Virtual-2

How To : The Top 80+ Websites Available in the Tor Network

There are nearly 100,000 unique onion service addresses online with over two million people using Tor every single day. Join me as I explore a small fraction of what the Tor network has to offer. It's puzzling to imagine about 100,000 .onion websites in existence. Readers who ...more

How To : Get a virtual six pack in Photoshop

I want to pump. You up. OK, even better, why not pump yourself up. No, not through hard work and dilligence, what fun would that be!? No, do it the simple way, by firing up your Photoshop and touching up the photo. What you'll do in this process is "grab" the abs from someone ...more

How To : Backup All of Your Xbox 360 Data to Your Computer

Flash memory can be a tad unpredictable at times. I have had 4 flash drives die out on me over the last few years, and they usually die without warning. When a flash memory based device dies, the data is likely impossible to recover. Adversely on an HDD, or Hard Drive Disk, ev ...more

How To : 8 Free Must-Have Photo Apps for iPhone

The stock Camera and Photos apps are great for taking basic pictures and doing some quick edits, but if you're serious about making your iPhone photos the best they can be, you can't stop there. The iOS App Store is filled with tons of great third-party alternatives with adva ...more

Become an Elite Hacker, Part 1 : Getting Started

Who am I? First let me introduce myself. I am Th3skYf0x, an -well lets call it experienced- hacker and i recently found this site and right after that i found this Null Byte "world" soo i thought... Why not teaching instead of doing nothing with my knowledge. Let me get one ...more

Writing a Windows 10 Rootkit : Part 1

So this is my methodology for this project of writing a rootkit. Please leave feedback on what is right/wrong. I tried to simplify concepts the best I could however... One needs an deep understanding of how different types of processors work and how memory protection is imple ...more

How To : Expand your farm in FarmVille

Think you've mastered the game of FarmVille? If your farm is still the size you started with, think again! This video tutorial shows how to expand your farm in FarmVille. Once you have 20 neighbors and 250,000 coins, your farm is prime for the Big Ole Plantation upgrade. Chec ...more

How To : Install Android OS on a PC

Download the ISO and follow along with this video to learn how to install Android OS on a PC. Using Virtual Box, you can run Android directly on your desktop computer or laptop. Watch this video to see how it is done.

How To : Create and mount ISO image files using UltraISO

In this video the instructor shows how to create and mount ISO's using Ultra ISO. You can user daemon tools to work with ISOs but this video shows you an alternative to it. Download the Ultra ISO software and install it. After installing it run the program. In the tool bar sel ...more

How To : Use Hound on Android Without an Activation Code

SoundHound's new virtual assistant application, Hound, is gaining a lot of buzz in the tech world—especially after a demo video showed just how awesome it works (it has amassed over 1.6 million views in under a week). Don't Miss: Amazing New Digital Assistant Shames Siri & Go ...more

How To : Get free stuff in FarmVille

By monitoring your FarmVille feed on Facebook, you can get a bunch of free stuff for your farm! Be careful though, if you are too ambitious, there won't be anything for anyone else! This video tutorial shows how to get free stuff in FarmVille. From celebrations, to lost anima ...more

Siri 101 : How to Completely Turn Off Siri on Your iPhone

Not everyone digs Siri. Some of you probably can't live without the personal assistant on your iPhone, and some of you probably never even use it — and likely never will. If you fall into the latter category of iPhone users, you can simply disable the feature altogether, which ...more

How To : ALL-in-ONE HACKING GUIDE

Hello and welcome to my article. I have made this article for anyone who wants to become a hacker, and wants to know how to get started. OVERVIEW: As you'll get further into the hacking community, and learn more about how it's all put together, you'll also realize very quick ...more

How To : Speak with auto-tune vocals in Skype

Vofgofm33 shows viewers how to use autotune with Skype! First, select Mixcraft program and set up MixCraft for Autotune. First, you need virtual audio cable. Set this up and have the track audio on. Next, you will set your output to VAC. Then, you need to have where you want t ...more

How To : Get a 3D Stereo Sound Effect on Any Android

Goertek's AM3D offers world-class audio processing software that powers millions of high-end devices around the world. Their biggest advancement is likely Virtual Surround Sound, which can make two speakers sound like a full 5.1 setup. You normally can't get these features on ...more

How To : Build an ARP Scanner Using Scapy and Python

As you might know, there are a multitude of tools used to discover internal IP addresses. Many of these tools use ARP, address resolution protocol, in order to find live internal hosts. If we could write a script using this protocol, we would be able to scan for hosts on a giv ...more

How To : Do the Horse Stable glitch in FarmVille (03/09/10)

This is a recent glitch, similar to the chicken coop glitch, where you can make your horse stable completely ready. Just watch this brief video tip to see how to benefit from the Horse Stable glitch in FarmVille (03/09/10). It's a simple glitch in the game that allows you to u ...more

SPLOIT : How to Make an SSH Brute-Forcer in Python

NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! As much as I love other SSH bruteforcing tools like Ncrack, Metasploit, THC-Hydra, ... ( Just to mention a few ). I prefer using my own script. The tools ab ...more

How To : Exploit PHP File Inclusion in Web Apps

File inclusion can allow an attacker to view files on a remote host they shouldn't be able to see, and it can even allow the attacker to run code on a target. To demonstrate these vulnerabilities, we'll be practicing PHP file inclusion using the Damn Vulnerable Web App. We'll ...more

  • Hot
  • Latest