We've featured Temporary Services before, but we thought they deserved a full spread. In this post, we've included some of their How-To drawings and examples of recreated prison art. Temporary Services is: "... a project in collaboration with Angelo, an incarcerated artist. ...more
If you're looking for a low cost solution for a portable hamstick antenna pole for your ham radio, then check out this video. In the tutorial, you'll find out how to make this temporary mount that can be used when going out into the wild or just hanging around your home. This ...more
The next time you buy bread, tortillas and other produce or baked goods items that come with twist ties, don't throw them away. These handy pieces of plastic-covered wire come to good use when you need to build a garden trellis, organize your power cords, replace your zipper p ...more
Have you ever browsed the web, watched a video, then wanted to download it? Well, there's a fabulous program that does just that, simply and easily. It's called VideoCacheView by NirSoft. The program basically extracts the FLV video directly from your browser's temporary folde ...more
Farkle hacks, cheats, glitches. How to hack Farkle. Watch this video tutorial to learn how to cheat on Farkle (09/15/09). Description of the app on Facebook: Farkle is a fun dice game that is easy to learn and very addictive! The game is played with six dice. All six dice a ...more
What appears to be an ordinary MP4 may have been designed by an attacker to compromise your Linux Mint operating system. Opening the file will indeed play the intended video, but it will also silently create a connection to the attacker's system. Understanding the Attack Whi ...more
Trying to figure out which music streaming service to subscribe to can be a difficult task when the playing field is so crowded. Each has its benefits, as well as downsides, so finding the right one for your needs and wants can take a lot of overwhelming research. But we've do ...more
Farkle hacks, cheats, glitches. How to hack Farkle. Watch this video tutorial to learn how to play Farkle and Farkle Pro on Facebook. Learn about scoring and gameplay in Farkle. What's you highest score? Description of the app on Facebook: Farkle is a fun dice game that is e ...more
Being able to write your own hacking tools is what separates the script kiddies from the legendary hackers. While this can take many forms, one of the most coveted skills in hacking is the ability to dig through the binary files of a program and identify vulnerabilities at the ...more
Apple last month released iOS 17.2, its biggest iPhone software update since iOS 17.0, with 60 new features. Now, as of Jan. 22, we have iOS 17.3. Overall, it's not the behemoth software update that iOS 17.2 was, but it has a few exciting new things you'll definitely want to k ...more
Google is great. They provide us with tons of free services and open source APIs that we can code fun tools for, one of which I don't think gets enough credit: Google Voice. Haven't you ever wanted to be able to protect your privacy when handing out your phone number? Or mayb ...more
Farkle hacks, cheats, glitches. How to hack Farkle. Watch this video tutorial to learn how to hack Farkle on Facebook for a good score (08/10/09). You will need Cheat Engine for this hack. Description of the app on Facebook: Farkle is a fun dice game that is easy to learn an ...more
Just about everyone I know has broken a phone at least once in their life. It's almost inevitable considering we carry them everywhere we go, but that doesn't make it any less irritating. A cracked screen is difficult to read and can actually be a little dangerous if there are ...more
In the 21st century, we're all looking for ways to stay private, especially on our electronic devices. We have big tech corporations, enemy countries, malicious hackers, and other prying eyes watching our every move, so it's only natural to want to limit what they can see. Mak ...more
Introduction Halo: Reach is Bungie's latest and final addition to the franchise. Microsoft has claimed the title and from now on 343 Industries will be working on the Halo franchise. In my opinion, Bungie's last game is the best out of all of them. These are some tactics and ...more
With the news that Cambridge Analytica obtained over 50 million Facebook users' information without their consent, there are no doubt many of us considering that terrifying yet alluring endgame — deleting Facebook. While difficult to figure out, deleting your Facebook account ...more
At first, the Black Ops 1.04 patch seemed like a godsend. It was supposed to fix the horde of issues plaguing Call of Duty: Black Ops on the PlayStation 3. But when PS3 users started downloading and updating Activision's 1.04 update, they found that the supposed savior of onl ...more
If you have a local Trader Joe's, you know first-hand how enchanting the frozen aisles are—almost every item offers the promise of a delicious meal or dessert. (We're always tempted to open the package and eat the cookie butter cheesecake, stat.) While cooking from scratch is ...more
Since the release of the T-Mobile G1, the Play Store has been flooded with apps that claim to improve performance by clearing cache and storage. These apps are typically useless, rarely providing more than a temporary fix which Android undoes immediately. As Android has contin ...more
Automation has been a buzz word for quite some time now, but the principles behind it are as strong as ever. For a hacker or pentester, Bash scripting is one form of automation that cannot be ignored. Virtually any command that can be run from the terminal can be scripted — an ...more
Typos are a constant annoyance that we all deal with thanks to the cramped touchscreen keyboards on smartphones. For many, nothing beats the feel of a good old physical keyboard when it comes to typing fast with minimal errors. Fortunately, WhatsApp has an awesome feature whic ...more
Once you've installed Ubuntu with security in mind and reduced the possibility of network attacks on your system, you can start thinking about security on an application level. If a malicious file is opened on your system, will an attacker be able to access every file on the c ...more
If you're always on the go, the Nexus 7 is a godsend for having everything you need at the tip of your fingers—music, videos, text documents, photos, and more. Unfortunately, as good as that is, it also means one hell of a messy tablet. Whether I like to admit it or not, I’m ...more
If you prefer glow sticks over candles during a power outage, then this how-to is for you! Although glow sticks are used as temporary light sources, there are other applications for them. Divers use them for night diving, fisherman use them to catch swordfish, and the military ...more
In the previous article, we learned how to set up our VPS, configure our PHP server, and developed an in-depth understanding of how the payload works. With all that taken care of, we can get into disguising our payload to appear as an image and crafting the note in the greetin ...more
When it comes to modding Android, there's no better tool than Team Win's TWRP custom recovery. You can use it to root your phone, flash mods like Magisk or Xposed, and even replace the entire operating system with a custom ROM like LineageOS — honestly, there's not much this u ...more
With so many apps being cloud-based, cached data has started to become a problem. This is particularly true if you're low on storage, so developer Dhi decided to do something about it. You see, apps will download temporary bits of data called cache to help speed things up the ...more
Single sign-on (SSO) lets users login across different sites without having to manage multiple accounts. I'm sure most of us appreciate the convenience of seeing "Sign in with …" buttons that let us login with a single username. Hackers, however, see a possible avenue for expl ...more
Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. Part 5 in Minecraft World's Ultimate Survival Guide is, for me, the longest article to write. Since I squeezed out a lot of information from other areas to put into survivability, i ...more
Directory traversal, or path traversal, is an HTTP attack which allows attackers to access restricted directories by using the ../ characters to backtrack into files or directories outside the root folder. If a web app is vulnerable to this, an attacker can potentially access ...more
Farkle hacks, cheats, glitches. How to hack Farkle. Watch this video tutorial to learn how to hack Farkle scores on Facebook (09/26/09). Download Cheat Engine and Mozilla Firefox. Description of the app on Facebook: Farkle is a fun dice game that is easy to learn and very a ...more
If you're willing to shell out for a mind-blowing party trick, here's another great one to add to your repertoire. Unfortunately this isn't a dirt cheap junk drawer DIY—you'll need a $40-$60 gallium kit (which doesn't include the spoon mold). What is gallium, you may ask? An a ...more
If you use Apple's email services and the "From:" field in your iPhone's Mail app is cluttered with @Mac.com, @Me.com, and @iCloud.com variations of the same address — along with third-party accounts — there's an easy way to declutter things and hide the addresses you don't us ...more
Hi Elite Hackers! Welcome! to my 4th post. This tutorial will explain, how to extend a (hacked) AP's range with a wireless adapter. I made this guide because after hacking an AP it was difficult to connect to it (poor connection) and further exploit it. You can also use this: ...more
If you have made the switch from Windows to Linux, I want to congratulate you in advance. I'm sure you have noticed a huge performance increase when using Linux over other operating systems. This is only half the battle, though! Most users who are new to Linux end up using Ubu ...more
For the first time in history, Apple has decided to scrap the dock for its new iPhone release. As if the maps fiasco wasn't enough, users took to the web to complain not only about the dock ordeal, but why Apple decided to make it obsolete. 9to5mac first posted about a concern ...more
I've come across a few very stubborn Xbox consoles in my day. A previous Null Byte demonstrated how to fix the Xbox with just eight pennies and some electrical tape. But if you've got one of those hell-born boxes that just refuses to be fixed in any way, shape, or form, there ...more
Everyone should know how to use the jack that comes with his or her car. Try this at home so if you ever get a flat, you'll know where the jack is and how to use it to fix that tire. Just watch this video tutorial to see how to jack up a car safely. Park the car on level grou ...more
Due to the overnight success of smartphones, millions of people are connecting with others. Currently, over 15 million text messages are sent every minute worldwide. Most of this communication is happening in the open where any hacker can intercept and share in the discussion ...more
There's a lot of misinformation about VPN services, and it stems from the fact that not all of them are created equal. Some focus on privacy, others on security, and a few VPNs are seemingly even purpose-built for the polar opposite: data collection. We made this guide to help ...more
The internet is chock-full of fun and interesting content, but there's only so much time in the day for consuming it. That's when saving webpages for later comes in handy. If you don't want your bookmarks and favorites folders to clutter up fast, consider using the "Reading Li ...more
When it comes to traveling from one location to another with the aide of your iPhone, ensuring your navigation app works as it should keeps you one step ahead of potential hassles. One feature often overlooked is audio settings, and while having no voice prompts is easy enough ...more
Screenshots taken from a compromised computer can provide hackers with access to private emails, photographs, and information found in sensitive documents. This data can be used by the attackers to build profiles of a target for social engineering attacks and blackmail or even ...more
This time it's serious. Really. The largest web security vulnerability of all time went public on Monday, April 7th, 2014, resulting in widespread panic throughout the Internet as system administrators scrambled to secure their websites from the OpenSSL bug known as Heartblee ...more
TWRP is a name many are familiar with since it allows your Android device to install any custom file of your choosing. You can create a NANDroid backup to keep your data safe or even use Magisk to achieve full root access. In fact, TWRP is often seen as the gateway to modding ...more
In this video, we learn how to automatically clear browser cache in Internet Explorer. This will help your internet run faster and it will also help protect your computer from your personal information being store. First, open up Internet Explorer, then click on the tools drop ...more
Next time you go to the beach, stash a bottle of baby powder in your beach tote—even if you're not planning on changing any diapers. Before you head back home, dust your hands and feet with baby powder to remove sand particles quickly and easily, so you don't track any into yo ...more
This clip presents an overview of how to delete files in the Sony Vegas temporary folders, freeing up space on your hard drive. Whether you're completely new to Sony's popular nonlinear editor (NLE) or are a seasoned digital video professional simply looking to pick up a few n ...more
If you're marginally inclined towards computers, you've probably been approached at some point by a family member who wants you to "fix" their system during a visit home. With the holidays coming up, these opportunities (or ambushes) are even more likely. Even if nothing is w ...more
There is much to be learned about Apple Music and the revamped Music application introduced in iOS 8.4. Throwing their hat into an already competitive field with other companies like Spotify, Tidal, or Rdio, this is a bold move on Apple's part. So, before you consider signing ...more
Notifications keep us connected to our apps and contacts, but sometimes, they just get out of hand. While you can make blanket adjustments to your notifications with iOS 15's new Focus modes, you don't have to go that extreme — if there's one app bugging you right now, you can ...more
If you can't access your iCloud data such as emails, contacts, calendars, photos, notes, reminders, files, and other documents via a web browser on untrusted devices, like one at a library or friend's house, there's an easy way to regain access. The Culprit: Advanced Data Pro ...more
It looks like the dust is finally starting to settle on Google's POLED PR nightmare. The Pixel 2 XL — one of the most hotly-anticipated phones of the year — has been plagued by screen issues and worries. While it is certainly not without its faults, Google has created several ...more
This is a video tutorial in the Computers & Programming category where you are going to learn how to defrag your computer using CCleaner and disk defrag. First go to CCleaner and download the free program. After that install it and launch the program. Click on "analyze" and it ...more
In this video, Andy Bell shows different ways of how to build temporary makeshift stairs for use during construction or remodeling projects. He will teach you how you can easily measure your own stringers (the sides of the stairs, that the steps rest on to cut them on your own ...more
Chef Jason Hill shows how to use a grill box smoker. This box will turn your propane or gas grill into a temporary smoker. The box is used to hold wood smoking chips. Place the box over the burner to produce smoke flavored food. Most smoker boxes come flat, so some grills can ...more
This is a quick and easy method for receiving the backend IP (1) of a server who is hidden behind a proxy (2) or a firewall (3). Requiring the following: Attacker can use a browser Or Attacker have a basic knowledge of PHP (4) A page who provides the "Upload through URL" opt ...more
While there are countless ways to welcome in the new year, many of them involve imbibing copious amounts of delightfully spirited libations. If you're anything like me, I know you're fearing the monster hangover on New Year's Day. The good news is, you don't have to. If you w ...more
Welcome back, my novice hackers! In this series, we have been exploring how a forensic investigator can find evidence of illegal or illicit activity. Among other things, we have examined the registry and prefetch files for artifacts and have done some rudimentary forensic ana ...more
Learn how to tie an Anchor Hitch (also known as a Bucket Hitch) - A very secure means of attaching a rope to an anchor or any other object that you can't afford to loose (like a bucket down a well, I suppose - thus the alternate name). I actually do use this hitch for temporar ...more