Website Access

How To : Use Wireshark to Steal Your Own Local Passwords

Here at Null Byte, we've spoken a lot about securing and anonymizing traffic. This is a big deal. With all of today's business taking place electronically via computers, we need to be secure when on-the-go. A lot of businesses don't even train their employees to secure their c ...more

How To : Recover a Windows Password with Ophcrack

When Windows stores a password, it is done so by hashing the password in an LM hash and putting it in the Windows SAM file. In the scary moment that you lose your password, but don't want to pay some geek to have full root access to your computer, you need to recover it using ...more

Miro 4 : Syncing Media to Android Devices Just Got Easier

Android devices are becoming more and more popular with each passing day, so why is it that Google has yet to design a software program that allows users to manage their music and video libraries on their computers? Apple's iTunes offers iPhone users an easy way to control the ...more

News : Do Real Science. No Degree Required.

What's the next best thing to being an official scientist? Being a non-official one. A new website called Science for Citizens helps you find the science experiment of your dreams, hook up with the scientists involved, and actually take part in the experiment itself. Here are ...more

How To : Use All Your Instant Messenger Accounts At Once

Your best friend's on Yahoo!, your daughter's on AIM, and now your co-worker wants to connect with you over Windows Live. Before you know it, your desktop is overflowing with buddy lists and message windows. Mismatched alert sounds are dinging and buzzing incessantly. Your com ...more

How To : Hack a Voicemail Account Using SpoofApp

Have you ever noticed that whenever you setup your voicemail account after getting a new cell phone number, it asks you to create a security pin to access your voicemail from other phone lines? When you call your home or cell number from another phone, after a few rings your ...more

Google Dorking : AmIDoinItRite?

What is Google Dorking? Well, simply put, "Google Dorking" is just an efficient way to utilise keywords in order to perform very specific searches on a given subject. In this case, one would look for websites/servers that are vulnerable to attacks or are configured improperly ...more

How To : Run an FTP Server from Home with Linux

File Transfer Protocol, or FTP, is a network protocol made for transferring files in a client and host fashion over a Transmission Control Protocol (TCP) network, such as the internet. FTP is integrated into most browsers, and you have probably used it before. It is a common w ...more

How To : Give Your GRand Unified Bootloader a Custom Theme

GRUB, or the GRand Unified Bootloader, is a program that installs to your Master Boot Record and controls what operating system you load at boot time. Normally, it is used for multi-boot systems. Multi-boots allow you to switch between operating systems installed on seperate d ...more

How To : Use Cygwin to Run Linux Apps on Windows

You'll see a lot of Linux action going down here at Null Byte. We use Linux for hacking-related stuff because it provides a more relaxed programming environment, making it easy to write exploits and tools. Linux has many features Windows is lacking, such as full control over t ...more

How To : Protect Your Facebook Reputation with Reppler

Do you know how you are perceived by your peers? In real life and online? In the physical world, you could be seen as intelligent, thoughtful and hard-working, but on the Web you could be looked at as irrational, selfish and slothful. There's just something about the Internet ...more

Atomic Web : The BEST Web Browser for iOS Devices

Over the past few years, I have downloaded several third-party web browsers for the iPhone, iPod touch and iPad, and the one I have found most advanced and feature rich is Atomic Web. While many mobile browsers have their unique features, Atomic Web could well be considered th ...more

Hack Logs and Linux Commands : What's Going On Here?

This morning, I received a message from a friend who was reading a hack log, and she had some questions about the commands used. This got me thinking, as Linux has a ton of commands and some can be archaic, yet useful. We are going to go over everything you need to know to rea ...more

How To : Secure Your Computer with Norton DNS

There are so many hackers around these days, and they are becoming very smart. So smart that they have successfully taken down many government websites. The most recent attack was on the Department of Justice (DOJ). To read about the history of these hackers, check out Wikiped ...more

How To : Turn Your House Lights On & Off Using the Internet

Haven't you ever wanted to live in a futuristic home? I think that homes are headed towards an era where they will be controlled by our computers and smartphones. No longer will you have to find your keys to unlock your door, or wait until you get home to monitor your security ...more

News : Welcome to Edit on a Dime

Video Introduction to Edit on a Dime. Hey there, Interwebs and welcome to Edit on a Dime, your community for reviews, tutorials and news in the world of free and low cost creative tools. The purpose of this World is to make your video, audio and images look professional withou ...more

News : Why Rdio.com Is Better than the iTunes Music Store

When Apple‘s iTunes was introduced back in 2001, it rekindled my interest and purchasing of music. I was so excited by the program that I immediately started converting all my rather large collection of CDs into MP3 tracks. I then sold off my CDs and remaining vinyl albums, an ...more

How To : Things to Do on WonderHowTo (04/25 - 05/01)

WonderHowTo is a how-to website made up of niche communities called Worlds, with topics ranging from Minecraft to science experiments to Scrabble and everything in-between. Check in every Wednesday evening for a roundup of user-run activities and how-to projects from the most ...more

How To : Join the Fight Against SOPA and PIPA

Amazingly, a lot of people I know haven't even heard of SOPA or PIPA. Now, every English-reading person with an internet connection will finally have those two four-letter acronyms emblazoned in their minds. For the entire day today, Wikipedia's English-language site will be i ...more

News : Making Art on Your iOS Device, Part 5: Photography

There are seemingly endless photography apps for the iPhone—it is perhaps one of the most popular arenas for application developers. We've covered a few in Giveaway Tuesdays, but nothing comprehensive. We would be remiss to omit the two most popular frontrunners—Hipstamatic ( ...more

Google+ Pro Tips Round Up : Week 4

Last week, I demonstrated how to go a little deeper into your Google+ profiles, photos, and introduced cross-posting. This week, I'm highlighting a bunch of different unofficial resources that have sprung up that will help improve your Google+ experience, and give you the late ...more

How To : Safely Share Files Online

Okay, stop me if you've heard this one. You have a document that you want your co-workers' advice on. You attach said document onto a mass email. The first reply comes back with an edited version of the document. You begin to make changes, but another email comes in, with yet ...more

News : Final Fantasy 14 Final Thoughts

Spending five days with the game is enough to know it's not to my liking. Is it a horrible MMO? Yes, yes it is. There are better Free to Play MMOs launched years ago that are better than this. As a fan of the Final Fantasy series (I am currently playing and liking Final Fantas ...more

Top 10 : Best Ethical Destinations for 2011

By Ethical Traveler As the world becomes ever more interconnected, being an ethical traveler becomes both easier and more urgent. Travelers today have access to far more information than we did even 10 years ago. We can observe–almost in real time–the impact that smart or sel ...more

How To : Use a proxy to get on Facebook at school

Are you trying to access Facebook when you shouldn't? This video will help. Watch and learn how to use a proxy to get to blocked websites, like Facebook. Now you can go on Facebook and other websites anywhere, even at school.

How To : Block or unblock websites

Getting spammed or too many viruses? This trick will protect your computer from websites trying to access or corrupt it. Block Sites That are: Cookie Following Ads Virus Sites Pop Up Email Scams Pop Up Sites Follow along with the video and complete the steps on your own comp ...more

How To : Unblock applications on Facebook

This video tutorial from agseo presents how to unlock applications in Facebook social internet network. For more detailed information go to www.agseo.blogspot.comTo unblock Farmwille and other applications on Facebook social network login to your Facebook account.From top menu ...more

How To : How To Facebook 101

This fast tutorial will show viewers the basics of how to use Facebook for those who are new to using the website. After creating an account and logging into Facebook, you will see your homepage, which has most of the new information regarding your friends and their recent act ...more

How To : Sync files using the Dropbox utility

The Dropbox utility can automatically sync your computer files with other devices each time you save them. In this tutorial, learn all of the steps you need to sync files with Dropbox. You Will Need • Internet access • Compatible mobile device • Dropbox software Step 1: In ...more

How To : Get a PayPal account

If you like to shop online then it is extremely helpful to have a PayPal account to safely make your online purchases. Help reduce your risk of identity theft by using protected methods like PayPal when your credit card information is involved. PayPal is a service that allows ...more

  • Hot
  • Latest