soixante-onze - seventy-one soixante-douze - seventy-two soixante-treize - seventy-three soixante-quatorze - seventy-four soixante-quinze - seventy-five soixante-seize - seventy-six ...more
Say it with cupcakes! Chef Alison McLoughlin of The Culinary Institute of America has a great suggestion: create a beautiful "bouquet" of floral cupcakes for any festive celebration. Watch this tutorial to get useful ideas on how to bake and decorate your own cupcake creations.
Even if you've put aside your percolator and have gone the way of the pod coffeemaker, there are still dozens of ways to use your leftover coffee filters. Incredibly cheap, absorbent, and shaped with a ruffle, coffee filters are useful in the kitchen, garden, and around the ho ...more
Want to be the Donald Trump of Restaurant City? Watch this video tutorial to learn how to hack Restaurant City (02/21/10) with Cheat Engine 5.6. Hex: FFFFFFB8D02A0FF2 Restaurant City is a Facebook game that allows you to create and manage your own virtual restaurant. Descr ...more
Getting a new phone is like getting a pair of new socks—you can't wait to try them on and when you do, they feel totally awesome. Maybe that's just me, but for many customers that have already received their highly anticipated iPhone 5 in the mail, awesome is definitely not th ...more
Notes: My guides are setup like old Lego instruction booklets; picture intense/text lacking. Just remember you're building from the ground up, each step is a layer to go onto the previous layer. Any stone block can be replaced with blocks of your choice. Mycelium is used in ...more
The launch of Android 4.4 KitKat alongside the Nexus 5 was met with much fanfare from Android enthusiasts. Unfortunately, if you don't have a Nexus device or are still awaiting the 4.4 update, you may feel a bit left behind. If you have a carrier version of the HTC One, 2013' ...more
When you're a Windows OS user it's very easy to send out attachments on emails as .doc documents, made in Microsoft Office or Excel. But just because you're a Windows user doesn't mean your friend or coworker is. Or say that you're a MAC user and your friend keeps loading you ...more
OTW's great Tutorial Hack Like a Pro: How to Save the World from Nuclear Annihilation gives me the inspiration to try this on Win7 sp1. I did this under Bugtraq 2 Black Widow but it works almost similar on Kali-Linux. Step 1: Start All Services Und Run Metasploit On bugtraq ...more
Google Maps, in conjunction with the Android operating system, is a powerful tool for navigation that is often underutilized. While it's no secret that it can get you to wherever you're going and back, some of you might not know that you can use Google Maps without even having ...more
To restore an iPod Touch from lockout or forgetting a password, pull up iTunes on whatever computer you are using. Plug the USB cord into the iPod touch and plug the USB cord into the computer. The iPod will say "locked out" or "access pass code" and the computer will says tha ...more
The Google Assistant is great about understanding what you actually mean, so you don't have to issue exact commands like you do with Amazon Alexa, for instance. But even though it's a master of colloquial speech, it could still be better, and that's where shortcuts come into p ...more
Calling all popcorn fanatics: we know a bit of drizzled butter is all that's needed to make a delicious bowl of your favorite finger food, but we've got some interesting mash-ups of flavors that we think you should try the next time you veg out on your couch for another Netfli ...more
!!! READ THIS FIRST !!! - 4 april 2009 - First of all: make sure that you're using FlashPlayer version 9 - A usefull tool to switch from version at any time is FlashSwitcher get it here: http://tinyurl.com/55up92 Howto: Buy an apple in the foodstore. Setup Cheat Engine: htt ...more
Over the past couple of weeks, there have been a series of high-profile hacks and leaks. From the rooting of CombinedSystems, to a secret FBI conference call leak, all the way to the distributed denial-of-service (DDoS) attacks on U.S. government sites—with a lot in-between. A ...more
Drawing Roses that look great isn't difficult, but it will take a little attention to detail. Apart from that it's as simple as putting your pencil to the page. Step 1: If you draw from life, or draw from a photo, I suggest starting the same way - outline the major shapes of ...more
When Google introduced their new launcher alongside the Nexus 5, one of the most innovative features was the "always listening" voice search, meaning that at any time you were on your home screen, triggering a Google search was as simple as saying "Okay, Google." Combined wit ...more
Greetings my fellow hackers, In the previous article, I discussed briefly about ransomwares and their devastating capabilities. Devastating in a way that ransomwares are not only known to encrypt files but to also lockout some specific functions of the system and hold it up f ...more
If you're grossed out by anything creepy, crawly, and with more than 4 legs... then stop being so close-minded and eat some bugs already, dammit. Or at least, that's what this trend is trying to tell you (in so many words). Don't Miss: The Latest Pairing for Your Cookies: Co ...more