Use Console Commands for Call Duty

How To : Use console commands when playing Call of Duty 4

When you enable the dev console for CoD 4, you can get into the developer's menu and give yourself all sorts of cool tricks, extra equipment and more! This video shows you a few commands you can enter when the console has been enabled.

How To : Mod your XBox 360 for CoD 5 Nazi Zombies

The Nazi Zombie mod for Call of Duty: World at War is one of the most popular mods for a console game ever made. Have you missed out on the fun? Get it! This video will teach you how to put the Nazi Zombie mod (or any other mod you can find) onto a CoD game and then play it on ...more

HowTo : Fix a Broken PS3...In Your Oven

If your PS3 is YLOD (flashing the Yellow/Red/Green Light Of Death), try sticking it in the oven. Why does this work? Instructables user formulajake88 explains what causes YLOD and why the oven re-flow method will (likely) work: "There are several prevailing theories, includin ...more

Hack prestige in Call of Duty : Modern Warfare 2

In this video tutorial, viewers learn how to hack the prestige mode in the game Call of Duty: Modern Warfare 2. Prestige Mode is an option that a player can choose after they progress to Level 55 (Commander) and gain a little more experience. With this hack, viewers will be ab ...more

How To : Connect 2 Controllers to Xbox One

I've seen the how to article on this but my real question is does call of duty advanced warfare allow 2 users on 2 controllers to simultaneously use one xbox one console to play together?

Leaked : Full List of Microsoft's "12 Days of Deals"

Microsoft has a great holiday-themed sale going on right now, but in an apparent effort to generate daily clicks, they're only revealing two deals at a time. Each day between December 8th and 19th, two new deals trickle out—but Microsoft leaker Windows Valley has come across a ...more

How To : Play Better in Counter Strike Source

So You're New to Counter Strike Source? So you're new to Counter Strike Source and you want to improve your gameplay? Great. You've come to the right place. The first step to improving your game is to admit that you are a NEWB or NEWBIE. Do not confuse this with NOOB. A "new ...more

News : First Steps of Compiling a Program in Linux

This article describes the very basics of compiling a program on Linux. It is targeted at the absolute beginner. Sometimes beginners search for programs on the web for their Linux systems, and is faced with the reality that they have to compile the program themselves, either b ...more

How To : Make a Call of Duty 4 working server

In this tutorial, we learn how to make a Call of Duty 4 working server. First, go into your game and go to "start new server". Next, name it whatever you want and put internet into the dedicated section. After this, save the information and a console will pop up. Don't close t ...more

How To : Access your wireless router from a Windows PC

In order to access your wireless router settings in a Windows PC you need to use a command called ipconfig. The purpose of this command is to find out what your IP is. Go into the command console and use ipconfig to find out what it is but instead of noting down the IP address ...more

News : Null Byte Is Calling for Contributors!

We're officially seeking Null Byters interested in teaching others! Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (if up to par, of course). This is a job meant for anyone with the will to share knowle ...more

News : The Good and the Ugly of Console Controller Add-Ons

Video game controllers are our windows into the soul of the machine, our sole means of interacting with them. More often than not, consumers seem displeased by their controllers; it's comforting to blame sticky, poorly laid out buttons for messing up your game than your own la ...more

How To : Fix the "hal.dll is missing or corrupt" error

If you've received the "hal.dll is missing or corrupt" error message from your Windows machine, then you're in luck! This video will show you how to correct that problem with the Recovery Console tool that comes with the Windows 2000 and XP CDs. Using the Windows Recovery Cons ...more

News : The Best Places to Download PC Games Online

Digital distribution games are already firmly established on the PC, and they've infiltrated every present and next-gen console to some degree. Whether you like to play DOS, AAA, PC or indie games, there's a way to purchase most of them without leaving the comfort and warmth o ...more

News : Is the End Coming for Quadriplegic Gaming?

A century ago there wasn't much life available for quadriplegic people. Handicap accessibility was barely even a concept, and lacking medical technology kept any semblance of independence out of reach. Today those unfortunate enough to be paralyzed from the neck down have brig ...more

How To : Use a UDP - Flooder (LAGSWITCH!)

Welcome back My sleepless army of young hackers, Everyone uses internet, right? So for this tutorial, i'll start with the basics and slowly we'll get to the UPD Protocol. Different Protocols The internet is like a freeway. There are certain rules just like driving to fast or ...more

How To : Use Social Engineering to Hack Computers

Today I am going to teach the various ways that you can use social engineering to hack a system. For those of you that have followed my past tutorials, you know that social engineering can unlock a world of possibilities. This is because no matter how many firewalls, no matter ...more

How To : Write Batch!

Right, So i've been asking alot of questions here on Null-Byte and everyone has been really helpful to me. So i thought i'd try and give back with one of the first Programing Lang i started with. I know many people of Null-Byte are most likely past the points i am going to ta ...more

How To : Security-Oriented C Tutorial 0x01 - Hello, World!

Welcome back, reader! In this tutorial, we will be covering our first program! So let's get to it. We all know the unspoken tradition of the first program when learning a language and of course, here we will respect and complete it. Fire up your favorite text editor (be it vi ...more

C/C++ for Hackers : Part 10 (System Commands)

welcome back, fellow hackers! finally, i am releasing part 10 in my series on C++. this will surprisingly be a short article. in this part of my series, we will be looking how to execute system commands! but first, a disclaimer: I AM NOT RESPONSIBLE FOR ANY DAMAGE THAT YOU D ...more

How To : Turn Your Device into an Android Auto Clone

Auto manufacturers are slowly starting to debut models with Google's new Android Auto software baked into the dashboard console. Starting with the 2016 model year, we should see vehicles from Honda, Ford, Chevrolet, and many others sporting the new software. Now, many manufac ...more

How To : Use the SysRq Key to Fix Any Linux Freeze

Linux is generally a pretty stable OS, but occasionally things happen. However, as long as your keyboard has a SysRq key, you'll never need to worry about freezes again. The SysRq key functions allow you to perform various low level commands, even when your system is unrespon ...more

News : Who the Heck Is NOT Using Nvidia?

Nvidia has emerged as the indisputable leader in chips for Level 3 and even more advanced driverless applications, catching some of the world's largest semiconductor makers and automotive suppliers by surprise. After the car industry figured out that AI-piloted vehicles were ...more

How To : Place a Virus in a Word Document for Mac OS X

This tutorial follows the same idea as my original tutorial for windows, but I've redone it to work with Mac OS X. Here's how to get a meterpreter session from your victim opening a malicious word document: Step 1: Creating the Payload For this tutorial, I'll be using a pyth ...more

Prev Page
  • Hot
  • Latest