This is a basic tutorial about how to make traditional Cuban Flan. Preheat the oven at 350 degrees. Put the sugar into a small sauce pot and place it on the stove over medium heat. Keep turning the pot from one side to the next until the sugar has melted completely. Once the s ...more
Warnings i cant be held responsible for any illegal act done by anyone but myself and there are copyrights so notise that taken the trademarks or copyrights are strigtly prohibeted by law and will be punshied by law and i or my partners cant be held responsible for sudo camma ...more
There is a vast amount of knowledge out there on computers! In fact, it is so vast that no single person could ever possibly ever learn everything there is to learn about hacking or computers in general. People usually specialize in a certain field: cryptography, computer secu ...more
Metal is a great material to work with. It's rigid, tough, malleable and conductive, but sometimes the part we need doesn't exist in any store. In order to create custom pieces, you need to either melt the metal and cast it in a mold, or heat it until it's soft enough to shape ...more
Facebook's new Timeline feature has been rolling out gradually since its unveiling in September, but yesterday it finally became available to Facebookers everywhere. It's even available on your mobile device, too. Those who want to upgrade to the radical new profile design can ...more
These impressions are coming from a person completely new to the Final Fantasy Online world. Never played FF 11 or the FF 14 Beta. This game is not friendly to new people. The account creation is a Kafka like experience in things that don't make sense. For the game itself, the ...more
By Ethical Traveler As the world becomes ever more interconnected, being an ethical traveler becomes both easier and more urgent. Travelers today have access to far more information than we did even 10 years ago. We can observe–almost in real time–the impact that smart or sel ...more
Tutorial showing the basic netbios commands in Windows to access or hack a remote, unprotected computer. Use basic netbios commands. Click through to watch this video on tricklife.com
This video tutorial will teach you the science of dissection. You'll see how to dissect a small shark and Necturus (a mudpuppy, which is a salamander), with a focus on basic musculature. You learn all you need to know from the outer anatomy of these animals muscles.
This video features a very handy technique for writing a cover letter in less than a minute- and all you need is a tool called Text Expander, which can be easily downloaded. The basic idea behind this program is that you can create shortcut keys to text that you commonly use, ...more
A basic introduction to Registry Editing. Learn how to hack Internet Explorer's text.
Ukuleles look like small guitars but there are only 4 strings on them. Learn tips on how to voice a few chords on the ukulele in this free video clip series. Part 1 of 15 - How to Play basic chords on the ukulele. Play basic chords on the ukulele - Part 2 of 15. Click through ...more
This video provides you with a basic walkthrough of how to install ChickHEN and CFW. Watch as a TA-088v3 PSP transforms from having default firmware version 5.03 into 5.51 MHU in a matter of minutes. Doing this will allow you to play tons of ISO games without needing any UMD.
This video will take you step by step on how to do some basic memory editing and hacking in Super Mario All Stars: Super Mario Brothers 3. In a matter of minutes, you'll find yourself plowing through Super Mario Brothers without worrying about losing lives. This particular h ...more
If you love to watch something straightforward and dry, this tutorial is perfect for you. This is a very basic video and not that much fun to watch, but you will learn how to navigate pdf documents, if you are an absolute beginner in the world of computers. But we're warning y ...more
There are a lot of frustrations when you're dealing with cramped living quarters, but you can do a lot of good cooking in your tiny kitchen if you make the most of your space. These storage hacks will make it easy to cook delicious meals, no matter how limited your square foot ...more
Welcome back, my tenderfoot hackers! This is the third installment of my series on basic Linux skills that every hacker should know. Although some hacking tools are available for Windows and Mac, every real hacker uses Linux—for good reason. Make sure to check out Part 1 and ...more
Welcome back, my budding hackers! In previous tutorials, we've looked at some of the basic commands and concepts for using Linux. Along the way, I realized that I've failed to provide you with some basic background material on the stdin, stdout, and stderror. In human langua ...more
Welcome back, my budding hackers! In my continuing effort to build your basic Linux skills for hacking, I want to show you how to build a secure "tunnel" to MySQL. Of course, the techniques I use here could be used for any application, but since MySQL is such a critical app ...more
Our good friend Kipkay is at it again! He has earned six figures from videos like HowTo Unlock Handcuffs and HowTo Make a Stink Pen Here he teams up with Howcast to deliver the ultimate treasure hunter's secret weapon: a metal detector. This homebrew hack combines the AM freq ...more
If you want to learn patterns drafting/making in different sizes (EXTRA SMALL, SMALL, MEDIUM, MEDIUM-LARGE, LARGE, EXTRA LARGE), now it becomes easy with these great videos that make patterns drafting easier and clearer. Step 1: How to Take Body Measurements Video: . Step 2: ...more
Christmas sweaters are one of those anomalies that everyone complains about, yet so many are sold every year that someone has to like them (kind of like fruitcake). Whether you're keeping tradition for tradition's sake, or secretly you actually enjoy ugly sweaters (we won't te ...more
If you're dressing up as someone iconic for Halloween, having the right voice can make or break your costume. Think about it—having a Darth Vader lookalike walk up to you and start talking like Alvin the Chipmunk would probably ruin the effect (and possibly be a little creepy) ...more
LED throwies are cheery glow-dots you can make in seconds from simple components and stick to any ferro-magnetic surface. But that's just the beginning — here's how to hack and modify them. First make a basic LED throwie, and chain them up into big throwie "bugs." Then learn ...more
It can be incredibly frustrating to take closeup shots with an iPhone camera—or any smartphone camera for that matter. Even if your phone's camera is top of the line, you'll still get a fuzzy picture if you get to close to your subject. To resolve this, you could always purch ...more
In this project, I'll show you how to make an itty-bitty outdoor BBQ from leftover beer or soda cans. It's the perfect summertime hack if you don't have a grill and are cooking for a small group of people—one bratwurst at a time. You can grab the wire grill template here. Vide ...more
Need to add more space in your small closet? For a simple organizational hack, simply connect two clothes hangers with a metal soda tab so that you can hang two articles of clothing on a closet rod slot instead of just one. On the flip side of the coin, if you don't have spac ...more
What's a penny worth these days? Not much. But could there be some free energy hidden inside your spare pennies? You'd be surprised! See how I hack together stacks of pennies into makeshift batteries that can drive small-current devices like LEDs and calculators. Video: . You' ...more
It's a common and unfortunate myth that you need to work in web or app development if you have a knack for coding and design. In fact, more and more development pros are entering the exciting and increasingly lucrative world of game design, thanks to a growing demand for strat ...more
We've already covered how to remove the Home button lag on the Samsung Galaxy S4, now let's take a look at how to speed up a few more key areas on your new device. This GS4 is already blazing fast, but let's squeeze every ounce of speed we can from it by making a few basic twe ...more
When it comes to proper tomato storage, conventional kitchen wisdom (and Alton Brown) state that tomatoes are best stored at room temperature—not in the refrigerator. Supposedly, refrigerated tomatoes develop a mealy texture and lose their flavor if they are exposed to cooler ...more
Welcome back, my rookie hackers! I recently began a series on using Metasploit, and my goal with it is to teach you the very basics the incredibly powerful hacking tool has to offer while progressively moving on to the more advanced features. In my first Metasploit installme ...more
Welcome back, my greenhorn hackers, and happy New Year! Now that your heads have recovered from your New Year's Eve regaling, I'd like to grab your attention for just a moment to preview 2015 here at Null Byte. I hope you will add your comments as to what you would like to se ...more
Greetings to all geeks, hackers, nerds, and explorers of Null Byte. Welcome to my brand new tutorial, "Using BASH for Computer Forensics". This tutorial will give you a look at how the computer programming language, Bash, can be used to find out details on apple devices for la ...more
Correctly identifying the underlying technologies that run on a website gives pentesters a considerable advantage when preparing an attack. Whether you're testing out the defenses of a large corporation or playing the latest CTF, figuring out what technologies a site uses is a ...more
File inclusion can allow an attacker to view files on a remote host they shouldn't be able to see, and it can even allow the attacker to run code on a target. To demonstrate these vulnerabilities, we'll be practicing PHP file inclusion using the Damn Vulnerable Web App. We'll ...more
Step aside, vodka—whiskey will soon be the best-selling hard liquor in the United States. The whiskey renaissance has been largely attributed to the current trend for locally- and artisan-produced goods. Local whiskey distilleries are rapidly increasing in number across the n ...more
Welcome back, my tenderfoot hackers! As most of you know, I am strong advocate for using Linux as a hacking platform. In fact, I would say that without knowing Linux, you will never become a professional hacker/pentester. On the other hand, there are many here who come to Nu ...more
Two years ago, driven by a good friend of mine i decided to give it a try on timelapse photography. I had a DSLR camera but didn't had an intervalometer, so i assembled a small electronic circuit on top of an Arduino Uno, made some basic code and did my first timelapse movie. ...more
When the Google Maps web app got a massive redesign earlier this year, I was pretty excited to try it out, but it was a fairly disappointing update for me. The slower load times, confusing street view, and bicyclist neglect are just a few of the reasons I don't enjoy it over t ...more
When casting a flyrod, in most cases, tight loops will allow the fly to travel farther, more accurately, and with less effort. To cast these tight loops, the tip of the rod must travel in a straight line path, slack must be eliminated, and there must be a constant acceleration ...more
The mighty toaster oven may be the most useful small appliance ever, whether you're a college student who needs to heat up your Bagel Bites or a professional looking for a quick way to warm up a frozen pizza after a long day. But that toaster oven is no one-hit wonder. With th ...more
Welcome back, my greenhorn hackers! Congratulations on your successful hack that saved the world from nuclear annihilation from our little, bellicose, Twinkie-eating dictator. The rest of world may not know what you did, but I do. Good job! Now that we hacked into the malevol ...more
If you have a smartphone with a good camera, chances are you don't think it's good enough. There's always something that can better with your mobile pics, and for me, that something is closeup shots. I love macrophotography. The finer things in life excite me, finer meaning t ...more
The battery in the Samsung Galaxy S4 may pack 500 more milliamps per hour than the old S3 battery, but that doesn't necessarily mean more battery life. High-powered devices need lots of juice, and the S4 is definitely more powerful than its predecessor. The new battery can han ...more
Null Byte users have often requested video content, but the question has always been what format would best serve our community. This week, we partnered with Null Space Labs, a hackerspace in Los Angeles, to test the waters by hosting a series of talks on ethical hacking for s ...more
Ask ten different people how they feel about boxed cake mixes, and you'll likely get ten different answers. Some baking purists will berate them and throw them in the same category as garlic presses and knife sets sold on infomercials. Many people will say that they prefer not ...more
With an ordinary birthday card, we can introduce a physical device which contains malicious files into someone's home and deceive them into inserting the device into a computer. In my last series, we used a Post-it note to trick a neighbor into visiting a website that we cont ...more
I've done numerous tutorials in Null Byte demonstrating the power of Metasploit's meterpreter. With the meterpreter on the target system, you have nearly total command of the victim. As a result, several of you have asked me for a complete list of commands available for the m ...more
Ah, bello risotto. There are few comfort foods in the world that provide the same savory creaminess. Yet for all its simplicity, risotto has gotten a bad rap as a difficult dish to cook. In actuality, nothing is further from the truth. Much of risotto's undeserved reputation ...more
Greetings. This how-to on hacking Windows 7/8/10 etc. admin account passwords using Windows Magnifier is focused on adding, changing, or deleting an admin level account on a Windows 7/8/10 etc. Maybe you forgot or lost the password to your Windows Admin account, this guide wi ...more
The other day I was perusing my Instagram when I came upon a curious hashtag... #OnePotPasta. Intrigued, I investigated further and discovered a whole world that was previously unbeknownst to me. How was it possible, I asked myself, to cook pasta with all of the ingredients i ...more
Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this certification exam, and what material will be covered on the exam?" Now I have an answer for you. The White Hat Hacker Associa ...more
Many of my aspiring hackers have written to me asking the same thing. "What skills do I need to be a good hacker?" As the hacker is among the most skilled information technology disciplines, it requires a wide knowledge of IT technologies and techniques. To truly be a great h ...more
Rich, creamy chocolate cups stuffed with smooth, salty-sweet peanut butter in a bite-sized package—yep, Reese's Peanut Butter Cups are an amazing fix for your sweet tooth at best, and a guilty pleasure at worst. It's easy enough to buy them on a whim at the local grocery store ...more
Are you a messy burger eater? Ants and fruit flies invading your home? Hate drinking warm drinks? Find out the quick and easy DIY solutions to these problems with these 10 amazing tips and tricks for the summer. Video: . I had seen pictures of some of these useful ideas on the ...more
This ultra clever mod of household junk makes for an ingenious variation on the carnival classic. The essence of this treat is basic carmelization. Start with juice. Heat. Spray liquid into air so that it crystallizes into a thready form resembling cotton. Or as the Aussies c ...more
Using just a small sticky note, we can trigger a chain of events that ultimately results in complete access to someone's entire digital and personal life. Imagine arriving home one night after work and there's a Post-it note on your apartment door with the website "your-name- ...more
First of all, Merry Christmas and Happy New Year to all Null-Byters that learn and teach in this wonderful site. In this article we will explore the basics of the meterpreter's IRB (Interactive Ruby Shell). We will be using Kali version 1 as the attacker machine and Windows 8 ...more
New statements from Apple make it clear that they do not believe a hacker, or group of hackers, breached any of their systems. This comes after a recent report from Motherboard that a hacker gang called the "Turkish Crime Family" is threatening to remotely wipe up to 559 milli ...more