Welcome, my neophyte hackers! The aspiring hacker needs to know a bit of Linux to be successful, and probably most importantly, Linux networking. To fill that knowledge gap, I'm offering this guide on Linux networking basics. I assume that you understand a small amount of net ...more
Welcome back, my rookie hackers! As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to maintain confidentiality and integrity of data. To be a ...more
Welcome back, my aspiring hackers! As you have probably discovered by now, the file system in Linux is structured differently from Windows. There are no physical drives—just a logical file system tree with root at the top (yes, I know, roots should be at the bottom, but this ...more
Welcome back, my aspiring hackers! Domain Name System (DNS) is one of those things we seldom think about unless it doesn't work. Then, it can be very frustrating when we attempt to navigate to a website and we get that frustrating error message. DNS enables us to type in a d ...more
Welcome back, my aspiring hackers! Although this article may have been better placed first in this series, I doubt that anyone would have read it when just starting out studying Linux. Now, that you are well into your Linux studies and have some familiarity with how it operat ...more
Welcome back, my aspiring hackers! In recent tutorials, I have made reference to the name and location of the Linux devices in the file system, such as sda (first SATA or SCSI drive). Specifically, I have mentioned the way that Linux designates hard drives when making an imag ...more
The $35 Raspberry Pi is an amazingly useful single-board computer (SBC) with a good balance of price, performance, and connectivity options. But for some projects, it just isn't enough. Whether you need more computing power, a smaller size, or better machine-learning capabilit ...more
The 'One Small Hack for Man' achievement in Call of Duty: Black Ops is available if you own the Rezurrection DLC and requires you to hack anything within the game with the hacking device. Take a look at this guide from the Achievement Hunters to learn just how to unlock the ac ...more
A small light tap is one of the easiest and most basic embellishments, and is a nice way for the follower to mark and express the double-time ('quick, quick') - or the 'and' count in between the beats - while the leader is leading a step on the whole beat ('slow'). A tap can b ...more
The days of entering left, right, left, right, up, down, up, down, a, b to cheat your way through a video game are long gone. With achievements and trophies in existence, game developers have, for the most part, removed cheats from video games. But cheats aren't entirely gone ...more
Welcome back, my tenderfoot hackers! As you should know from before, Snort is the most widely deployed intrusion detection system (IDS) in the world, and every hacker and IT security professional should be familiar with it. Hackers need to understand it for evasion, and IT se ...more
Welcome back, my hacker trainees! A score of my readers have been begging for tutorials on how to hack Wi-Fi, so with this article, I'm initiating a new series dedicated to Wi-Fi hacks. This will probably be around 6-9 articles, starting with the basics of the technologies. I ...more
When you look at an Italian flag, what do you see? Green, white, and red? Well, I see a Caprese salad. And no, I do not need to have my vision checked. It simply means that I have the eyes of a chef. This classic combination of mozzarella, tomato, and basil has been dubbed th ...more
Welcome back, my novice hackers! This new series on Bluetooth hacking was inspired by a recent episode of Mr. Robot (my favorite TV show). In episode 6, Eliot hacked the bluetooth keyboard of the police office in order to hack the prison and release his nemesis, Vera. This is ...more
Between sharp knives and slippery produce, basic meal prep can be an absolute massacre. Even the most professional knife-wielders don't stand a chance if they're working on unstable surfaces. Don't Miss: 10 Paper Towel Hacks for Your Kitchen & Beyond This tip is the very firs ...more
Your social security number, credit card information, and medical history can fall into the wrong hands if you're not careful about how and where you share your data online. If you really care about your data, there are tools and techniques you can utilize to protect yourself ...more
Your BIOS, or Basic Input Output System, is the firmware on your motherboard responsible for initializing your computer's hardware when it is first powered on. It probes for video adapters, RAM, the whole works. The BIOS provides a small library of basic input/output functions ...more
As a side scrolling game, performing various jumps in Super Mario Run on your iPhone or Android is as vital as eggs in a breakfast buffet. Tapping away on your phone's screen like a madman won't accomplish much in this game, so it's imperative that you familiarize yourself wi ...more
Bokeh (which translates to "blur" in Japanese) is a photography technique referring to the blurred areas of a photograph. Basic bokeh photographs often have one point of focus, while the background falls away into a dreamy, blurred haze. The technique can be taken even furthe ...more
Learning Chinese is hard, but it can be a lot easier with the help of a few great apps. As a native English speaker who's currently living in China, this is a process I've recently gone through. After playing the field, here are the three apps I personally think will help you ...more
We're maniacs for mustard: we put it on our sausages, our salmon, our turkey club sandwiches... you name the dish, we find an excuse to spread mustard on it. So it's not surprising that it's a common item on our grocery list. However, we had no idea how ridiculously easy it w ...more
Welcome back, my hacker novitiates! Recently, I demonstrated a hack where you could redirect traffic intended for one site, such as bankofamerica.com, to your fake website. Of course, to really make this work, you would need to make a replica of the site you were spoofing, or ...more
Web application vulnerabilities are one of the most crucial points of consideration in any penetration test or security evaluation. While some security areas require a home network or computer for testing, creating a test website to learn web app security requires a slightly d ...more
Welcome back, my hacker apprentices! Although there is a multitude of different hacker types, the one target they all share is the database. I often refer to the database as the hacker's Holy Grail, or the ultimate prize for an effective hack. That's because the database—alm ...more
Welcome back, my greenhorn hackers! I began this series on scripting awhile back to teach all aspiring hackers how to write some basic scripts for hacking and reconnaissance. Without developing some basic scripting skills, the aspiring hacker will be condemned to the realm of ...more
For over 20 years, a tiny but mighty tool has been used by hackers for a wide range of activities. Although well known in hacking circles, Netcat is virtually unknown outside. It's so simple, powerful, and useful that many people within the IT community refer to it as the "Swi ...more
Welcome back, my rookie hackers! So many readers come to Null Byte to learn how to hack Wi-Fi networks (this is the most popular hacking area on Null Byte) that I thought I should write a "how-to" on selecting a good Wi-Fi hacking strategy. Many beginners come here looking t ...more
PUBG is currently taking the mobile world by storm, and it's easy to see why. The game has breathed much-needed life to the multiplayer shooting genre, primarily by adding an element of sheer terror as you scavenge for weapons in a hostile environment. With new players continu ...more
In order to make your food taste good, your favorite restaurant is most likely using way more salt than you think they are (among other pro secrets). Which is why when you ask just about any professional cook what the biggest problem with most home-cooked meals are, they almos ...more
Hackers and makers are often grouped under the same label. While hackers draw on computer science skills to write programs and find bugs, makers use electrical engineering to create hardware prototypes from microprocessor boards like the Arduino. We'll exercise both sets of sk ...more
As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance. The issue with port ...more
Welcome back, my fledgling hackers! In an earlier tutorial, I introduced you to probably the most popular scripting language for hackers, Python. To become a professional hacker, you need to have some scripting skills and Python is a good choice if you want to master just one ...more
Autumn is a time of year when everything looks, smells, and tastes good. The scents of cinnamon and spices are everywhere you go, and even the dead leaves that fall off the trees are pretty. In particular, the fruits and vegetables of the season are gorgeous. But let's get se ...more
Equifax reported on Sept. 7 that it discovered a breach on July 29 which affects roughly half of Americans, many of whom don't realize they have dealings with the company. Hackers got away with social security numbers, addresses, and driver's license numbers, foreshadowing a " ...more
If you want to follow Null Byte tutorials and try out Kali Linux, the Raspberry Pi is a perfect way to start. In 2018, the Raspberry Pi 3 Model B+ was released featuring a better CPU, Wi-Fi, Bluetooth, and Ethernet built in. Our recommended Kali Pi kit for beginners learning e ...more
To hack a Wi-Fi network, you need your wireless card to support monitor mode and packet injection. Not all wireless cards can do this, but you can quickly test one you already own for compatibility, and you can verify that the chipset inside an adapter you're thinking of purch ...more
When setting up your home office or giving it a makeover, the desk is the key to making the room a functional workspace. And if you're in there all day, it also has a significant impact on your health. Standing desks can help offset some of the adverse health risks associated ...more
A perfect project for the budding roboticist in you! This video shows you how to make a small robot gripper using basic household items. Press the button and make the robot's come together! You will need: a small blow torch or butane lighter, a glue gun, a dremel or rotary too ...more
New to hacking? Hacking time in Bejeweled Blitz isn't all that complicated. You just need to be familiar with what you are doing, and the only way to do that is to watch this video tutorial to learn how to hack the Facebook game Bejeweled Blitz (10/27/09). This video is a bas ...more
Cake decorating is a real art so who better to learn from than from a professional cake artist? This video is full of professional advice and takes you through the process of how to use butter cream to frost and decorate your cake. Donna Imsand, The Cake Artist, shows us how t ...more
The transistor is the most basic and important part of electronics, allowing small changes in voltage to turn things on and off. On, off. 0, 1. There's electronics. The grandaddy of them all is the N channel MOSFET, the most important transistor. This video will teach you how ...more
Creating animation in Flash CS4 is the most fundamental thing that you can do using this powerful software. It is also quite confusing to the uninitiated. This video will introduce you to the basics of creating animations in Flash by demonstrating the construction of a small f ...more
The Terminator is Arnold Schwarzenegger's most famous character, and arguably the most popular cinema cyborg of all time. This two-part video features detailed instructions for making your own very small terminator out of two Lego figures, one skeleton and one normal, and some ...more
Rich Harrington explores the new realistic behaviors of light and shadow in After Effects CS4. In this software video, Rich concentrates on creating and positioning light sources and creating shadows. He also moves the camera around to create a small action clip. Start with a ...more
Do you work with 3D graphics? Have you ever wanted to have one character that you've modeled destroy hordes of tiny other characters you've made? Well want no more. This video series will show you how to model and animate a small army of little models that will walk around and ...more
The Stirling engine is a relatively old type of external combustion engine that has never really found a niche despite its unique advantages over conventional internal combustion engines. This video for the DIY-inclined will show you how to make your very own small Stirling en ...more
Want a cool way to display your digital camera? It just takes a little clay and some time to make something really worthwhile, like this clay kitty cradle. Watch this video to see the basic steps to sculpt a clay cat and mouse digital camera cradle. This DIY clay sculpture is ...more
Move over NASA— SpaceX is taking over. Well, not really. But today, the privately funded spacecraft company broke all expectations when their Dragon capsule fell to a soft landing in the Pacific Ocean, completing an undoubtedly successful demo flight of nearly two full trips ...more
In this how-to video you will learn to do the land and roll which is helpful for jumping from high places. This is a basic roll for Parkour and is needed to do the tricks correctly. Be safe, and don't hurt your self, start small and work your way up.
If you own any bored reptiles and want to zest up their terrarium environment on a budget, this video will teach you how to make a cool waterfall for their terrarium using basic materials. It should take a couple of hours, and the results are very pretty (depending on your pai ...more
They are after you from all over the globe. Looking for ways to exploit you. Ways to hurt you. Not political terrorists, but rather "info terrorists." Each month thousands of websites get hacked into and have hidden links inserted into the pages by people wanting their spam si ...more
Even with all the technological advancements, iPhones and Blackberries look sleek but lack individual style, their backs a basic black or silver. Turn a blah cell phone cover into a fairytale work of art by watching this video. Using 100% silicone and small jewels, pearls, an ...more
TOUCHPAD HACK - This video tutorial shows how to transform a touchpad into a useful mini graphics tablet with some simple, everyday items. You will need a 1.5V battery, a small ball bearing, and a Philips head screwdriver. Watch this video tutorial and learn how to transform a ...more
The Swiss ball brings an element of instability to basic exercises like the straight leg bridge. This stimulates and conditions your deep core muscles improving spinalstability. In addition to these small but important joint stabilizer muscles the Straight Leg Bridge also targ ...more
This is a tutorial on how to style your hair using styling gel and hair spray in the style known as "scene/emo". This is basic information on how to spike your hair, how much gel to use, and techniques on how to apply the gel to your hair. As explained in the video, gel from t ...more
A video from http://www.donpower.me that shows how to draw a simple Christmas tree. This video is basically for kids. The presenter in this video, shows how using simple crayons a Christmas tree can be drawn in not time. The short duration of this video (0:59 seconds) is proo ...more
Including a file (also called a module) is easier in Python than in some other common programming languages. This video shows you how you can take a small, basic file and then incorporate it into your Python based computer program.
See a basic netbios hack, showing what happenes to ppl who leave files and folders shared over the Internet. Hack computers with open shares. Click through to watch this video on tricklife.com
This is episode 3 of the series. You will learn how to hack a basic combination lock. Using some basic household items such as a can of soda, scissors and the lock. He demonstrates and takes you through 7 steps, such as cutting the top of the can off, cutting a rectangle size ...more
If you like homemade light shows, this is one hell of a way to do it. AP Digital light shows you how you can hack a small fan into a special mirror used to create a poor man's PIC-based laser show. It's an experimental method of balancing a fan-mounted acrylic mirror for spir ...more