With this video tutorial, you'll learn how to hack demo versions of applications such that they'll run indefinitely. You'll just need to modify the date and time on your computer. Learn how to use trials of programs without them ever expiring instead of buying the real thing w ...more
If you've ever wondered how software pirates can take software and crack it time and time again, even with security in place, this small series is for you. Even with today's most advanced methods of defeating piracy in place, it is still relatively easy to crack almost any pro ...more
Today's guide is on creating a password protected folder on Windows 7 without any additional software. Yes, you heard that right. No extra software at all! This guide is intended for beginners. But please note, this method should not be used to store financial or otherwise hig ...more
You can easily lock any folder on your Windows computer with a simple Notepad hack. By creating a batch file, you can hide a folder and require a password be entered before it becomes visible and accessible. This is a great tool for locking sensitive information, like pictures ...more
When i went to class today, a good friend asked me a question. He wanted to know what the best hacking software was to basically do everything. What i told him was this: Well there isn't an "Ultimate" tool boot there are a number of tools which deserve a "Medal." So what i'm t ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. VoxelSniper is one of many very useful world editing plugins available to Minecraft servers. In my opinion, it is one of the best and certainly the most used of all server side plug ...more
Welcome back, my tenderfoot hackers! In some of my past articles, I've shown numerous ways of embedding a listener/rootkit on a remote system, including buffer overflows of the operating system, getting the victim to click on a link to our malicious website, and sending a mal ...more
Completely Hide UTorrent and Bittorrent Software in Your PC While It Is Still Running!. Do you download anything from torrent sites? If yes, then you may heard about Bittorent and uTorrent software. These are the two most popular software programs for downloading torrent files ...more
In most cases, when the free trial of software is over, that's it—you're left to either pay for it or find an alternative. But what happens if the trial wasn't long enough to sell you on the product? It'd be nice if there was a way to test it out again without having to whip o ...more
This video is about how to download movies, music, and software using torrents. The first thing that you will have to do is to download either uTorrent or BitTorrent. After you have download either of the two, go ahead and browse for a torrent website. After you have found the ...more
Welcome back, my greenhorn hackers! A few years back, Microsoft implicitly recognized the superiority of the Linux terminal over the GUI-based operating system by developing PowerShell. Since Windows 7, every Windows operating system has had PowerShell installed by default, a ...more
Welcome back, my hacker wannabees! Since nearly all hacker tools and platforms are developed in the Linux/Unix operating systems, this series of tutorials are for those of you who want to be hackers, but are unfamiliar with Linux. We've looked at numerous basic commands in th ...more
Welcome back my fellow hackers! In my last few articles, I've concentrated on what is called a listener, which is basically the same thing as backdoor and rootkit, only "listener" sounds much less malevolent than the other two terms. First, I covered embedding a listener in ...more
If you've ever heard software piracy terminology being discussed, I'm sure the term KeyGens came up. KeyGens is short for key generator, which is a program that exploits algorithmic faults in software by generating software license keys that appear to be genuine. Normally used ...more
Welcome back, my fledgling hackers! Sometimes, for a variety of reasons, we can only get a command shell on our target system. For instance, with Metasploit, it's not always possible to get the all powerful Meterpreter on our target system. In other cases, we may be able to c ...more
Software update notifications are meant to be a reminder to keep your operating system and apps up to date, but that doesn't mean that they never get annoying. I get a notification telling me to update every day. Not that there's anything wrong with this, but sometimes I'm co ...more
Welcome back, my neophyte hackers! There are innumerable ways to hack a system. We must not overlook any of the possibilities if we want to "own" the system. As systems become more and more secure, we need to be vigilant in our search for weaknesses. In this hack, we'll look ...more
A basic tutorial from InfinityExists.com on using Backtrack - the Linux-based security software package. This tutorial covers: Where to get Backtrack 2, How to burn an .ISO file, How to boot Backtrack 2, How to login, and start the GUI interface. It also illustrates basic Linu ...more
Welcome back, my tenderfoot hackers! One key area on the minds of all hackers is how to evade security devices such as an intrusion detection system (IDS) or antivirus (AV) software. This is not an issue if you create your own zero-day exploit, or capture someone else's zero- ...more
Before, eReaders were only used to read eBooks. Not anymore. As tablet computers become more and more advanced, eReaders like Amazon's Kindle, Sony's Reader and Barnes & Noble's Nook are forced to expand their capabilities beyond the basic bibliophilic needs. And the first to ...more
Your new Canon EOS 7D camera will come with a free remote shooting option. In this video, learn all about this shooter and how to control it on your laptop. You will get a step by step walkthrough as well as an explanation of the feature's pro's and con's.
Facial recognition software is being more widely used with every passing day. Your local law enforcement is probably already using it, and it will be even easier for them now that the FBI handed out its own facial recognition software to state authorities. Even the fine folks ...more
Yesterday's installment of a Gamer's Guide to Video Game Software featured Unity 3D; today we'll be covering one of the oldest consumer game making engines, RPG Maker. The series started in 1995 in Japan, and has since gone through many iterations in its home country. There a ...more
Welcome back, my tenderfoot hackers! As hackers, we often are required to get past antivirus (AV) software or other security measures. To do so effectively, we need to have some understanding of how AV software works. In this tutorial, we will take a cursory view of how AV so ...more
While many image sites allow you to hide image and video catalogs behind passwords, you can often gain access to these images by "guessing" the URL of the image. This process is called fuskering. Photobucket is one of the popular websites that can be fuskered and this tutorial ...more
This video shows us a tool that can be used to split and merge pdf files without having to buy any software. If you work with lots of lengthy pdf files that are often much longer than you need, there is a program called ArduoPdfMerger that will make your pdf files easier to h ...more
Lego Mindstorms is a great way to take your Legos to the next level by adding in the flavor of robotics! But, with taking it up to the next level, it does get a hair tougher! And if you're having trouble working with the Mindstorms software, this great video with Patrick Norto ...more
In this first part to my series on getting started with Windows Holographic, we are going to cover everything you need to get set up for developing HoloLens apps. There are many pieces coming together to make one single application, but once you get used to them all, you won't ...more
Digidesign has transitioned all of their plug-in software copy protection from floppy drive based key disks to copy protection authorizations that reside on the iLok technology provide by PACE. The following is some information about iLok technology. The iLok USB Hardware Key ...more
It's sad to say, but the chances of a new system launching without any hitches or glitches is just not realistic. If you're one of the lucky few that has gotten their hands on the new PlayStation 4, or if you are waiting in line right now to get one, the first thing you're goi ...more
Airgeddon is a multi-Bash network auditor capable of Wi-Fi jamming. This capability allows you to target and disconnect devices from a wireless network, all without needing to join it. Airgeddon runs on Kali Linux, and I will show you how to install, configure, and use the jam ...more
Do you love video games? Would you devote your free time to creating your own game—one superior to the games you already have? Or at least one that has more Neil Patrick Harris jokes? There is good news and bad news. There are many software options for making all sorts of vid ...more
Here's how to solve problems and get better results with the Flip Video camcorder software by upgrading the firmware. Bill myers shows you how it's free and easy to do. Find my site at http://www.bmyers.com
The Pixel and Pixel XL both use AMOLED screens, which are noted for their deeper blacks and sharper contrast ratios when compared to traditional LCD panels. However, AMOLED displays still have one fairly major downside, and that's the fact that they're vulnerable to screen bur ...more
For all you Facebook-addicts out there (or anybody else that needs to access blocked websites anywhere they want), this is a video that you will want to watch. In just a minute and thirty seconds, any ordinary person can learn how you can access any website they want anywhere ...more
In this series of videos you'll learn how to use Apple iPhoto software to edit and organize your digital photos. Expert Matt Nichols shows you how to import images from a digital camera, hard drive, and Apple's Photo Booth software. He also shows you how to use the source navi ...more
Today concludes our Gamer's Guide to Video Game Software (see Part 1 & Part 2). In our final installment, we will shift away from engines toward video games that allow you to make your own games within them. Many games have featured level editors that allow users to create th ...more
If not the future of computing in general, augmented, virtual, and mixed reality certainly will change the world of gaming. If you want to try your hand at shaping this evolved medium, the Unite Europe conference posted a talk that explains the first things you need to learn t ...more
This is a terrible prank to pull on a friend. Destroy their iPhone software with a couple of quick hacks.
When you look up the word free in the dictionary, you'll find a lot of definitions, but in the days of digital dependency and a falling economy, free only means one thing—expensive stuff for nothing. And if you own a Windows computer, one of the best sites to get free software ...more
Shaun will teach us how to create a 3D video game compatible with MAC or PC with no prior programming knowledge. First download Alice, a 3D World program that can be turned into a video game. Open Alice, click on "add objects", click on "more controls" and select your choice o ...more
This video tutorial shows how to download .cut files onto Cricut software to design cards. Learn how to use this card making software, and get instructions for how to make a strawberry greeting card.
The video was excellent, and it could help some people download music fast and easy. The guy also takes us to a process in which it could be followed easily. He tells us how to download it and where to download it. He tells us what we need and were to copy and paste some stuff ...more
Welcome back, my novice hackers! One of the most common questions that Null Byte readers ask is: "How can I evade detection by antivirus software on the target?" I have already talked about how AV software works, but to obtain a deeper understanding, what better way is there ...more
Video: . Hi, this is a quick demo about how to backdoor executables (software) sent over HTTP using MITMF, backdoor factory This attack works on LAN REQUIREMENTS: -Kali Linux or any Linux OS -Wireless USB Adapter e.g. (TL-WN722N) -MITMf (man-in-the-middle framework) https://gi ...more
It seems like nowadays, whenever Facebook rolls out a new feature, it's immediately controversial. Social Ads put your name and face in the spotlight, Instant Personalization shared your information with partner sites, third-party apps were allowed to access your home address ...more
Looking to create your own mod or write a game to round out your design portfolio? By using the free Reality Factory software, you can create levels, weapons, monsters and everything else that goes into writing a video game. This tutorials shows you how to create an FPS game u ...more
With a keyboard, you can enhance your song so it includes more than just the premade loops in Garageband. Just attach a USB or Midi keyboard to your Mac and let the fun begin.
Hack Like a Pro : How Antivirus Software Works & How to Evade It, Pt. 3 (Creating a Malware Signature in ClamAV)
Welcome back, my budding hackers! In this series, we are trying to understand how AV software works so that we can learn to evade it. To that end, we are working with the open-source AV software, ClamAV. I had previously introduced ClamAV in Part 2 of this series. If you have ...more
Scanners have been around for a while. They allow us scan photos and documents into digital versions that are a lot less susceptible to damage over time. But what if you want to digitize the memories of something that isn't 2D? With this hacker's how-to, you'll learn a method ...more
In this Computers & Programming video tutorial you are going to learn how to get rid of Windows Genuine Software notification. First download softpedia mirror Us exe and save it to your desktop and launch it. Then you got to click yes on the two following windows and your syst ...more
In this series of online video tutorials you'll learn how to use Reason 3.0 music recording software. Expert Jerus Arte demonstrates how to use the program, from installing it on your computer and setting it up with the right preferences, how to control the master volume, and ...more
This shows you how to use the free software to unlock the iPhone, to work with any GSM Carrier. It is a very detailed, and quirky tutorial, so pay attention.
Learn how to create texture maps and apply them to figures using Poser rendering software with expert 3D animation and rendering tips in this free software tutorial video series. Part 1 of 15 - How to Create texture maps with Poser software. Create texture maps with Poser soft ...more
A bootable Windows XP disc will definitely come in handy if your computer ever crashes and you need to use the CD to run a system restore. You can use Nero 9, a CD-burning software program, to create this backup disc.
Learn how to install the voice changing software AV Voice Changer onto your desktop. The video will show you how to download VCS Diamond 6.0, how to install it, and gives you a free key so you can actually use it to start editing voices.
Turn a photograph of a regular person into an image of everyone's favorite muscular green psychopath! Using the hue slider, saturation tool and the Iwarp function, you can distort your picture in GIMP to make it look like a picture of Hulk instead.
Don't pay for virus protection. You can get basic non-intrusive virus protection from Avira. Check out this quick video tip from Tinkernut to see how and where to get the Avira free anti-virus software program for free! Avira AntiVir Personal is basic protection that protects ...more
Edit your photos with ease with Canon's free software, Digital Photo Professional (DPP). It's primarily for editing and processing Canon RAW files. See everything there is to know about this comprehensive photo editing software bundled with most of your Canon Digital SLR camer ...more
Get the most out of your HTC HD7! This guide offers a software tour of the HTC HD7 Windows Phone 7 smartphone. Windows Phone 7 novice? Not a problem. This exhaustive, eleven-minute guide will teach you everything you need to know. Become a WP7 pro with this video guide.