The Pi-hole project is a popular DNS-level ad blocker, but it can be much more than that. Its DNS-level filtering can also be used as a firewall of sorts to prevent malicious websites from resolving, as well as to keep privacy-killing trackers such as Google Analytics from eve ...more
Several technologies seek to change the way we perceive our reality, whether that involves entering a virtual world, augmenting an existing one in a realistic and interactive way, or somewhere in-between. It's tough to keep track of what we mean with this terminology, so let' ...more
Fractals and stars are two of the most beautiful and complicated-looking classes of geometric objects out there. We're going to explore these objects and how to carve them on a pumpkin. Unlike the last one on carving polyhedral pumpkins, where we used the entire pumpkin to car ...more
People use search engines for a wide variety of subjects (just look at some of the results that pop up in autofill). The results you get with each different search engine are usually different, but almost all of them display the same number of results per page by default—ten. ...more
Sometimes, you encounter words in a non-native tongue while using your Android device. The Google Translate app has an awesome feature where it will translate any text you highlight. An overlay will appear, and on this overlay, there will be the translation of the foreign word ...more
Next to spam calls, few things are more annoying than being inundated with spam, scam, and smishing texts. Your iPhone's Messages app should be a place for your friends and family to stay in touch, not a minefield of phishing attacks, malicious links, and viruses. Luckily, the ...more
Transverse wave motion is the beautiful rippling effect that occurs when a moving wave causes oscillations that travel perpendicular to the direction of energy transferred. (For example, via Wikipedia: "If a transverse wave is moving in the positive x-direction, its oscillatio ...more
It has been a long while since I last came here to write an article. Graduate school keeps you busy. After I looked over what I had written previously, I decided that I should introduce another fun topic from cryptography. In this case, steganography. In this article, I will ...more
If you found the world renown Body Worlds exhibition gnarly and perverse, perhaps you'll find this latest parade of plastination a little less so—considering we don't share the same DNA as these specimens of jerky-in-the-name-of-science. The Koerperwelten der Tiere—or Animal B ...more
With the macOS stager created and the attacker's system hosting the Empire listener, the malicious AppleScript can be designed and disguised to appear as a legitimate PDF using a few Unicode and icon manipulation tricks. A real PDF is required for the attack to work. Files ov ...more
You walk over to your laptop, wiggle your mouse to wake up the screen, then fire up your browser to come visit Null Byte. Catching the article about Anonymous and how they presumably will not take down the Internet, you find yourself wondering... how would someone take down th ...more
In places like underground bars or national parks, your phone's Internet service is sure to slow down to a very sluggish pace, making it difficult to surf the web. Or worst case, data will be non-existent, leaving you with only low-level network support for calls and SMS text ...more
I've been a diehard Chrome user since its inception, and even more so since Android was released. The ability to sync bookmarks, passwords, and web history across all of my devices made the switch a no-brainer, but what really made me fall in love was the amount of extensions ...more
Welcome back, my tenderfoot hackers! As hackers, we often are required to get past antivirus (AV) software or other security measures. To do so effectively, we need to have some understanding of how AV software works. In this tutorial, we will take a cursory view of how AV so ...more
Out of the more than 200 new features Apple included with iOS 13, perhaps none is more anticipated than system-wide dark mode. Finally, we no longer need to blind ourselves when responding to an iMessage late at night or checking Reminders to see the following day's tasks. But ...more
Professionally and academically speaking, I am a computer scientist, but I also enjoy lock picking as a hobby, so I thought I would share what knowledge I have with this. Before we start doing anything, first we need to understand the fundamentals of how locks work and then ac ...more
Timely costumes for Halloween are awesome—especially really obscure ones—because they're indicative of social awareness. In 2010, I remember seeing several Chilean Miner costumes, which I thought were great. 2012 brings new stories, new characters and more importantly...new Ha ...more
Some of you might be using Tor to host hidden services, and some of you might not even know what hidden services are. If the latter's you, do not miss this article. Why? Because you can host your websites and services on the I2P darknet. It's safe and secure—it's anonymous. I ...more
For all of you PS3 owners who got addicted to the wonderful puzzle platformer LittleBigPlanet, your hopes and dreams have finally been realized— LittleBigPlanet 2 is now out! Originally set to be released in November of last year, Media Molecule's LBP2 was in stores last Tuesd ...more
Greetings my fellow hackers, In the previous article, I discussed briefly about ransomwares and their devastating capabilities. Devastating in a way that ransomwares are not only known to encrypt files but to also lockout some specific functions of the system and hold it up f ...more
Hello NullByte! This will be my first How To series. In this tutorial you'll learn what SQL is, what SQL injection is and how it benefits you as a hacker. I strongly recommend learning at least the basics of PHP before attempting to learn/use SQL Injection. list of reference ...more
Safari has a major new feature for your iPhone, something that will change how you share, receive, and interact with links — and nobody is talking about it. The feature works on the latest iOS software, as well as the latest iPadOS and macOS versions. Still, you won't find any ...more
You may or may not have heard of alt-rock band Panic! at the Disco, but a year and a half ago they released a single called "The Ballad of Mona Lisa", which had an accompanying music video that was Steampunk-themed. In fact, here's the video: Video: . Well, I'm going to give y ...more
Dirty SCRABBLE. Everybody likes to play dirty, but we're not talking bluffing with fake words or closing up the board—we're talking actual "dirty" and offensive words. Despite the exclusion of offensive words in the bowdlerized Official SCRABBLE Players Dictionary (OSPD), the ...more
What would happen to your productivity if you had a way to block Internet access to your favorite time-wasting websites like Facebook, Twitter, Wikipedia and trashy celebrity gossip blogs? If you are like most people, you would probably get a lot more work done. Listed below ...more
In a era where cyber security is becoming increasingly important, Comcast has decided to use its customers' routers to provide hotspot access to the public. A new program, outlined by Dwight Silverman over on the Houston Chronicle website, seeks to provide Xfinity customers wi ...more
Hello friends. This is actually my first how to. In this tutorial I'll be teaching how to simply copy someone's WhatsApp pictures gallery into your computer, in an automated way. It is just an example of how easy is to steal data from someone's smartphone. I am covering Whats ...more
Let me start out by saying that Steampunk isn't about being historically accurate, and that everything I'm about to tell you is entirely optional. That said, let's take a look at the history of screws! What many people don't realize is that before we had metal screws, wooden s ...more
Spammers are the bane of every email user. No matter what you do, junk mail always breaks through the spam filters. And some of the best ones seem to come from legit companies, and that's because they aren't legit companies— they're spammers masquerading as legit companies. W ...more
Cyanogen, Inc., the for-profit company that spun off from its CyanogenMod roots several years ago, has announced that they're shutting down all of their services. The company's impending demise shouldn't directly impact many Android users, but the announcement does have one ma ...more
Trout tickling is the mystical art of rubbing a trout's underbelly until it goes into a lax, trance-like state. The fish is then scooped out of the water and thrown onto land. Similar to catfish noodling, the sport is lauded for its lack of equipment or tools of any kind, as u ...more
The last few months of WikiLeaks controversy has surely peaked your interest, but when viewing the WikiLeaks site, finding what you want is quite a hard task. Despite rumors of easy access via the Kindle and iTunes App Store, there currently is no way to view the leaked docum ...more
For this project, I sacrificed some of my kids' clothes and a can of tuna to make some high-quality fire starter! Here's how to make a great batch of char cloth to add to your emergency survival kit. Video: . WARNING: This project should not be attempted without adult supervis ...more
Since its humble beginnings on the iPhone 4S, Siri has come a long way. While each iteration of iOS sees new features for the iPhone assistant, iOS 12 offers users some of the best advancements in Siri we've seen in a long time, not the least of which is support for Shortcuts, ...more
Did you play Cat's Cradle as a kid? Well, there's more to string figure art than just Cat's Cradle. This string art video demonstrates how to make a Jacob's Ladder. Song by Alice Cooper. Browsing the International String Figure Association website, I came across Gadan Rock St ...more
Here's a simple and easy addition to your own Jacob's Ladder. If you don't have one, here's how to make a Jacob's ladder. All you need is a couple high-voltage 15KV capacitors connected in series to each of the ladder's prongs. Basically, rather than arcing right away, the hi ...more
Smartphones have been a hot button issue around school campuses for several years now—some schools allow them, others confiscate them on sight. But the fact of the matter is, when used correctly, a smartphone can be just as much of a learning tool as a textbook or school-issue ...more
From Wikipedia, "Falconry is is a sport which involves the use of trained raptors (birds of prey) to hunt or pursue game for humans." An unassuming hunter, the falcon is surprisingly powerful. The training process is quite complex. Falcons have the potential to be incredibly ...more
NOTICE: Ciuffy will be answering questions related to my articles on my behalf as I am very busy. Hope You Have Fun !!! Computer forensics ( Sometimes known as computer forensic science ) is a branch of digital forensic science pertaining to legal evidence found in computers ...more
What is a Data Structure? When we think of a "structure" we often think of architecture, but data also often has structure. There are many different types of data structures: arrays, graphs, queues, stacks, and so on. We use these structures in order to be able to effectively ...more
When we are building programs that communicate over a network, how can we keep our data private? The last thing we want is some other lousy hacker sniffing our packets, so how do we stop them? The easy answer: encryption. However, this is a very wide-ranging answer. Today we'r ...more
I can imagine you sitting there thinking to yourself, "I've played a lot of games! I bet he won't have any that I don't know about!" Well, that's entirely possible. I'm only drawing from my own personal experience here, so you may, in fact, know of all these games. However, f ...more
This is a quick and easy method for receiving the backend IP (1) of a server who is hidden behind a proxy (2) or a firewall (3). Requiring the following: Attacker can use a browser Or Attacker have a basic knowledge of PHP (4) A page who provides the "Upload through URL" opt ...more
I obviously do a lot of Steampunk projects, but there are a ton of things out there that I haven't tried yet. So, in an effort to broaden my horizons, I recently taught myself how to use Arduinos, which I plan to incorporate into some of my future Steampunk builds. Since ther ...more
If you're looking to get into the nitty gritty of DNS (Domain Name System) hacking, you MUST check this video out. In this in-depth tutorial, you'll get to adventure into the wonderful world of DNS. Explore the vast and intricate details of our beloved Domain Name System while ...more
You're walking down the street, minding your own business. Then you see it—a large, bright fireball in the near distance. A tremendous heat wave speeds towards you at one thousand miles an hour, and before you can think, before you can even blink, the extremely heated wind pus ...more
The OnePlus 3 and 3T are a pair of phones which allow you to do practically anything you want, because OnePlus is such a developer-friendly company. They almost always release kernel sources, and their phones sport an unlockable bootloader that doesn't void the warranty. But w ...more
Apple always finds a way to sneak in tiny, inconspicuous features that improve the iPhone experience. And with iOS 14, there's a hidden, unannounced gesture that makes it possible to navigate apps and menus faster than ever before. When you go deep into an app's pages and men ...more
As was mentioned by the great OTW last week, TOR, aka The Onion Router, has had its integrity attacked by the NSA. In an attempt to reduce the anonymity granted by the service, the NSA has opened a great many nodes of their own. The purpose is presumably to trace the origin of ...more
In our media-enriched world, past and present, SCRABBLE has made a name for itself, whether deliberately, subconsciously, or influentially. You may have a read a book that had the popular word game within a chapter, watched a movie that showed your favorite characters bringing ...more
Getting used to your new Firefox 4 web browser? If so, you might have seen some improvements in the Location Bar. The updated features make browsing the web a cinch, so it's no wonder why more and more Internet junkies are calling it the Awesome Bar. It's faster and easier to ...more
Maximum PC posts a thorough guide on properly benchmarking your PC. For those not in the know, benchmarking is the process of "running a computer program, a set of programs, or other operations, in order to assess the relative performance of an object, normally by running a n ...more
Thanks to the advent of smartphones and mobile apps, Scrabble has spread like wildfire across the globe, whether it be Scrabble or one of its many popular word game spinoffs, such as Words with Friends, WordWise and Kalimat. There have been over one million Scrabble sets sold ...more
APOLOGIZE Hello my masters and colleagues, first of all I would like to apologize for my absence during the past month, to say that i was busy with some projects and decide to leave the white-side for a while and made some visits on the dark-side(every good COP has a dealer f ...more
Hi guys. I'm here to go for level 7 now lets get it start but i apologize u all that i posted this very late but now lets rock: Level 7 this level says: This time Network Security sam has saved the unencrypted level7 password in an obscurely named file saved in this very di ...more
I love robots. They have the potential to evolve into Asimovian destroyers of the human species, but have only just mastered the art of cleaning my rug. They have an ever increasing cool factor and a growing number of cheap and simple components that let the hobby roboticist r ...more
Umbra, penumbra. Not exactly abracadabra, but if you've taken an astronomy class, you know exactly what the umbra and penumbra are. And any Earthling would agree that the umbra is the best place to be during a solar or lunar eclipse. When the Sun, Earth and Moon are precisel ...more
Did you know it only took five weeks to make FarmVille? That it currently has over 80,000,000 users? That FarmVille farmers outnumber real farmers in the United States by a ration of 80 to 1? Crazy, right? And that's just the tip of the iceberg. There's plenty of other od ...more
We've seen several examples of light graffiti on WonderHowTo (1, 2, 3), but this one is truly eerily beautiful. Australian photographer Denis Smith pushes the envelope with his project Ball of Light. "The Ball of Light is a mysterious portal into my world. It, and its friends ...more
Chicken hypnotism is pretty mind boggling. We were enthralled when young Ciaran hypnotized a chicken with his infectious little boy charm (and more importantly, the gentle back-and-forth sway of his arms). There are a wealth of videos on YouTube depicting the process—a bonafid ...more